Sub-domain takeover vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed or deleted. This allows an attacker to set up a page on the service that was being used and point their page to that sub-domain. For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com. For more information: here
Installation:
# git clone https://github.com/m4ll0k/takeover.git
# cd takeover
# python takeover.py
or:wget -q https://raw.githubusercontent.com/m4ll0k/takeover/master/takeover.py && python takeover.py
- Hacking Online Games
- Hacker Software
- Hacker Wifi Password
- Hacking With Raspberry Pi
- Hacking Google
- Pentest With Kali
- Hacking Page
- Pentest Vpn
- Hacking With Raspberry Pi
- Hacking Hardware
- Pentesting
- Pentest Reporting Tool
- Hacking Health
- Hacking With Linux
- Pentest Checklist
- Hacking Language
- Pentest+ Vs Ceh
- Basic Pentest 1 Walkthrough
- Hacker Website
- Pentest Dns Server
No hay comentarios:
Publicar un comentario
Nota: solo los miembros de este blog pueden publicar comentarios.