TakeOver : Sub-Domain TakeOver Vulnerability Scanner

Sub-domain TakeOver vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed or deleted.

This allows an attacker to set up a page on the service that was being used and point their page to that sub-domain. For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com.

Also Read – OpenSK : Open-Source Implementation For Security Keys

Supported Services

‘AWS/S3’
‘BitBucket’
‘CloudFront’
‘Github’
‘Shopify’
‘Desk’
‘Fastly’
‘FeedPress’
‘Ghost’
‘Heroku’
‘Pantheon’
‘Tumbler’
‘WordPress’
‘Desk’
‘ZenDesk’
‘TeamWork’
‘Helpjuice’
‘Helpscout’
‘S3Bucket’
‘Cargo’
‘StatuPage’
‘Uservoice’
‘Surge’
‘Intercom’
‘Webflow’
‘Kajabi’
‘Thinkific’
‘Tave’
‘Wishpond’
‘Aftership’
‘Aha’
‘Tictail’
‘Brightcove’
‘Bigcartel’
‘ActiveCampaign’
‘Campaignmonitor’
‘Acquia’
‘Proposify’
‘Simplebooklet’
‘GetResponse’
‘Vend’
‘Jetbrains’
‘Unbounce’
‘Tictail’
‘Smartling’
‘Pingdom’
‘Tilda’
‘Surveygizmo’
‘Mashery’

Installation

git clone https://github.com/m4ll0k/takeover.git
cd takeover
python3 setup.py install

or:

wget -q https://raw.githubusercontent.com/m4ll0k/takeover/master/takeover.py && python3 takeover.py

Usage

$ python3 takeover.py -d www.domain.com -v
$ python3 takeover.py -d www.domain.com -v -t 30
$ python3 takeover.py -d www.domain.com -p http://127.0.0.1:8080 -v
$ python3 takeover.py -d www.domain.com -o or -v
$ python3 takeover.py -l uber-sub-domains.txt -o output.txt -p http://xxx.xxx.xxx.xxx:8080 -v
$ python3 takeover.py -d uber-sub-domains.txt -o output.txt -T 3 -v

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

13 hours ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

4 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

4 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

4 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

6 days ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

1 week ago