Update subdomain-takeovers.yml

patch-3
Parth Malhotra 2024-05-31 01:06:53 +05:30 committed by GitHub
parent fc1a50fec3
commit ec0f074ef5
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 18 additions and 6 deletions

View File

@ -1,9 +1,21 @@
# This is a configuration file for the subdomain takeover template profile. # Nuclei Configuration Profile for Subdomain Takeover Detection
# Additional configuration profiles can be created for different types of nuclei scans. #
# They should be placed under the 'config' directory at: # This configuration file is specifically tailored for detecting subdomain takeovers using Nuclei.
# https://github.com/projectdiscovery/nuclei-templates #
# Here is an example of how to use a config profile: # Purpose:
# nuclei -config config/osint.yml -list target_list_to_scan.txt # This profile is focused on identifying subdomain takeover vulnerabilities across different cloud service providers.
# Subdomain takeovers can occur when a DNS entry points to a deprovisioned or unclaimed cloud resource, potentially
# allowing an attacker to claim the resource and hijack the subdomain.
#
# Included Templates:
# This configuration references specific templates designed to detect subdomain takeover scenarios:
# - http/takeovers/: This directory contains general templates for detecting HTTP-based subdomain takeovers.
# - dns/azure-takeover-detection.yaml: This template specifically checks for subdomain takeovers on Microsoft Azure.
# - dns/elasticbeanstalk-takeover.yaml: This template specifically checks for subdomain takeovers on AWS Elastic Beanstalk.
#
# Running this profile
# You can run this profile using the following command :
# nuclei -profile subdomain-takeovers -u https://www.example.com
templates: templates:
- http/takeovers/ - http/takeovers/