1. Microsoft Corporation
"nslookup ls" documentation. This official vendor documentation details the ls subcommand for nslookup. It specifies the syntax ls [option] and describes the -d option as "Lists all records for the domain
" which is the function that initiates a zone transfer request.
Source: Microsoft Learn
nslookup ls command documentation. (Specific page: The official documentation page for the nslookup ls subcommand on the Microsoft Learn website).
2. University of Washington
CSE 484: Computer Security
Lab 1. This university courseware provides practical exercises on network reconnaissance. The lab instructions for DNS enumeration explicitly guide students to use nslookup
set the server
and then use the ls -d command to attempt a zone transfer and list all hostnames.
Source: University of Washington
Paul G. Allen School of Computer Science & Engineering
CSE 484
Lab 1: "Network Reconnaissance & Security Auditing
" DNS Enumeration section.
3. Purdue University
CS 42600: Computer Security
Lecture Notes. Course materials on network security often cover DNS vulnerabilities. Lecture notes describe DNS zone transfers as a method for reconnaissance and identify nslookup with the ls -d command as a primary tool for attempting this on Windows systems.
Source: Purdue University
Department of Computer Science
CS 42600
Lecture notes on "Network Security
" DNS Security section.