nuclei-templates/dns/azure-takeover-detection.yaml

44 lines
1.1 KiB
YAML
Raw Normal View History

2020-04-29 10:23:17 +00:00
id: azure-takeover-detection
info:
name: Azure takeover detection
2020-05-25 07:54:40 +00:00
author: "pdnuclei - projectdiscovery.io"
2020-04-29 10:23:17 +00:00
severity: high
2020-05-25 07:54:40 +00:00
# Update the list with more CNAMEs related to azure
# You need to claim the CNAME in Azure portal (https://portal.azure.com) to confirm the takeover.
# Do not report this without claiming the CNAME.
2020-04-29 10:23:17 +00:00
dns:
2020-05-25 07:54:40 +00:00
- name: "{{FQDN}}"
type: A
class: inet
recursion: true
retries: 3
matchers-condition: and
matchers:
2020-04-29 10:23:17 +00:00
- type: word
2020-05-25 07:54:40 +00:00
words:
2020-04-29 10:23:17 +00:00
- "azure-api.net"
- "azure-mobile.net"
- "azurecontainer.io"
- "azurecr.io"
- "azuredatalakestore.net"
- "azureedge.net"
- "azurefd.net"
- "azurehdinsight.net"
- "azurewebsites.net"
- "azurewebsites.windows.net"
- "blob.core.windows.net"
- "cloudapp.azure.com"
- "cloudapp.net"
- "database.windows.net"
- "redis.cache.windows.net"
- "search.windows.net"
- "servicebus.windows.net"
- "trafficmanager.net"
- "visualstudio.com"
- type: word
words:
- "NXDOMAIN"