Sub-domain takeover vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed or deleted. This allows an attacker to set up a page on the service that was being used and point their page to that sub-domain. For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com. For more information: here
Installation:
# git clone https://github.com/m4ll0k/takeover.git
# cd takeover
# python takeover.py
or:wget -q https://raw.githubusercontent.com/m4ll0k/takeover/master/takeover.py && python takeover.py
Related links
- Best Pentesting Tools 2018
- Tools 4 Hack
- Pentest Tools Bluekeep
- Pentest Tools Github
- Hacker Tools Online
- What Are Hacking Tools
- Hacking Apps
- How To Make Hacking Tools
- Hacking Tools Name
- Pentest Tools Free
- Pentest Tools For Windows
- Physical Pentest Tools
- Hacking Tools Online
- Hacking Apps
- Hack Tools Mac
- Hacking Tools And Software
- Pentest Tools Bluekeep
- Pentest Tools Linux
- Pentest Tools Windows
- Hack App
- Pentest Tools Free
- Hack Tools 2019
- Pentest Automation Tools
- Hacker Tools List
没有评论:
发表评论