Subs or Top level Domain
CNAME Record 0r A Record —> Points to third party services
Check:
for take-overs is to query a list of domains and check for any that are either:
1. attached to a third party domain or destination via the use of a cname record
2.return a 404 not found error.
example : domain that resolved to a CloudFront domain which gave the following error: "Error the request could not be satisfied, generated by CloudFront (CloudFront)"Technical Detail
This attack vector utilizes DNS entries pointing to Service Providers where the pointed subdomain is currently not in use
Service providers :
Heroku, Github, Bitbucket, Squarespace, Shopify, Desk, Teamwork, Unbounce, Helpjuice, HelpScout, Pingdom, Tictail, Campaign Monitor, CargoCollective, [StatusPage.io](http://statuspage.io/) and Tumblr.Impact
Attacker can now build a complete clone of the real site, add a login form, redirect the user, steal credentials (e.g. admin accounts), cookies and/or completely destroy business credibility for your company.
Another senario:
1. A Domain Owner points their * (wildcard) DNS-entry to e.g. Heroku.
2. They forget to add the wildcard-entry to their Heroku-app.
3. Attacker can now claim any subdomain they want from the Domain Owner.
4. A Domain Owner will be unaware of the subdomain being exploited.In the not so rare case, the attacker can also “inherit” the Domain Owner’s Wildcard SSL used inside the Service Provider.
Exploit
Claim CloudFront:
Remediation
Reference
Zsec Blog: https://blog.zsec.uk/subdomainhijack/
POC
Analysis
** Pardon for any spelling or grammar mistake **
Author:
Twitter Id: @Zero0x00
Last updated