Skip to main content

Checks if subdomains can be hijacked

Project description

# aws_check_for_domain_hijacking.py

Description:

Script has been written in python 2.7 This script fetches domains from AWS For each domain on AWS, it fetches corresponding subdomains It checks all these subdomains if they are vulnerable to subdomain hijacking Writes output to multiple files

Usage:

  1. Configure aws credentials on your system
  2. run this “sudo python2 aws_check_for_domain_hijacking.py”

Future Prospects:

  1. Script will include a known endpoint check against subdomain list
  2. Script can gatehr more subdomains from publicly accessible resources like shodan, google etc

Project details


Release history Release notifications | RSS feed

This version

0.1

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for aws-check-for-domain-hijacking, version 0.1
Filename, size File type Python version Upload date Hashes
Filename, size aws_check_for_domain_hijacking-0.1-py2-none-any.whl (8.3 kB) File type Wheel Python version py2 Upload date Hashes View

Supported by

Pingdom Pingdom Monitoring Google Google Object Storage and Download Analytics Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page