Skip to content

Latest commit

 

History

History
47 lines (31 loc) · 1.69 KB

Easy_Methods.md

File metadata and controls

47 lines (31 loc) · 1.69 KB

1. Method by @Virdoex_hunter

Easy Subdomain Takeover Method

Step:

1:Grab all subdomains of target. i.e, subfinder -d flaws.cloud | tee -a domains.txt
			
2:Run this one liner
			
3:cat domains.txt | while read domain;do dig  $domain;done | tee -a digs.txt
			
4::Grab all the CNAME Entries i.e, cat digs.txt | grep CNAME
			
5:Find a domain that is pointed to third party domain like sub.exampple.com CNAME x.aws.com
			
6:Check wheather the main subdomain is down
			
7:Go to host provider where the domain is pointed to and register that domain if you registered congrats you have takeover the subdomain.
			

2. Method by @WhoIs1nVok3r

Step-1:- First of all collect all subdomain of the target using assetfinder,subfinder,chaos(needs API key).

Step-2:- Next sort out duplicate URLs using -- cat unresolved | sort -u | tee -a resolved

Step-3:- Pass it to subzy,subjack or other subdomain-takeover tool -- using subzy tool  --  subzy -targets resolved , or use subjack

Step-4:- We can also use nuclei templates but we need to first use httpx -- cat resolved | httpx | tee -a hosts

Step-5:- Next use nuclei-templates -- cat hosts | nuclei -t nuclei-templates/vulnerabilites -o nuclei.txt -v 

Tools Used:-

https://github.com/projectdiscovery/nuclei
https://github.com/projectdiscovery/subfinder
https://github.com/projectdiscovery/httpx
https://github.com/projectdiscovery/nuclei-templates
https://github.com/projectdiscovery/chaos-client
https://github.com/haccer/subjack
https://github.com/LukaSikic/subzy

Author