Information Security Asked by kirill .z on December 21, 2020
I try to automate a solution to check hosts for Subdomain takeover vuln. First I get all subdomain’s responses, then use the loop to checking keywords:
if grep -l 'Repository not found|The specified bucket does not exist|Github Pages site here|No such app|Sorry, this shop is currently unavailable|404 Blog is not found|is not a registered InCloud YouTrack' "$X"; then
echo "$line" >> ./$1/$foldername/vulnerable.txt
fi
Do I need more specific keywords to catch subdomain takeover vuln inside http response bodies? Or something different at all?
2 Asked on December 10, 2021 by geo-m
0 Asked on December 10, 2021
3 Asked on December 8, 2021 by ddbe
1 Asked on December 8, 2021 by dipesh-sunrait
2 Asked on December 4, 2021 by loopofnegligence
1 Asked on December 4, 2021
5 Asked on December 2, 2021 by askford
6 Asked on December 2, 2021
3 Asked on November 30, 2021 by iancool
3 Asked on November 30, 2021 by brad-stevanus
1 Asked on November 30, 2021 by houtanf
1 Asked on November 28, 2021
10 Asked on November 25, 2021 by lil-bits
1 Asked on November 25, 2021
2 Asked on November 23, 2021
0 Asked on November 23, 2021 by gilad-naaman
Get help from others!
Recent Answers
Recent Questions
© 2023 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP