2021-07-22 08:29:34 +00:00
|
|
|
id: detect-dangling-cname
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Detect Dangling cname
|
|
|
|
author: pdteam,nytr0gen
|
|
|
|
severity: info
|
|
|
|
tags: dns,takeover
|
2021-08-18 11:37:49 +00:00
|
|
|
reference:
|
2021-08-19 14:44:46 +00:00
|
|
|
- https://securitytrails.com/blog/subdomain-takeover-tips
|
|
|
|
- https://nominetcyber.com/dangling-dns-is-no-laughing-matter/
|
|
|
|
- https://nabeelxy.medium.com/dangling-dns-records-are-a-real-vulnerability-361f2a29d37f
|
|
|
|
- https://docs.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeover
|
2021-07-22 08:29:34 +00:00
|
|
|
|
|
|
|
dns:
|
|
|
|
- name: "{{FQDN}}"
|
|
|
|
type: A
|
|
|
|
class: inet
|
|
|
|
recursion: true
|
2021-07-22 08:33:27 +00:00
|
|
|
retries: 3
|
2021-07-22 08:29:34 +00:00
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "NXDOMAIN"
|
|
|
|
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "IN\tCNAME"
|
|
|
|
|
|
|
|
extractors:
|
|
|
|
- type: regex
|
|
|
|
group: 1
|
|
|
|
regex:
|
|
|
|
- "IN\tCNAME\t(.+)"
|