subdomain-takeover

>-

INSTALLATION
npx skills add https://github.com/yaklang/hack-skills --skill subdomain-takeover
Run in your project or agent environment. Adjust flags if your CLI version differs.

SKILL.md

$27

  • sub.target.com has a DNS record (CNAME, NS, A) pointing to an external service
  • The external resource is no longer provisioned (deleted S3 bucket, removed Heroku app, etc.)
  • The attacker can register/claim that exact resource name on the provider
  • The attacker now controls content served under sub.target.com

Impact: cookie theft (parent domain cookies), OAuth token interception, phishing under trusted domain, CORS bypass, CSP bypass via whitelisted subdomain.

2. DETECTION METHODOLOGY

2.1 CNAME Enumeration

1. Collect subdomains (amass, subfinder, assetfinder, crt.sh, SecurityTrails)

2. Resolve DNS for each:

   dig CNAME sub.target.com +short

3. For each CNAME → check if the CNAME target returns NXDOMAIN or a provider error

4. Match error response against fingerprint table (Section 3)

2.2 Key Signals

Signal

Meaning

CNAME → xxx.s3.amazonaws.com + HTTP 404 "NoSuchBucket"

S3 bucket deleted, claimable

CNAME → xxx.herokuapp.com + "No such app"

Heroku app deleted

CNAME → xxx.github.io + 404 "There isn't a GitHub Pages site here"

GitHub Pages unclaimed

NXDOMAIN on the CNAME target domain itself

Target domain expired or never existed

CNAME → provider but HTTP 200 with default parking page

May or may not be claimable — verify

2.3 Automated Tools

Tool

Purpose

subjack

Automated CNAME takeover checking

nuclei -t takeovers/

Nuclei takeover detection templates

can-i-take-over-xyz (GitHub)

Reference for which services are vulnerable

dnsreaper

Multi-provider takeover scanner

subzy

Fast subdomain takeover verification

3. SERVICE PROVIDER FINGERPRINT TABLE

Provider

CNAME Pattern

Fingerprint (HTTP Response)

Claimable?

AWS S3

*.s3.amazonaws.com / *.s3-website-*.amazonaws.com

NoSuchBucket (404)

Yes — create bucket with matching name

GitHub Pages

*.github.io

There isn't a GitHub Pages site here (404)

Yes — create repo + enable Pages

Heroku

*.herokuapp.com / *.herokudns.com

No such app

Yes — create app with matching name

Azure

*.azurewebsites.net / *.cloudapp.azure.com / *.trafficmanager.net

Various default pages, NXDOMAIN

Yes — register matching resource

Shopify

*.myshopify.com

Sorry, this shop is currently unavailable

Yes — create shop, add custom domain

Fastly

CNAME to Fastly edge

Fastly error: unknown domain

Yes — add domain to Fastly service

Pantheon

*.pantheonsite.io

404 Site Not Found with Pantheon branding

Yes

Tumblr

*.tumblr.com (custom domain CNAME)

There's nothing here / Whatever you were looking for doesn't exist

Yes

WordPress.com

CNAME to *.wordpress.com

Do you want to register

Yes — claim domain in WP.com

Zendesk

*.zendesk.com

Help Center Closed / Zendesk branding on error

Yes — create matching subdomain

Unbounce

*.unbouncepages.com

The requested URL was not found

Yes

Ghost

*.ghost.io

404 Not Found Ghost error

Yes

Surge.sh

*.surge.sh

project not found

Yes

Fly.io

CNAME to *.fly.dev

Fly.io default 404

Yes

4. TAKEOVER PROCEDURE — COMMON PROVIDERS

4.1 AWS S3

1. Confirm: curl -s http://sub.target.com → "NoSuchBucket"

2. Extract bucket name from CNAME (e.g., sub.target.com.s3.amazonaws.com → bucket = "sub.target.com")

3. aws s3 mb s3://sub.target.com --region <region>

4. Upload index.html proving control

5. Enable static website hosting

4.2 GitHub Pages

1. Confirm: curl -s https://sub.target.com → "There isn't a GitHub Pages site here"

2. Create GitHub repo (any name)

3. Add CNAME file containing "sub.target.com"

4. Enable GitHub Pages in repo settings

5. Wait for DNS propagation (GitHub verifies CNAME match)

4.3 Heroku

1. Confirm: curl -s http://sub.target.com → "No such app"

2. heroku create <app-name-from-cname>

3. heroku domains:add sub.target.com

4. Deploy proof-of-concept page

5. NS TAKEOVER — HIGH SEVERITY

NS takeover is far more dangerous than CNAME takeover: you control all DNS resolution for the zone.

How It Happens

target.com NS → ns1.expireddomain.com

                 ↓

attacker registers expireddomain.com

                 ↓

attacker now controls ALL DNS for target.com

(A records, MX records, TXT records — everything)

Detection

1. Enumerate NS records: dig NS target.com +short

2. Check each NS domain: whois ns1.example.com → is the domain expired or available?

3. Also check: dig A ns1.example.com → NXDOMAIN/SERVFAIL?

4. Subdelegated zones: check NS for sub.target.com specifically

Impact

  • Full domain takeover (serve any content, intercept email, issue TLS certs via DNS-01)
  • Issue DV certificates from any CA using DNS challenge
  • Modify SPF/DKIM/DMARC → send authenticated email as target

6. MX TAKEOVER — EMAIL INTERCEPTION

When MX records point to deprovisioned mail services:

target.com MX → mail.deadservice.com (service discontinued)

If attacker can claim mail.deadservice.com or the mail tenant:

  • Receive password reset emails
  • Intercept sensitive communications
  • Potentially reset accounts that use email-based auth

Common Scenario

Expired Google Workspace / Microsoft 365 tenant → MX still points to Google/Microsoft → attacker creates new tenant and claims the domain.

7. WILDCARD DNS RISKS

If *.target.com has a wildcard CNAME to a claimable service:

  • Every undefined subdomain is vulnerable
  • anything.target.com can be taken over
  • Massively increases attack surface

Detection: dig A random1234567.target.com — if it resolves, wildcard exists.

8. DETECTION &#x26; EXPLOITATION DECISION TREE

Subdomain discovered (sub.target.com)?

├── Resolve DNS records

│   ├── Has CNAME → external service?

│   │   ├── HTTP response matches known fingerprint? (Section 3)

│   │   │   ├── YES → Attempt claim on provider (Section 4)

│   │   │   │   ├── Claim successful → TAKEOVER CONFIRMED

│   │   │   │   └── Claim blocked (name reserved, region locked) → document, try variations

│   │   │   └── NO → Service active, no takeover

│   │   └── CNAME target NXDOMAIN?

│   │       ├── Target is a registrable domain? → Register it → full control

│   │       └── Target is a subdomain of active provider → check provider claim process

│   │

│   ├── Has NS records → external nameserver?

│   │   ├── NS domain expired/available? → Register → FULL ZONE TAKEOVER

│   │   └── NS domain active → no takeover

│   │

│   ├── Has MX → external mail service?

│   │   ├── Mail service deprovisioned/claimable? → Claim tenant → EMAIL INTERCEPTION

│   │   └── Active mail service → no takeover

│   │

│   └── Has A record → IP address?

│       ├── IP belongs to elastic cloud (AWS EIP, Azure, GCP)?

│       │   ├── IP unassigned? → Claim IP → serve content

│       │   └── IP assigned to another customer → no takeover

│       └── IP belongs to dedicated server → no takeover

│

└── Post-takeover impact assessment

    ├── Shared cookies with parent domain? → Session hijacking

    ├── CORS trusts *.target.com? → Cross-origin data theft

    ├── CSP whitelists *.target.com? → XSS via taken-over subdomain

    ├── OAuth redirect_uri allows sub.target.com? → Token theft

    └── Can issue TLS cert for sub.target.com? → Full MITM

9. DEFENSE &#x26; REMEDIATION

Action

Priority

Remove DNS records when deprovisioning cloud resources

Critical

Monitor CNAME targets for NXDOMAIN responses

High

Use DNS monitoring tools (SecurityTrails, DNSHistory)

High

Claim/reserve resource names before deleting DNS records

High

Audit NS delegations — ensure NS domains are owned and renewed

Critical

Avoid wildcard CNAMEs to third-party services

Medium

Implement Certificate Transparency monitoring

Medium

10. TRICK NOTES — WHAT AI MODELS MISS

  • CNAME ≠ takeover: A CNAME to S3 that returns 403 (bucket exists, private) is NOT vulnerable. Only NoSuchBucket (404) is.
  • Region matters for S3: Bucket names are global, but website endpoints are regional. Try matching the region from the CNAME.
  • GitHub Pages verification: GitHub added domain verification — org-verified domains cannot be claimed by others. Check if target uses this.
  • Edge cases: Some providers (e.g., Cloudfront) require specific distribution configuration, not just domain claiming.
  • Second-order takeover: sub.target.com CNAME → other.target.com CNAME → dead-service.com — the chain must be followed fully.
  • SPF subdomain takeover: If SPF includes include:sub.target.com and you take over sub.target.com, you can modify its SPF TXT record to authorize your mail server → send spoofed email as target.com.
BrowserAct

Let your agent run on any real-world website

Bypass CAPTCHA & anti-bot for free. Start local, scale to cloud.

Explore BrowserAct Skills →

Stop writing automation&scrapers

Install the CLI. Run your first Skill in 30 seconds. Scale when you're ready.

Start free
free · no credit card