It is been a long time since I updated my study journey. I am officially a SOC analyst. Except from studying what I will ultilize in real life, I also want to expand my horizon by taking the perspective of attackers. Maybe I would update attack frequetly or maybe not.
Today, I am gonna focus on a non-traceable attack which is responsible for at least 17 large service providers and multiple domains.
The team at Detectify has recently identified a serious attack vector resulting from a widespread DNS misconfiguration. This misconfiguration would allow an attack to take full control over subdomains pointing to providers such as Shoptify, Github, BitBucker, SquareSpace. WHY IS IT DANGEROUS?
Three reasons:
- Sign up a new account and claim the domain. DONE
- The domain onwer would no know! Completely hidden
- ISP is unlikely to fix it.
Here you can verify that.
$ host x.example.com x.example.com has address 192.30.252.153 x.example.com has address 192.30.252.154 $ whois 192.30.252.153 | grep "OrgName" OrgName: GitHub, Inc.
omg, it is literally so easy to take over. Anyone who plays with github.io before knows that you can just custom your domain with this x.example.com
Now we have a high-level overview of what it takes to serve content on a misconfigured subdomain, now it is time to find those vulnerable ones. Scraping and brute forcing
$ git clone https://github.com/aboul3la/Sublist3r.git
$ cd Sublist3r
$ sudo pip install -r requirements.txt
#python sublist3r.py -d hackerone.com
When brute forcing subdomains, the hacker iterates through a wordlist and based on the response can determine whether or not the host is valid. It is always helpful to check wildcard.
$ host randomifje8z193hf8jafvh7g4q79gh274.example.com
Always look for hosts containing jira
or git
. I would not go in deep about attacking. There are tons of resources out there teaching you how to accomplish that.