Zone transfer..
A zone transfer uses the Transmission Control Protocol (TCP) for transport, and takes the form of a client-server transaction. The client requesting a zone transfer may be a secondary server requesting data from a primary server, historically referred to as master and slave. The portion of the database that is replicated is a zone.
Dig Command..
Dig command is used to gather information about host addresses, mail exchange servers, name servers by sending query to the DNS Name server. This tool can be run by Linux or Mac OS. Simply this works with single domain name, to get the result of multiple domain you will have to run multiple queries.
Follow us on Facebook...
/ edwardsnowden105
"Disclaimer"
This is the official Security Spot channel for video content! We focus on making videos for aspiring ethical hackers, computer scientists, cyber security aspirants and the infosec community.All the information on this channel is published in good faith and educational purpose only. This Channel does not promote or encourage any sort of illegal activities such as investigating individuals, websites, servers, networks or any digital devices or conducting any kind of illegal tests or activities on any system you do not own or not authorized. All contents provided by this channel in shape of videos or Images is meant for educational purposes.