So, (referring to my previous post) after the initial post about subdomain takeover by researchers from Detectify, they were contacted by another security researcher named Szymon Gruszeck. He provided them with another method and its POC to take over a subdomain which he had found a year back. You can find his post here.
Screenshot of the website racing.msn.com used for his POC:
Screenshot of the website racing.msn.com used for his POC:
So, my TL;DR for this attack is:
Overview:
A subdomain can simply be taken over if it has a CNAME pointing to an expired domain.
Attack Scenario:
1) The attacker finds a subdomain(victim's subdomain) whose CNAME is pointed to a domain whose registration has expired.
2) The attacker simply buys the expired domain and phishes anyone that visits the site.
2) The attacker simply buys the expired domain and phishes anyone that visits the site.
Example:
The researcher performed the attack for the subdomain racing.msn.com whose CNAME was pointing to an expired msnbrickyardsweeps.com.
Further attack:
1) Attacker can create a valid SSL certificate for his own website and the victim will implicitly trust the domain because the browser will show the https secured symbol.
Requirements:
Victim's current subdomain needs to be pointing to an expired domain that can be bought
Cause:
1) Victim's mistake. Again.
2) Service provider for the domain does no validation. But you can hardly blame them here.
Extent:
1) As mentioned in previous post, most service providers of domains do not verify domain ownership
2) More importantly, the same attack can be performed with DNAME, NS and MX fields.
Look at Detectify's blog post for more details. Have fun!