## page was copied from DnsTemplate ##master-page:HelpTemplate <> <> {{{ Don’t get confused between domain takeover and subdomain takeover. They are two separate vulnerabilities. }}} Exploitation Scenario 1: Chaining with Deep link Exploitation Scenario 2: Accessing Sensitive Information and Email Exploitation Scenario 3: Phishing / Domain Abuse Exploitation Scenario 4: Extracting Sensitive Information Using LOGS Exploitation Scenario 5: Login using SSO Conclusion {{{ There is no specific methodology to check for Domain Takeover, but here are a few places where a pentester must look to discover potential domains: Organization/Developers’ Github / Gitlab / Bitbucket public accounts URLs in the application (current/historic) Javascript files (regular/obfuscated) Application Request/Response Application 3rd party Requests Once you have a list of possible domains, search them for availability using bulk domain search tools such as https://www.namebright.com/BulkSearch. }}} A successful domain takeover impacts organizations financially, technically as well as their reputation. {{{ The best and easiest way to protect the organization from domain takeover is to set up monitoring for domain expiry and renew old domains even if they are not in use. Another complex method is to perform regular code/configuration review and change all the instances where the expired domain and its subdomain are used, and delete all the third-party accounts registered using the expired domain. }}} ---- CategoryDns CategoryWatch CategoryTemplate