<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Subdomain takeover! in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Subdomain-takeover/m-p/33453#M2436</link>
    <description>&lt;P&gt;If you didn't know that taking over subdomains was a thing then check this research from &lt;A href="https://vullnerability.com/blog/microsoft-subdomain-account-takeover" target="_blank" rel="noopener"&gt;vulnerability.com&lt;/A&gt; - they showed a PoC that more than 670 Microsoft subdomians were susceptible to take over.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How can an attacker exploit this vulnerability?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Actually, attacker can exploit this vulnerability as “Stored XSS”.&lt;/LI&gt;&lt;LI&gt;Also attacker can clone the main website’s template and steal users credentials like passwords, credit card informations or phone numbers etc.&lt;/LI&gt;&lt;LI&gt;Attacker can bypass CSP, CORS and referrer-check based protections and exploit some vulnerabilities like XSS, CSRF, Clickjacking and steal users cookies or takeover user accounts.&lt;/LI&gt;&lt;LI&gt;Attacker can deface the websites which is embedding sources from vulnerable subdomains. Or run JavaScript commands remotely.&lt;/LI&gt;&lt;LI&gt;Attacker can manipulate the corporational and critical endpoints like payment APIs.&lt;/LI&gt;&lt;LI&gt;Attacker can force visitors to download malware.&lt;/LI&gt;&lt;LI&gt;Attacker can hack users devices remotely and spy them if this subdomain is using for autoupdates.&lt;/LI&gt;&lt;LI&gt;Attacker can make illegal requests by visitors browser.&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Sun, 08 Mar 2020 02:03:41 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2020-03-08T02:03:41Z</dc:date>
    <item>
      <title>Subdomain takeover!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Subdomain-takeover/m-p/33453#M2436</link>
      <description>&lt;P&gt;If you didn't know that taking over subdomains was a thing then check this research from &lt;A href="https://vullnerability.com/blog/microsoft-subdomain-account-takeover" target="_blank" rel="noopener"&gt;vulnerability.com&lt;/A&gt; - they showed a PoC that more than 670 Microsoft subdomians were susceptible to take over.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How can an attacker exploit this vulnerability?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Actually, attacker can exploit this vulnerability as “Stored XSS”.&lt;/LI&gt;&lt;LI&gt;Also attacker can clone the main website’s template and steal users credentials like passwords, credit card informations or phone numbers etc.&lt;/LI&gt;&lt;LI&gt;Attacker can bypass CSP, CORS and referrer-check based protections and exploit some vulnerabilities like XSS, CSRF, Clickjacking and steal users cookies or takeover user accounts.&lt;/LI&gt;&lt;LI&gt;Attacker can deface the websites which is embedding sources from vulnerable subdomains. Or run JavaScript commands remotely.&lt;/LI&gt;&lt;LI&gt;Attacker can manipulate the corporational and critical endpoints like payment APIs.&lt;/LI&gt;&lt;LI&gt;Attacker can force visitors to download malware.&lt;/LI&gt;&lt;LI&gt;Attacker can hack users devices remotely and spy them if this subdomain is using for autoupdates.&lt;/LI&gt;&lt;LI&gt;Attacker can make illegal requests by visitors browser.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Sun, 08 Mar 2020 02:03:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Subdomain-takeover/m-p/33453#M2436</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2020-03-08T02:03:41Z</dc:date>
    </item>
  </channel>
</rss>

