Skip to main content

Checks if subdomains can be hijacked

Project description

# aws_check_for_domain_hijacking.py

Description:

Script has been written in python 2.7 This script fetches domains from AWS For each domain on AWS, it fetches corresponding subdomains It checks all these subdomains if they are vulnerable to subdomain hijacking Writes output to multiple files

Usage:

  1. Configure aws credentials on your system

  2. run this “sudo python2 aws_check_for_domain_hijacking.py”

Future Prospects:

  1. Script will include a known endpoint check against subdomain list

  2. Script can gatehr more subdomains from publicly accessible resources like shodan, google etc

Project details


Release history Release notifications | RSS feed

This version

0.1

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

File details

Details for the file aws_check_for_domain_hijacking-0.1-py2-none-any.whl.

File metadata

File hashes

Hashes for aws_check_for_domain_hijacking-0.1-py2-none-any.whl
Algorithm Hash digest
SHA256 3045f280db45b87fbf08fffff5a5e400f38e156994cffddc2f80f1f44eaa17c4
MD5 0bb6c0b8f8cdfb17a3b7167ac4f5e444
BLAKE2b-256 9ca7817231358f5b21cae939067bca63214a6d23596c3becef9240c84517dcc4

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page