

How to avoid subdomain takeover in Azure environments
source link: https://www.csoonline.com/article/3601007/how-to-avoid-subdomain-takeover-in-azure-environments.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

How to avoid subdomain takeover in Azure environments
Active but unused subdomains in Microsoft Azure give attackers the opportunity to use them for malicious purposes. Here's how to identify and delete vulnerable subdomains before attackers do.
Have you set up a domain and pointed to a cloud resource and then deleted the site? Have you left behind the CNAME in your domain name services settings? Many admins have, and attackers know it. These lapses allow attackers to create a site in your subdomain records and take over these sites. Subdomain takeovers are too common especially in large organizations that create and delete many resources. CNAME records in particular are open to takeovers. Malicious actors often use these sites to redirect traffic and activity to various other sites. Even Microsoft isn’t immune to the problem.
Domain Name Service (DNS) is an often-misunderstood part of network infrastructure. Too often misconfiguration of DNS can lead to massive issues in your network. It can make it look like your website has been hacked when merely the records have been changed. It might also expose your assets to being used in attacks.
How attackers exploit subdomains
As Microsoft notes, exposing yourself to subdomain takeover starts when you set up and provision an Azure resource. Let’s say the name of the Azure resource is app-on-azure001.azurewebsites.net. You then assign a CNAME record in your actual DNS zone with a subdomain that routes the traffic to the Azure resource. Rather than sending users to app-on-azure001.azurewebsites.net, you can send them to easierurl.domain.com. Later, you determine that you do not need the subdomain. You deprovision or delete the website. At this time, you should remove the subdomain.yourdomain.com from the domain name services zone. If the CNAME is still in place, it’s advertising that it’s an active domain but it’s not routing traffic through an active Azure resource. This is what is deemed as a “dangling DNS record”.
Attackers use various tools and scripts to search for and find these subdomains. A basic DNS lookup easily tells an attacker of CNAME records that are now non-routing. The attacker then provisions an Azure resource with the same name you assigned to your now missing Azure resource. Their attack website is now called app-on-azure001.azurewebsites.net and your subdomain.domain.com is now routing their site through your domain name resources. Attacks will include loss of control over your content and harvesting of cookie and visitor information to the attacker’s site.
Recommend
-
76
subjack Subjack is a Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that are able to be hijacked. With Go's speed and efficiency, this tool really stands out when it comes to mas...
-
101
Anubis d8888 888 d8b d88888 888 Y8P d88P888 888 d88P 888 88888b. 888 888 88888b. 888 .d8888b d88P 888 888 "88b 888 888 888 "88...
-
91
GitHub is where people build software. More than 28 million people use GitHub to discover, fork, and contribute to over 80 million projects.
-
243
README.md SubOver Subover is a Hostile Subdomain Takeover tool originally written in python but rewritten from scratch in Golang. Since it's redesign, it has been aimed with speed and efficienc...
-
69
Writing tests for a multi-tenant ,
-
170
README.md Subzy Subdomain takeover tool which works based on matching response fingerprings from
-
37
The Tiles service Microsoft introduced with Windows 8 has never been particularly successful. Microsoft has disabled a web service for the system but forgot to delete nameserver entries. This made the host vulnerable for...
-
10
Subdomain Takeover: Ignore This Vulnerability at Your PerilThe Domain Name System (DNS) is often described as the address book of the Internet; A and AAAA records map a human-frie...
-
8
DNSTake A fast tool to check missing hosted DNS zones that can lead to subdomain takeover. What is a DNS takeover? DNS takeover vulnerabilities occur when a subdomain (subdomain.example.com) or domain has its au...
-
6
Debunked: Is a subdomain takeover ‘game over’ for companies? October 29, 2021 When was the last time you checked DNS c...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK