Subdomains are prefixes of internet addresses. If we think that our home’s address is an internet address (URL), then we can call the street as subdomain. Webmasters use subdomains because of some reasons like security, SEO, API, CDN or categorizing. Subdomains technically work like domains and it need a secure platform.
If a subdomain is vulnerable to controlling by another persons excluding system authorities, its called as subdomain takeover. It may happen because of expired hosting services or DNS misconfigurations. Attacker will has full-privilege on the system after tookover the subdomain. Attacker can upload his own files, create his own databases, track data traffic and create a clone of main website. So, it is not possible to detect that the subdomain is hijacked by an attacker and it threaten the security with various attack scenarios. Our team VULLNERAB1337 beat the records and discovered 670+ subdomains of Microsoft is vulnerable to takeover. Let us show you how we found them and what can an attacker do by this vulnerability.
How to Discover Subdomain Takeover Vulnerability
We will see some error messages like “Site not found”, “This site doesn’t exist” while reviewing HTTP responses. And we will see about where is website redirected to, while reviewing DNS records.
But in some service providers, we cannot see an HTTP response. So we need to review its DNS records to understand is it vulnerable or not. For example we cannot see an HTTP response in Microsoft Azure, so we need to take a look at DNS records.
Example vulnerable subdomain on Azure: azure.takeover.host , let us look at its DNS records.
There are 2 points we should care about:
Example Attack Scenarios
We have claimed some of those subdomains to protect from attackers and show you example attack scenarios.
What could an attacker do by exploiting this vulnerability?
etc...
Yet another danger about subdomain takeover vulnerabilities. Let us see together how can an attacker steal your account password and cookies:
However, Microsoft doesn’t reward subdomain takeover vulnerabilities. We have already reported lots of vulnerable subdomains. We have already reported subdomains in this post but we will not report other 660+ vulnerable subdomains until Microsoft reward researchers. Also, until Microsoft offer bounties to researchers for subdomain takeover vulnerabilities, we exactly recommend you to don’t visit any subdomain of Microsoft because of it is impossible to understand is a subdomain hijacked or not.
How Can An Attacker Exploit This Vulnerability?
How We Discovered 670+ Vulnerable Subdomains of Microsoft?
Our automated system scanned all subdomains of some Microsoft domains and found hundreds of vulnerable subdomains in a short time. You can track your subdomains and get an alert when your subdomains are vulnerable, by our advanced technology. Visit: Security Tools
If you are a webmaster, we suggest you to track your subdomains and remove unnecessaried subdomains regularly. Also you should review Microsoft's guide to be aware about phishing attacks. This article written just for educational purpose and show the dangers about a potential subdomain takeover attacks. Subdomains are ethically reported to Microsoft and fixed in a short time. It is not aiming an illegal activity.
Security is a right!
Date: Mar 4, 2020