The DNS domain transfer vulnerability is tested in windows and BT5 as follows: if you want to test whether the website www.xxxxxx.net has the DNS domain transfer vulnerability, you can use the following method: <1> test method in Windows: Run CMD and enter nslookup-qa = ns test object domain name, that is, nslookup-qa = ns xxxxxxx.net (ns is the name server record) enter nslookup to view the DNS settings of the current host, enter the nslookup command environment, and then execute server nameserver, that is, server ns1.play.net.cn, and then execute the ls-d test object domain name, that is, ls-d xxxxxx.net. In this way, you can list all the DNS resolution records of the test object on ns1.xxxx.cn, and then set the server to ns2.xxxx.cn, in the same operation, all DNS resolution records of the test object on ns2.xxxxx.cn are listed. <2> test run with dnsenum in BT5. /dnsenum. the domain name of the pl-enum test object, that is. /dnsenum. pl-enum cxxxxxs.net can obtain all the DNS resolution records of the test object. Run the dnswalk test. /dnswalk test object domain name ., that is. /dnswalk cxxxxx.net. (Note that there is a point after the domain name here, do not miss it), you can get all the DNS resolution records of the test object.