Member-only story

Day 16 of 30 Days — 30 Vulnerabilities | Subdomain Takeover

It4chis3c
5 min readAug 21, 2024

--

Day 16: Mastering Subdomain Takeover Vulnerability — Essential Tricks & Techniques Based on Personal Experience and Valuable POCs

[ In collaboration with Abhijeet Kumawat ( his LinkedIn | Twitter)]

Hey geeks, it4chis3c (Twitter) here with one more write-up on tricks & tips to detect Subdomain Takeover Vulnerability.

1. Brief Description

  • Definition: Subdomain takeover occurs when an attacker takes control of an organization’s subdomain by exploiting misconfigured DNS settings, particularly when the subdomain points to a non-existent or unclaimed resource on a third-party hosting service.
  • Impact: Allows attackers to serve malicious content, steal cookies, or conduct phishing attacks under the guise of the legitimate domain.

2. Where to Detect

  • Subdomains with CNAME Records: Focus on subdomains with CNAME records pointing to third-party services (e.g., GitHub Pages, AWS S3, Heroku).
  • DNS Zone Files: Monitor DNS zone files for subdomains that may point to inactive or unclaimed services.
  • Expired Services: Subdomains that previously pointed to services that are no longer in use or have been removed by the organization.

--

--

It4chis3c
It4chis3c

Written by It4chis3c

Security Researcher | Bug Bounties | Tips & Tricks

No responses yet