Sub-domain takeover vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed or deleted. This allows an attacker to set up a page on the service that was being used and point their page to that sub-domain. For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com. For more information: here
Installation:
# git clone https://github.com/m4ll0k/takeover.git
# cd takeover
# python takeover.py
or:wget -q https://raw.githubusercontent.com/m4ll0k/takeover/master/takeover.py && python takeover.py
- Best Pentesting Tools 2018
- Pentest Tools Website
- Hackrf Tools
- Hack Tools For Windows
- Pentest Tools Download
- Hack Tools Pc
- Kik Hack Tools
- Game Hacking
- Hacker Security Tools
- Hacker Tools Free
- Hacking Tools For Pc
- Hacking Tools Download
- Hacker
- Hacking Tools Online
- Hacking Tools For Games
- Pentest Tools For Mac
- Best Pentesting Tools 2018
- Pentest Tools Download
- Hacking Tools Mac
- Pentest Tools Website Vulnerability
- Hacker Tools Linux
- Hack Tools Online
- Hacker Tools Windows
- Pentest Tools Nmap
- Hacking Tools Mac
- Easy Hack Tools
- Hacking Tools Download
- Hacking Tools Pc
- Pentest Tools Free
- Hacking Tools 2019
- Pentest Tools Kali Linux
- Pentest Tools Subdomain
- Computer Hacker
- Hacker Tools Apk
- Pentest Tools For Mac
- Hack Tools Pc
- Pentest Automation Tools
- Pentest Tools Download
- Nsa Hack Tools Download
- Hacking Tools For Windows
- Hackers Toolbox
- Hack Website Online Tool
- Hack Tools For Games
- Pentest Box Tools Download
- Pentest Tools Android
- Hacking Tools 2019
- Android Hack Tools Github
- Hak5 Tools
- Pentest Tools Android
- Pentest Tools Kali Linux
- Hacker Tools List
- Hack Tools For Games
- Hack Tools Github
- Pentest Tools
- Tools Used For Hacking
- Kik Hack Tools
- Tools 4 Hack
- Blackhat Hacker Tools
No comments:
Post a Comment