active-directory
-
How Hackers Compromise Subdomains: Subdomain Takeover in Depth Explanation with notes | By Alham Rizvi
active-directory, Asset Inventory, Automation, AWS, azure, bug bounty, bug hunting, Certificate Misuse, Cloud Services, Cloudflare, CNAME Takeover, DNS Misconfiguration, DNS Security, Domain Security, Ethical Hacking, GCP, hacking, Host Misconfiguration, Incident Response, networking, Penetration Testing, Public Footprinting, Recon Tools, Reconnaissance, Remediation, Secure Configuration, Security Research, Subdomain Enumeration, Subdomain Hijacking, Subdomain Takeover, Vulnerability Hunting, Web SecurityA subdomain takeover happens when a DNS record points a subdomain to a third-party service that no longer hosts it, and an attacker can claim that service and serve content from the victim’s subdomain. 1) What is a subdomain takeover? A subdomain takeover happens when sub.example.com has a DNS record (usually a CNAME or ALIAS)…
-
Windows 10 has been one of the most widely used operating systems in the world, running on millions of personal and business computers. It has been a reliable platform for daily work, gaming, and business operations. But all good things come to an end and for Windows 10, that end is approaching. From today ,…
-
lets gooo Task 1: Intro to AD Breaches Ini /etc/resolv.conf (after) Test Hostname Lookups Bash Why does this work? You’re instructing the DNS resolution service to search between 10.200.54.101 and 10.0.0.1 . So, let’s say you say something like this: Bash What’s happening is this: Task 2: OSINT & Phishing Read through and learn about two very common techniques…
