Главная
Study mode:
on
1
Introduction
2
Agenda
3
Subdomain Takeover
4
Facebook Takeover
5
Reports
6
Promaster
7
Tools
8
What are they looking for
9
Matthew Bryant
10
No Error
11
orphaned EC2 IP
12
DNS Flow
13
Competition
14
Email snooping
15
MX records
16
Final notes
Description:
Explore domain hijacking techniques in this 36-minute conference talk from AppSec EU 2017. Delve into both disclosed and undisclosed methods for taking control of domains, nameservers, and DNS providers. Learn about vulnerabilities in cloud services like AWS, Heroku, and GitHub, and discover why existing tools fail to detect certain hijacking scenarios. Gain insights into specific techniques, including subdomain takeover, Facebook takeover, orphaned EC2 IP addresses, and email snooping through MX records. Understand the limitations of current vulnerability detection tools and the importance of comprehensive domain security measures.

DNS Hijacking Using Cloud Providers: No Verification Needed - AppSec EU 2017

OWASP Foundation
Add to list