id: azure-takeover-detection info: name: Microsoft Azure Takeover Detection author: pdteam severity: high description: Microsoft Azure is vulnerable to subdomain takeover attacks. Subdomain takeovers are a common, high-severity threat for organizations that regularly create and delete many resources. A subdomain takeover can occur when a DNS record points to a deprovisioned Azure resource. reference: - https://godiego.co/posts/STO/ - https://docs.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeover - https://cystack.net/research/subdomain-takeover-chapter-two-azure-services/ classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N cvss-score: 7.2 cwe-id: CWE-404 metadata: max-request: 1 tags: dns,takeover,azure dns: - name: "{{FQDN}}" type: A matchers-condition: and matchers: - type: word words: - "azure-api.net" - "azure-mobile.net" - "azurecontainer.io" - "azurecr.io" - "azuredatalakestore.net" - "azureedge.net" - "azurefd.net" - "azurehdinsight.net" - "azurewebsites.net" - "azurewebsites.windows.net" - "blob.core.windows.net" - "cloudapp.azure.com" - "cloudapp.net" - "database.windows.net" - "redis.cache.windows.net" - "search.windows.net" - "servicebus.windows.net" - "trafficmanager.net" - "visualstudio.com" - type: word words: - "NXDOMAIN" extractors: - type: dsl dsl: - cname # digest: 4a0a00473045022043d1113417de308936591aa35f8175c25ad9d5b66b6d076fe0ba324450b1799e022100add5bb113b494d920eb39a99c107f2e7dff1979d482302e2580ff07e5857d9ff:922c64590222798bb761d5b6d8e72950