DNSTake: DNS deficit check tool that leads to subdomain retrieval

DNS takeover vulnerabilities occur when a subdomain (subdomain.example.com) or the page itself has designated a provider as a valid nameserver (eg AWS Route 53, Akamai, Microsoft Azure, etc.). ) but the hosted zone has been removed or deleted completely.

Consequently, when requesting DNS records, the server responds with a SERVFAIL error. This allows a hacker to create a hosted zone that is missing from the that was used and thus check all DNS records for that (sub)domain.

131214165 06cb74c3 2754 48a6 a13d bfcf592e646a

 

Installation

1) The simplest method is to unzip the file to download from here and then run it.

2) There is also the manual method that we install from the source:

▶ Go  github.com/pwnesia/dnstake/cmd/dnstake@latest

ή

▶ git clone https://github.com/pwnesia/dnstake ▶ cd dnstake / cmd / dnstake ▶ go build. ▶ (sudo) mv dnstake / usr / local / bin

Use

        Set the concurrency level (: 25) -s, --silent Suppress errors and/or clean output -h, --help                   its help Examples: dnstake -t (sub.)domain.tld dnstake -t hosts.txt cat hosts.txt | dnstake subfinder -silent -d domain.tld | dnstake

You can download it from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.
DNSTake, dns, namesaerver, domain, subdomain

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).