Skip to content
3 min read

Sub-Domain Takeovers — How can companies better secure their assets? Part 1

Sub-Domain Takeovers — How can companies better secure their assets? Part 1
Image by Trung Nguyen

Sub-Domain Takeovers — How Can Companies Better Secure Their Assets? Part 1

Introduction

Hi, my name is Chevon Phillip. I am a Security Researcher and Penetration Tester. In this article, I will explain what are sub-domain takeovers, how hackers can exploits these vulnerabilities by finding potential targets, and how companies should secure their assets from these types of vulnerabilities.


What are Sub-Domains?

For those of you who may not know what a sub-domain is here’s a brief description in my own words.

Sub-Domains are children to a parent domain or top-level domains (TLD). For example, https://example.com may have a sub-domain with the following URLs http://devlopment.server.example.com and http://staging.server.example.com.

Why do Sub-Domains exist?

There are several reasons why sub-domains are used. Here are some of the main reasons I have come across during my research.


How to find potential targets?

There are several techniques that hackers use to find potential targets for sub-domain takeovers. In this article, I will demonstrate one technique that is very popular and is used by many hackers. This technique is called Certificate Transparency.

What is Certificate Transparency?

Certificate Transparency is an open framework that monitors and audits TLS/SSL certificates. It’s made up of three important components, Certificate Transparency logs, Certificate monitors, and Certificate auditors. — SECURITYTRAILS BLOG · OCT 25 2018 · SECURITYTRAILS TEAM

https://crt.sh/

Cert.sh certificate search is a widely used tool by hackers to search for potential sub-domains own by companies. Here example.com is used to demonstrate the use of certificate transparency.

https://crt.sh/?q=%25example.com

What are the Security Impacts of a Sub-Domain takeover?

The ability to identify the impact of a sub-domain takeover depends on the initial sub-domain and the assets that are hosted on each domain. For example, a sub-domain that is used for development purposes may not have as much impact as a sub-domain that handles API calls or pointing to a third-party cloud hosting service. Here are some of my most reported impacts to companies.

How should companies secure their Sub-Domain assets?

Sub-domains are all part of the SDLC in one way or another, especially within the DevOps environments and third party services. Here are some general tips that can help better secure your company's assets.

Conclusion

This article gave a general overview of sub-domain takeovers and why it’s important for companies to identify these risks and better secure their assets by applying basic application and server-level security controls. Stay tuned for Part 2 of this article as it will dive deeper into how easy it is to takeover sub-domains and some of the tools that are used to automate the process.

Chevon Phillip - Software Engineering Manager - University of Rochester Medical Center | LinkedIn
Highly motivated individual focused on developing and growing my leadership potential and building on previous work…