DNSTake: DNS deficit check tool that leads to subdomain retrieval

DNS takeover vulnerabilities occur when a subdomain (subdomain.example.com) or the page itself has designated a provider as a valid nameserver (eg AWS Route 53, Akamai, Microsoft Azure, etc.). ) but the hosted zone has been removed or deleted completely.

Consequently, on making a request for DNS records, the server responds with SERVFAIL. This allows a hacker to create a hosted zone that is missing from the service used and thus control all DNS records for that (sub)domain.

131214165 06cb74c3 2754 48a6 a13d bfcf592e646a



1) The simplest method is to unzip the file to download from here and then run it.

2) There is also the manual method that we install from the source:

▶ go install github.com/pwnesia//cmd/dnstake@latest


▶ git clone https://github.com/pwnesia/dnstake ▶ cd dnstake / cmd / dnstake ▶ go build. ▶ (sudo) mv dnstake / usr / local / bin


        Set the concurrency level (default: 25) -s, --silent Suppress errors and/or clean output -h, --help                   its help

  dnstake -t (sub.)domain.tld
  dnstake -t hosts.txt
  cat hosts.txt | dnstake
   -silent -d domain.tld | dnstake

You can download the program from here.

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive of new by email.

DNSTake, dns, namesaerver, domain, subdomain

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).