Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 2, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 2, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 2, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 2, 2025

      How Red Hat just quietly, radically transformed enterprise server Linux

      June 2, 2025

      OpenAI wants ChatGPT to be your ‘super assistant’ – what that means

      June 2, 2025

      The best Linux VPNs of 2025: Expert tested and reviewed

      June 2, 2025

      One of my favorite gaming PCs is 60% off right now

      June 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      `document.currentScript` is more useful than I thought.

      June 2, 2025
      Recent

      `document.currentScript` is more useful than I thought.

      June 2, 2025

      Adobe Sensei and GenAI in Practice for Enterprise CMS

      June 2, 2025

      Over The Air Updates for React Native Apps

      June 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025
      Recent

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025

      Microsoft says Copilot can use location to change Outlook’s UI on Android

      June 2, 2025

      TempoMail — Command Line Temporary Email in Linux

      June 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»What is Subdomain Takeover Vulnerability in Easy Language

    What is Subdomain Takeover Vulnerability in Easy Language

    January 26, 2025

    Subdomain takeover vulnerability is not new in cybersecurity space but it’s pretty much effective today’s time also. In the bug bounty field subdomain takeover vulnerability reports are rapidly growing.

    subdomain takeover vunerability

    The basic premise of a subdomain takeover is a host that points to a particular service not currently in use, which an adversary can use to serve content on the vulnerable subdomain by setting up an account on the third-party service. As an ethical hacker and a security analyst, We deal with this type of issue on a regularly.

    What is Subdomain Takeover Vulnerability

    For beginners subdomain takeover idea may not clear, so we are explaining it in very easy way.

    Suppose our target is example.com and they are running a bug bounty program, because we just can’t go and takeover any other’s subdomain because it will be unethical. So we assume that example.com is running bug bounty program and we find a subdomain named subdomain.example.com, this subdomain shows 404 error.

    subdomain 404 error

    Now this subdomain is pointing to some another services. For an example we assume that this subdomain is pointing to GitHub Pages.

    How do we know that it is pointing to GitHub Pages? Well, here we need to look on it’s DNS settings (in this case we can see GitHub clearly, but may be in other cases we need to check DNS).

    We can run following command to check the host of subdomains:

    host subdomain.example.com

    Here we will get the IP address of the subdomain then we can check from where this IP address belongs by using following command:

    Hostinger
    whois <IP Address>|grep "OrgName"

    Most of cybersecurity experts starts senses start tingling at this point. This 404 subdomain page indicates that no content is being served under the top-level directory and that we should attempt to add this subdomain to oue personal GitHub repository.

    subdomain takeover on GitHub Pages

    Broken Link Hijacking

    There are another way to takeover subdomains. It is referred as ‘Broken Link hijacking‘. These are vulnerable subdomains which do not necessarily belong to the target but they are used to serve content on the target’s website. This means that a resource is being imported on the target page, for an example, via a little fault in JavaScript code and the cybersecurity expert can claim the subdomain from which the resource is being imported.

    Hijacking a host that is used somewhere on the page can ultimately lead to stored cross-site scripting (XSS), since the adversary can load arbitrary client-side code on the target page. The reason why we wanted to list this issue in this article, is to highlight the fact that, as a cybersecurity expert, We don’t want to only restrict ourselves to subdomains on our target host. We can easily expand our scope by inspecting source code and mapping out all the hosts that the target relies on.

    broken link hijack

    These are the basic principal of “Subdomain Takeover Vulnerability“. This is very important for Bug-Bounty hunters. We tried to explain this in very easy language.

    Not only GitHub Pages we can do it if the 404 subdomain is pointed to AWS, Heroku, Readme and other services. We got a very informative article about subdomain takeover.

    Love our article? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group & Whatsapp Channel. We are striving to build a community for  Linux and cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNetflix Introduces Go-with-the-Flow: Motion-Controllable Video Diffusion Models Using Real-Time Warped Noise
    Next Article DistroWatch Weekly, Issue 1106

    Related Posts

    Operating Systems

    You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

    June 2, 2025
    Operating Systems

    Microsoft says Copilot can use location to change Outlook’s UI on Android

    June 2, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    What is Avowed Install Size For Xbox & PC

    Operating Systems

    Zyphra Introduces Zyda Dataset: A 1.3 Trillion Token Dataset for Open Language Modeling

    Development

    CVE-2025-32883 – goTenna Mesh RCE via Software Defined Radio

    Common Vulnerabilities and Exposures (CVEs)

    Binance’s CZ Says Satoshi Nakamoto May Not Be Human, Possibly AI From the Future

    Artificial Intelligence

    Highlights

    CVE-2025-45042 – Tenda AC9 Command Injection Vulnerability

    May 5, 2025

    CVE ID : CVE-2025-45042

    Published : May 5, 2025, 4:15 p.m. | 2 hours, 39 minutes ago

    Description : Tenda AC9 v15.03.05.14 was discovered to contain a command injection vulnerability via the Telnet function.

    Severity: 9.8 | CRITICAL

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Why need for account reconciliation services

    April 12, 2024

    How Predictive Data Analytics Transforms Quality Assurance 

    November 26, 2024

    Microsoft’s July Update Patches 143 Flaws, Including Two Actively Exploited

    July 10, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.