Sub-domain TakeOver vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed or deleted.
This allows an attacker to set up a page on the service that was being used and point their page to that sub-domain. For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com.
Also Read – OpenSK : Open-Source Implementation For Security Keys
Supported Services
‘AWS/S3’
‘BitBucket’
‘CloudFront’
‘Github’
‘Shopify’
‘Desk’
‘Fastly’
‘FeedPress’
‘Ghost’
‘Heroku’
‘Pantheon’
‘Tumbler’
‘WordPress’
‘Desk’
‘ZenDesk’
‘TeamWork’
‘Helpjuice’
‘Helpscout’
‘S3Bucket’
‘Cargo’
‘StatuPage’
‘Uservoice’
‘Surge’
‘Intercom’
‘Webflow’
‘Kajabi’
‘Thinkific’
‘Tave’
‘Wishpond’
‘Aftership’
‘Aha’
‘Tictail’
‘Brightcove’
‘Bigcartel’
‘ActiveCampaign’
‘Campaignmonitor’
‘Acquia’
‘Proposify’
‘Simplebooklet’
‘GetResponse’
‘Vend’
‘Jetbrains’
‘Unbounce’
‘Tictail’
‘Smartling’
‘Pingdom’
‘Tilda’
‘Surveygizmo’
‘Mashery’
Installation
git clone https://github.com/m4ll0k/takeover.git
cd takeover
python3 setup.py install
or:
wget -q https://raw.githubusercontent.com/m4ll0k/takeover/master/takeover.py && python3 takeover.py
Usage
$ python3 takeover.py -d www.domain.com -v
$ python3 takeover.py -d www.domain.com -v -t 30
$ python3 takeover.py -d www.domain.com -p http://127.0.0.1:8080 -v
$ python3 takeover.py -d www.domain.com -o or -v
$ python3 takeover.py -l uber-sub-domains.txt -o output.txt -p http://xxx.xxx.xxx.xxx:8080 -v
$ python3 takeover.py -d uber-sub-domains.txt -o output.txt -T 3 -v
Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…