2020-04-29 10:23:17 +00:00
id : azure-takeover-detection
info :
2022-03-14 13:44:54 +00:00
name : Microsoft Azure Takeover Detection
2021-04-06 07:25:57 +00:00
author : pdteam
2020-04-29 10:23:17 +00:00
severity : high
2022-03-14 13:44:54 +00:00
description : Microsoft Azure is vulnerable to subdomain takeover attacks. Subdomain takeovers are a common, high-severity threat for organizations that regularly create and delete many resources. A subdomain takeover can occur when a DNS record points to a deprovisioned Azure resource.
2021-09-29 12:44:28 +00:00
tags : dns,takeover,azure
2022-03-14 13:44:54 +00:00
reference :
- https://godiego.co/posts/STO/
- https://docs.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeover
- https://cystack.net/research/subdomain-takeover-chapter-two-azure-services/
classification :
cvss-score : 7.2
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cwe-id : CWE-404
2020-04-29 10:23:17 +00:00
dns :
2020-05-25 07:54:40 +00:00
- name : "{{FQDN}}"
type : A
2021-12-09 13:05:44 +00:00
2020-05-25 07:54:40 +00:00
matchers-condition : and
matchers :
2020-04-29 10:23:17 +00:00
- type : word
2020-05-25 07:54:40 +00:00
words :
2020-04-29 10:23:17 +00:00
- "azure-api.net"
- "azure-mobile.net"
- "azurecontainer.io"
- "azurecr.io"
- "azuredatalakestore.net"
- "azureedge.net"
- "azurefd.net"
- "azurehdinsight.net"
- "azurewebsites.net"
- "azurewebsites.windows.net"
- "blob.core.windows.net"
- "cloudapp.azure.com"
- "cloudapp.net"
- "database.windows.net"
- "redis.cache.windows.net"
- "search.windows.net"
- "servicebus.windows.net"
- "visualstudio.com"
2021-09-29 12:44:28 +00:00
2020-04-29 10:23:17 +00:00
- type : word
words :
- "NXDOMAIN"
2021-09-16 09:39:33 +00:00
2021-09-14 23:53:58 +00:00
extractors :
- type : regex
group : 1
regex :
- "IN\tCNAME\t(.+)"
2022-03-14 13:44:54 +00:00
# Enhanced by mp on 2022/03/13