Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Taken - Takeover AWS Ips And Have A Working POC For Subdomain Takeover

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Taken - Takeover AWS Ips And Have A Working POC For Subdomain Takeover


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Takeover AWS ips and have a working POC for Subdomain Takeover. Idea is simple

  • Get subdomains.
  • Do reverse lookups to only save AWS ips.
  • Restart EC2 instance every min. and public ip gets rotated on each restart. Match it with your existing list of subdomain ips and you have a working subdomain takeover POC.
  • Notify via email as soon as you take over a subdomain

Pre-requisites
  • AWS Account
  • Knowledge of Linux and Bash script

Tech/framework used

Built with

  • Bash

Features
  • Gather subdomains and do reverse lookup to only target AWS ips.
  • Rotate IPs by restarting ec2 instance until it matches one of the ips in the list.
  • On a match that IP/host is added in a whitelist file, so it doesn't gets rotated again and send an email notification.

Detailed steps to use
  1. Create one instance t2.medium (attack machine), free of cost 24*365.
  2. Create 5-10 instances with instance type t3a.nano, probably lowest in cost (higher the no. better chances but more the charges around $60/month for 10 machines) in one or more region, takes 5min.s, have SG Group opened to only your public ip.
  3. Create AWS API keys to stop/start instances.
  4. SSH to your attack machine.
  5. Install email notification utility SSMTP. https://www.digitalocean.com/community/questions/how-to-send-emails-from-a-bash-script-using-ssmtp
  6. Install subfinder and sublist3r.py tools for collecting subdomains. (Or any other tools you want but that would require you adding it in the subdomain-collection script) Follow the steps to set these up https://github.com/aboul3la/Sublist3r https://github.com/projectdiscovery/subfinder
  7. Clone Taken repo and open a screen session to run subdomain-collection script. If you do not know how to use screen session - https://linuxize.com/post/how-to-use-linux-screen/
  8. Create a text file with all domains, you want to target, save it as "alldomains" in the same directory and then Run the subdomain-collection script. This script uses subfinder and sublist3r.py. This shall generate a list of all the subdomains for one or more domains in the format "subdomain:IP" in each line. Which would later be used to match and notify.
  9. Open another screen session and export AWS credentials in that session. Exporting AWS keys. export AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE The access key for your AWS account.
    export AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY The secret access key for your AWS account.
    Run the takeover script in a different screen session. You can also run for each region in different screen session (check the screenshot below).
    Reasoning - Each Region in AWS has associated different IP subnets. To target companies sitting in US, there are high chances they are running in any of US regions, but may also have assets in other regions like Ireland, Frankfurt etc. So instead of running 10 assets in one region, try running 5 assets in the region company HQ is based and other 5 in different regions.

Screen session example-ย 



Email Notification -



Took over a subdomain what next - SSH into that host, create a simple HTML file and start a python server and you have a running POC. (I plan on automating this as well in next release)


Running at Bulk

I scraped through all the public programs at HackerOne and Bugcrowd and top 500 SaaS Forbes/SaaS companies, collected their subdomains and started hitting. Within 24 hours i was able to take over 3 subdomains. Instances running total 10 in 3 different regions. Success rate depends highly upon no. of instances running. Since with the script you change around 1440 ips in 24 hours, that would make it around 14400 IPs with 10 instances in 24hours.


Reference

Tools used to collect subdomains. https://github.com/projectdiscovery/subfinder
https://github.com/aboul3la/Sublist3r


Contribute
  • Report bugs.
  • Suggestions for improvement.
  • Suggestions for future extensions.

Future Extensions
  • Creating ec2 instances using the same script.
  • Adding auto deploy of http service using AWS beanstalk.

Twitter - https://twitter.com/_In3tinct



...



๐Ÿ“Œ Censys Subdomain Finder - Perform Subdomain Enumeration Using The Certificate Transparency Logs From Censys


๐Ÿ“ˆ 32.85 Punkte

๐Ÿ“Œ Implementing Wildcard Subdomain (Part 2) - Creating subdomain programmatically


๐Ÿ“ˆ 32.85 Punkte

๐Ÿ“Œ VPN leaks usersโ€™ IPs via WebRTC. Iโ€™ve tested seventy VPN providers and 16 of them leaks usersโ€™ IPs via WebRTC (23%)


๐Ÿ“ˆ 29 Punkte

๐Ÿ“Œ Overall, 24 percent of u.s. users have deleted the app while 42 percent have taken a break of several weeks or more.


๐Ÿ“ˆ 27.39 Punkte

๐Ÿ“Œ IPS Solution Quality Guidelines: What to Look for in an IPS Solution


๐Ÿ“ˆ 27.22 Punkte

๐Ÿ“Œ AH-IPS vs IPS difference; Which is better?


๐Ÿ“ˆ 27.22 Punkte

๐Ÿ“Œ PoC Exploit Compromises Microsoft Live Accounts via Subdomain Hijacking


๐Ÿ“ˆ 26.81 Punkte

๐Ÿ“Œ DevSecOps with AWS โ€“ ChatOps with AWS and AWS Developer Tools โ€“ Part 1


๐Ÿ“ˆ 24.7 Punkte

๐Ÿ“Œ Hundreds of Millions Have Downloaded Suspicious VPN Apps With Serious Privacy Flaws. Apple and Google Haven't Taken Action.


๐Ÿ“ˆ 23.13 Punkte

๐Ÿ“Œ AWS EC2 Elastic IPs Bandwidth Usage and Charges


๐Ÿ“ˆ 23.03 Punkte

๐Ÿ“Œ AWS Outage Has Taken Down a Big Chunk of the Internet


๐Ÿ“ˆ 22.93 Punkte

๐Ÿ“Œ PoC of modifying HexRays AST - This is simple PoC that allows you to define AST pattern you want to process and make some actions with them


๐Ÿ“ˆ 22.55 Punkte

๐Ÿ“Œ How one guy could have taken over any Tinder account (but didnโ€™t)


๐Ÿ“ˆ 21.34 Punkte

๐Ÿ“Œ How a WhatsApp call could have taken over your phone


๐Ÿ“ˆ 21.34 Punkte

๐Ÿ“Œ 'The inmates have taken over the asylum': DNS godfather blasts DNS over HTTPS adoption


๐Ÿ“ˆ 21.34 Punkte

๐Ÿ“Œ Contributors To Prominent Publications Have Taken Payments in Exchange For Positive Coverage


๐Ÿ“ˆ 21.34 Punkte

๐Ÿ“Œ It appears hackers have taken over control of the official twitter account of fox's show almost human to promote cryptocurrency scams.


๐Ÿ“ˆ 21.34 Punkte

๐Ÿ“Œ How one man could have taken over any business on Facebook


๐Ÿ“ˆ 21.34 Punkte

๐Ÿ“Œ SMBs: We don't want to spoil all of this article, but have you patched, taken away admin rights, made backups yet?


๐Ÿ“ˆ 21.34 Punkte

๐Ÿ“Œ Anyone have a copy of this article on Matlab P-code obfuscation before it got taken down?


๐Ÿ“ˆ 21.34 Punkte

๐Ÿ“Œ Two dark web marketplaces have been taken down in police operations


๐Ÿ“ˆ 21.34 Punkte

๐Ÿ“Œ Gnosticplayers have reportedly taken credit for the breach, which they say consists of 6 million records.


๐Ÿ“ˆ 21.34 Punkte











matomo