Skip to main content

Some helper subdomain_takeover_tools to validate subdomain takeovers

Project description

Subdomain Takeover Tools

Latest Package version Build status Supported versions

A set of tools to validate the initial outcome of subtake.

Installation

  1. Install using pip:

    pip install subdomain_takeover_tools

    for windows:

    py -m pip install subdomain_takeover_tools

    Alternatively, you can download or clone this repo and call pip install -e ..

Confirming takeovers

All scripts support the following two parameters:

  • --strict: only report as vulnerable if the issue is not also applicable on hostname.tld and www.hostname.tld.
  • --inverse: do inverse reporting, so report all subdomains that are not vulnerable

Some scripts require a config file to be present, the location is .subdomain_takeover_tools.ini, an example of the file can be found below:

[azure]
subscription_id=44713cf2-8656-11ec-a8a3-0242ac120002
[github]
username=martinvw
access_token=44713cf2-8656-11ec-a8a3-0242ac120002
repo=44713cf2-8656-11ec-a8a3-0242ac120002
[fastly]
api_token=44713cf2-8656-11ec-a8a3-0242ac120002
service=44713cf2-8656-11ec-a8a3-0242ac120002
version=3

Confirming S3

Subtake has some false positives on Google Cloud buckets as S3 buckets, also some access denied's end up in the results.

The script confirm-s3.py will make sure that the bucket is actually vulnerable.

grep "\[s3 bucket: " subtake-output.txt | confirm_s3

Confirming ELB

Some patterns of elb are vulnerable while others are not, to filter them we can use our script:

grep "\[elasticbeanstalk: " subtake-output.txt | confirm_elb

Note: the parameter --strict is accepted here but will not lead to expected results.

Please note that some regions are not enabled by default, when you receive the following error:

botocore.exceptions.ClientError: An error occurred (InvalidClientTokenId) when calling the CheckDNSAvailability operation: The security token included in the request is invalid.

This could mean you have not yet enabled these, opt-in, regions, see https://console.aws.amazon.com/billing/home?#/account

Confirming Shopify

It seems that all current shopify examples are vulnerable, the following check just validates the DNS.

grep "\[shopify: " subtake-output.txt | confirm_shopify

Filtering Pantheon

Please note that for pantheon this repo currently only provides an initial check to eliminate some FALSE positives.

grep "\[pantheon: " subtake-output.txt | confirm_pantheon

Filtering Cargo Collective

Please note that for Cargo Collective this repo currently only provides an initial check to eliminate some FALSE positives.

grep "\[cargo: " subtake-output.txt | confirm_cargo

Separate tools

Extracting domain names

As part of my process I want to know the domains involved in my findings.

Example usage:

cut -f3 < subtake-output.txt | extract_domain_names | sort -u > involved.domains

Note that extract_domain_names also support groups, such as domain.(co.id|in.th|ph|vn), this will be expanded automatically.

Resolving from the authoritative DNS authority

For validation of the results I want to validate whether the DNS record is still accurate.

To do this we fetch the authoritative result's step by step from the authoritative DNS servers.

authoritative_resolve "github.com" "martinvw.nl"

Exporting and enriching

The subtake_enrich_and_export will split the existing output and add some additional columms:

  • has a wildcard
  • domain name
  • tld
  • still vulnerable
  • authoritative results
subtake_enrich_and_export < subtakee-output.txt

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

subdomain_takeover_tools-0.38.0.tar.gz (14.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

subdomain_takeover_tools-0.38.0-py3-none-any.whl (20.6 kB view details)

Uploaded Python 3

File details

Details for the file subdomain_takeover_tools-0.38.0.tar.gz.

File metadata

File hashes

Hashes for subdomain_takeover_tools-0.38.0.tar.gz
Algorithm Hash digest
SHA256 85091db491d5cbd7fe5e5ce83d9904cf7a271fc349aaabdeafa9633cce1b99fb
MD5 c5efe923a0d55a2befd0c6d41429c9ae
BLAKE2b-256 57dc163fe26f3fc6294e8a7158acfaeb2eda1364b4bbeda04418bfd00e392829

See more details on using hashes here.

File details

Details for the file subdomain_takeover_tools-0.38.0-py3-none-any.whl.

File metadata

File hashes

Hashes for subdomain_takeover_tools-0.38.0-py3-none-any.whl
Algorithm Hash digest
SHA256 141e827f1bc081f14497ca10481cb95c2067fc03a409f707ffc3c37446e22621
MD5 4d6063c32ebe38bf0664403c8c5091ba
BLAKE2b-256 1a9d44504c333c13e3a604f0cd1e3f2af05f01d6135ff0041d6e29f3e29d6aee

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page