SlideShare a Scribd company logo
Hostile Subdomain Takeover
HST in a minute
● People register subdomains & point it to 3rd
 party apps/websites
● Github pages, Heroku, S3, AWS are some examples
● Sometimes they migrate or stop using the feature and forget to 
remove the name pointer
● An entry exists at nameserver pointing to a page
● Create an account and claim that page.
● Done!
#OkThxBye
Interactive Session
Lets talk DNS & NameServers
DEMO
Defense
● Check your DNS­configuration for 
subdomains pointing to services not in use.
● Keep your DNS­entries constantly vetted 
and restricted.
Thanks To
● Prakhar Prasad (@prakharprasad)
● Detectify 
https://labs.detectify.com/2014/10/21/hostile­
subdomain­takeover­using­
herokugithubdesk­more/

More Related Content

PDF
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
PPT
How To Detect Xss
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PDF
Securing dns records from subdomain takeover
PDF
Effective Cyber Security Report Writing
PPTX
Data sniffing over Air Gap
PPTX
UDP Hunter
PDF
Demystifying Container Escapes
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
How To Detect Xss
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Securing dns records from subdomain takeover
Effective Cyber Security Report Writing
Data sniffing over Air Gap
UDP Hunter
Demystifying Container Escapes

More from OWASP Delhi (20)

PPTX
Automating WAF using Terraform
PPTX
Actionable Threat Intelligence
PDF
Threat hunting 101 by Sandeep Singh
PPTX
Owasp top 10 vulnerabilities
PPTX
Recon with Nmap
PPTX
Securing AWS environments by Ankit Giri
PDF
DMARC Overview
PDF
Cloud assessments by :- Aakash Goel
PDF
Pentesting Rest API's by :- Gaurang Bhatnagar
ODP
Wireless security beyond password cracking by Mohit Ranjan
PDF
IETF's Role and Mandate in Internet Governance by Mohit Batra
PDF
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
PPTX
ICS Security 101 by Sandeep Singh
PDF
DFIR using Docker Containers by Deep Shankar Yadav
PPTX
RAT - Kill or Get Killed! by Karan Bansal
PPTX
IoT Security Risks and Challenges
PPTX
Hacking & Securing of iOS Apps by Saurabh Mishra
PPTX
Quantum Computing by Rajeev Chauhan
PPT
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
PDF
Network discovery - Inside out by Aakash Goel
Automating WAF using Terraform
Actionable Threat Intelligence
Threat hunting 101 by Sandeep Singh
Owasp top 10 vulnerabilities
Recon with Nmap
Securing AWS environments by Ankit Giri
DMARC Overview
Cloud assessments by :- Aakash Goel
Pentesting Rest API's by :- Gaurang Bhatnagar
Wireless security beyond password cracking by Mohit Ranjan
IETF's Role and Mandate in Internet Governance by Mohit Batra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
ICS Security 101 by Sandeep Singh
DFIR using Docker Containers by Deep Shankar Yadav
RAT - Kill or Get Killed! by Karan Bansal
IoT Security Risks and Challenges
Hacking & Securing of iOS Apps by Saurabh Mishra
Quantum Computing by Rajeev Chauhan
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Network discovery - Inside out by Aakash Goel
Ad

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
Teaching material agriculture food technology
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
sap open course for s4hana steps from ECC to s4
Reach Out and Touch Someone: Haptics and Empathic Computing
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Teaching material agriculture food technology
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
Ad