{"id":18533,"date":"2021-09-26T10:11:00","date_gmt":"2021-09-26T10:11:00","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=18533"},"modified":"2021-09-19T03:38:24","modified_gmt":"2021-09-19T03:38:24","slug":"dnstake","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/dnstake\/","title":{"rendered":"DNSTake : A Fast Tool To Check Missing Hosted DNS Zones That Can Lead To Subdomain Takeover"},"content":{"rendered":"\n<p><strong>DNSTake<\/strong> takeover vulnerabilities occur when a subdomain (subdomain.example.com) or domain has its authoritative nameserver set to a provider (e.g. AWS Route 53, Akamai, Microsoft Azure, etc.) but the hosted zone has been removed or deleted. Consequently, when making a&nbsp;request for DNS records&nbsp;the server responds with a&nbsp;<code><strong>SERVFAIL<\/strong><\/code>&nbsp;error. This allows an attacker to create the missing hosted zone on the service that was being used and thus control all DNS records for that (sub)domain.\u00b9<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/pwnesia\/dnstake#installation\"><\/a><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/pwnesia\/dnstake#from-binary\"><\/a><strong>from Binary<\/strong><\/p>\n\n\n\n<p>The ez way! You can download a pre-built binary from&nbsp;releases page, just unpack and run!<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/pwnesia\/dnstake#from-source\"><\/a><strong>from Source<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>NOTE:<\/strong>&nbsp;Go 1.16+ compiler&nbsp;should be installed &amp; configured!<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Very quick &amp; clean!<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">\u25b6 <strong>go install github.com\/pwnesia\/dnstake\/cmd\/dnstake@latest<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u2014 or<\/h4>\n\n\n\n<p>Manual building executable from source code:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">\u25b6 <strong>git clone https:\/\/github.com\/pwnesia\/dnstake<br>\u25b6 cd dnstake\/cmd\/dnstake<br>\u25b6 go build .<br>\u25b6 (sudo) mv dnstake \/usr\/local\/bin<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ dnstake -h<br>\u00b7\u2584\u2584\u2584\u2584 \u2590 \u2584 .\u2584\u2584 \u00b7\u2584\u2584\u2584\u2584\u2584 \u2584\u2584\u2584\u00b7 \u2584 \u2022\u2584 \u2584\u2584\u2584 .<br>\u2588\u2588\u25aa \u2588\u2588 \u2022\u2588\u258c\u2590\u2588\u2590\u2588 \u2580.\u2022\u2588\u2588 \u2590\u2588 \u2580\u2588 \u2588\u258c\u2584\u258c\u25aa\u2580\u2584.\u2580\u00b7<br>\u2590\u2588\u00b7 \u2590\u2588\u258c\u2590\u2588\u2590\u2590\u258c\u2584\u2580\u2580\u2580\u2588\u2584\u2590\u2588.\u25aa\u2584\u2588\u2580\u2580\u2588 \u2590\u2580\u2580\u2584\u00b7\u2590\u2580\u2580\u25aa\u2584<br>\u2588\u2588. \u2588\u2588 \u2588\u2588\u2590\u2588\u258c\u2590\u2588\u2584\u25aa\u2590\u2588\u2590\u2588\u258c\u00b7\u2590\u2588 \u25aa\u2590\u258c\u2590\u2588.\u2588\u258c\u2590\u2588\u2584\u2584\u258c<br>\u2580\u2580\u2580\u2580\u2580\u2022 \u2580\u2580 \u2588\u25aa \u2580\u2580\u2580\u2580 \u2580\u2580\u2580 \u2580 \u2580 \u00b7\u2580 \u2580 \u2580\u2580\u2580<br>(c) pwnesia.org \u2014 v0.0.1<br>Usage:<br>[stdin] | dnstake [options]<br>dnstake -t HOSTNAME [options]<br>Options:<br>-t, &#8211;target Define single target host\/list to check<br>-c, &#8211;concurrent <em>Set the concurrency level (default: 25)<br>-s, &#8211;silent Suppress errors and\/or clean output<br>-h, &#8211;help Display its help<br>Examples:<br>dnstake -t (sub.)domain.tld<br>dnstake -t hosts.txt<br>cat hosts.txt | dnstake<br>subfinder -silent -d domain.tld | dnstake<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/pwnesia\/dnstake\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>DNSTake takeover vulnerabilities occur when a subdomain (subdomain.example.com) or domain has its authoritative nameserver set to a provider (e.g. AWS Route 53, Akamai, Microsoft Azure, etc.) but the hosted zone has been removed or deleted. Consequently, when making a&nbsp;request for DNS records&nbsp;the server responds with a&nbsp;SERVFAIL&nbsp;error. This allows an attacker to create the missing hosted [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":18548,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4204,4201,4202,4203,4205],"class_list":["post-18533","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-dns-zones","tag-dnstake","tag-fast-tool","tag-missing-hosted","tag-subdomain-takeover"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNSTake : A Fast Tool To Check Missing Hosted DNS Zones<\/title>\n<meta name=\"description\" content=\"DNSTake takeover vulnerabilities occur when a subdomain or domain has its authoritative nameserver set to a provider.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/dnstake\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNSTake : A Fast Tool To Check Missing Hosted DNS Zones\" \/>\n<meta property=\"og:description\" content=\"DNSTake takeover vulnerabilities occur when a subdomain or domain has its authoritative nameserver set to a provider.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/dnstake\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-26T10:11:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnstake\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnstake\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"DNSTake : A Fast Tool To Check Missing Hosted DNS Zones That Can Lead To Subdomain Takeover\",\"datePublished\":\"2021-09-26T10:11:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnstake\/\"},\"wordCount\":229,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnstake\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png\",\"keywords\":[\"DNS Zones\",\"DNSTake\",\"Fast Tool\",\"Missing Hosted\",\"Subdomain Takeover\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/dnstake\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnstake\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/dnstake\/\",\"name\":\"DNSTake : A Fast Tool To Check Missing Hosted DNS Zones\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnstake\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnstake\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png\",\"datePublished\":\"2021-09-26T10:11:00+00:00\",\"description\":\"DNSTake takeover vulnerabilities occur when a subdomain or domain has its authoritative nameserver set to a provider.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/dnstake\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnstake\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png\",\"width\":\"1508\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNSTake : A Fast Tool To Check Missing Hosted DNS Zones","description":"DNSTake takeover vulnerabilities occur when a subdomain or domain has its authoritative nameserver set to a provider.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/dnstake\/","og_locale":"en_US","og_type":"article","og_title":"DNSTake : A Fast Tool To Check Missing Hosted DNS Zones","og_description":"DNSTake takeover vulnerabilities occur when a subdomain or domain has its authoritative nameserver set to a provider.","og_url":"https:\/\/kalilinuxtutorials.com\/dnstake\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-09-26T10:11:00+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/dnstake\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/dnstake\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"DNSTake : A Fast Tool To Check Missing Hosted DNS Zones That Can Lead To Subdomain Takeover","datePublished":"2021-09-26T10:11:00+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dnstake\/"},"wordCount":229,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dnstake\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png","keywords":["DNS Zones","DNSTake","Fast Tool","Missing Hosted","Subdomain Takeover"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/dnstake\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/dnstake\/","url":"https:\/\/kalilinuxtutorials.com\/dnstake\/","name":"DNSTake : A Fast Tool To Check Missing Hosted DNS Zones","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dnstake\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dnstake\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png","datePublished":"2021-09-26T10:11:00+00:00","description":"DNSTake takeover vulnerabilities occur when a subdomain or domain has its authoritative nameserver set to a provider.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/dnstake\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/dnstake\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png","width":"1508","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-V9FT_Q-MPlU\/YUSkknjqCwI\/AAAAAAAAK4Q\/Gqg2wK7SSHUQl8-5-94fdaXr3-tX1oJagCLcBGAsYHQ\/s1508\/4%2B%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":24136,"url":"https:\/\/kalilinuxtutorials.com\/ghostbuster\/","url_meta":{"origin":18533,"position":0},"title":"Ghostbuster : Eliminate Dangling Elastic IPs By Performing Analysis On Your Resources","author":"R K","date":"April 30, 2022","format":false,"excerpt":"Ghostbuster obtains all the DNS records present in all of your AWS accounts (Route53), and can optionally take in records via CSV input, or via Cloudflare. After these records are collected, Ghostbuster iterates through all of your AWS Elastic IPs and Network Interface Public IPs and collects this data. By\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPkwZ_7cRLy5e0XZb720UjImn7egU-RuscVPMiIeIeyIIReyeRqbS5xz0pZ8wguaU2NzX2px3CGsfSuR8GsEJpljhZb25fbSoCf_GhLYW6-N6TMAXZOzMYmquuh2bXCDlcw3CUuKW9c3P-N6EPFrwbJQz2jC0H98bNnZo0MGvunQriTXZ4Hql8MIFa\/s728\/ghostbuster%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPkwZ_7cRLy5e0XZb720UjImn7egU-RuscVPMiIeIeyIIReyeRqbS5xz0pZ8wguaU2NzX2px3CGsfSuR8GsEJpljhZb25fbSoCf_GhLYW6-N6TMAXZOzMYmquuh2bXCDlcw3CUuKW9c3P-N6EPFrwbJQz2jC0H98bNnZo0MGvunQriTXZ4Hql8MIFa\/s728\/ghostbuster%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPkwZ_7cRLy5e0XZb720UjImn7egU-RuscVPMiIeIeyIIReyeRqbS5xz0pZ8wguaU2NzX2px3CGsfSuR8GsEJpljhZb25fbSoCf_GhLYW6-N6TMAXZOzMYmquuh2bXCDlcw3CUuKW9c3P-N6EPFrwbJQz2jC0H98bNnZo0MGvunQriTXZ4Hql8MIFa\/s728\/ghostbuster%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPkwZ_7cRLy5e0XZb720UjImn7egU-RuscVPMiIeIeyIIReyeRqbS5xz0pZ8wguaU2NzX2px3CGsfSuR8GsEJpljhZb25fbSoCf_GhLYW6-N6TMAXZOzMYmquuh2bXCDlcw3CUuKW9c3P-N6EPFrwbJQz2jC0H98bNnZo0MGvunQriTXZ4Hql8MIFa\/s728\/ghostbuster%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":19671,"url":"https:\/\/kalilinuxtutorials.com\/domain-protect\/","url_meta":{"origin":18533,"position":1},"title":"Domain-Protect : Protect Against Subdomain Takeover","author":"R K","date":"October 28, 2021","format":false,"excerpt":"Domain-Protect scans Amazon Route53 across an AWS Organization for domain records vulnerable to takeovervulnerable domains in Google Cloud DNS can be detected by\u00a0Domain Protect for GCP deploy to security audit account scan your entire AWS Organization receive alerts by Slack or email or manually scan from your laptop Subdomain Detection\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiDCv1BHrBUFEu1Gb5YeSLjQ3F-VqYMGhaHTYib9mKHPM-vGYpMuBeLzE_24nZpXWGV8LakGinNbaOqH9kopsFIToW2XCsYXOy-IV57oT1M1X5NgjBiXK1plY1gbQ4LmMxTbtK8m2nzoYOewtETPL9zgTGgV5KPKnyaVb63bRr7HDsBbKI81hBrGm68=s755","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiDCv1BHrBUFEu1Gb5YeSLjQ3F-VqYMGhaHTYib9mKHPM-vGYpMuBeLzE_24nZpXWGV8LakGinNbaOqH9kopsFIToW2XCsYXOy-IV57oT1M1X5NgjBiXK1plY1gbQ4LmMxTbtK8m2nzoYOewtETPL9zgTGgV5KPKnyaVb63bRr7HDsBbKI81hBrGm68=s755 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiDCv1BHrBUFEu1Gb5YeSLjQ3F-VqYMGhaHTYib9mKHPM-vGYpMuBeLzE_24nZpXWGV8LakGinNbaOqH9kopsFIToW2XCsYXOy-IV57oT1M1X5NgjBiXK1plY1gbQ4LmMxTbtK8m2nzoYOewtETPL9zgTGgV5KPKnyaVb63bRr7HDsBbKI81hBrGm68=s755 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiDCv1BHrBUFEu1Gb5YeSLjQ3F-VqYMGhaHTYib9mKHPM-vGYpMuBeLzE_24nZpXWGV8LakGinNbaOqH9kopsFIToW2XCsYXOy-IV57oT1M1X5NgjBiXK1plY1gbQ4LmMxTbtK8m2nzoYOewtETPL9zgTGgV5KPKnyaVb63bRr7HDsBbKI81hBrGm68=s755 2x"},"classes":[]},{"id":29464,"url":"https:\/\/kalilinuxtutorials.com\/domain-protec\/","url_meta":{"origin":18533,"position":2},"title":"Domain-Protect : OWASP Domain Protect","author":"R K","date":"August 23, 2023","format":false,"excerpt":"Domain-Protect is an OWASP Domain Protect - prevent subdomain takeover. Prevent subdomain takeover ... ... with serverless cloud infrastructure OWASP Global AppSec Dublin - talk and demo Features scan Amazon Route53 across an AWS Organization for domain records vulnerable to takeover scan Cloudflare for vulnerable DNS records take over vulnerable\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjcaTQaLoahQkyDOMzDu1tRxxnVlL_F5x9Np0xFCjjDxYDIkBIVDE04-k8IOCgDJzkjPUJw9qALD9dRwyKtcO28AzwVcU9H1v6XJd8fiLfxlaCdD5Er2OZSGQ724uIbCcTR_VIZIAImZ5yaLDNf8w0jYniQwha8pdKEDDSw-zGb3PtcDRPc8Lf_VER7sq8\/s16000\/img23.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjcaTQaLoahQkyDOMzDu1tRxxnVlL_F5x9Np0xFCjjDxYDIkBIVDE04-k8IOCgDJzkjPUJw9qALD9dRwyKtcO28AzwVcU9H1v6XJd8fiLfxlaCdD5Er2OZSGQ724uIbCcTR_VIZIAImZ5yaLDNf8w0jYniQwha8pdKEDDSw-zGb3PtcDRPc8Lf_VER7sq8\/s16000\/img23.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjcaTQaLoahQkyDOMzDu1tRxxnVlL_F5x9Np0xFCjjDxYDIkBIVDE04-k8IOCgDJzkjPUJw9qALD9dRwyKtcO28AzwVcU9H1v6XJd8fiLfxlaCdD5Er2OZSGQ724uIbCcTR_VIZIAImZ5yaLDNf8w0jYniQwha8pdKEDDSw-zGb3PtcDRPc8Lf_VER7sq8\/s16000\/img23.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjcaTQaLoahQkyDOMzDu1tRxxnVlL_F5x9Np0xFCjjDxYDIkBIVDE04-k8IOCgDJzkjPUJw9qALD9dRwyKtcO28AzwVcU9H1v6XJd8fiLfxlaCdD5Er2OZSGQ724uIbCcTR_VIZIAImZ5yaLDNf8w0jYniQwha8pdKEDDSw-zGb3PtcDRPc8Lf_VER7sq8\/s16000\/img23.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":17480,"url":"https:\/\/kalilinuxtutorials.com\/tko-subs\/","url_meta":{"origin":18533,"position":3},"title":"Tko-Subs : A Tool That Can Help Detect And Takeover Subdomains With Dead DNS Records","author":"R K","date":"August 23, 2021","format":false,"excerpt":"Tko-Subs allows: To check whether a subdomain can be taken over because it has:a dangling CNAME pointing to a CMS provider (Heroku, Github, Shopify, Amazon S3, Amazon CloudFront, etc.) that can be taken over.a dangling CNAME pointing to a non-existent domain nameone or more wrong\/typoed NS records pointing to a\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2967,"url":"https:\/\/kalilinuxtutorials.com\/takeover-cname-record-subdomains\/","url_meta":{"origin":18533,"position":4},"title":"TakeOver : Takeover Script Extracts CNAME Record Of All Subdomains At Once","author":"R K","date":"October 9, 2018","format":false,"excerpt":"Subdomain takeover is a class of vulnerability where subdomain points to an external service that has been deleted. The external services are Github, Heroku, Gitlab, Tumblr and so on. Let\u2019s assume we have a subdomain sub.example.com that points to an external service such as GitHub. If the Github page is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Takeover1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Takeover1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Takeover1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Takeover1.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":26678,"url":"https:\/\/kalilinuxtutorials.com\/dnsreaper\/","url_meta":{"origin":18533,"position":5},"title":"dnsReaper : Subdomain Takeover Tool For Attackers, Bug Bounty Hunters And The Blue Team!","author":"R K","date":"August 29, 2022","format":false,"excerpt":"DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures in our arsenal! We can scan around 50 subdomains per second, testing each one with over 50 takeover signatures. This means most organisations can scan their entire DNS estate in\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipto8t3cxiYROFfCnVie9xM9JO5htfHeOuiTyFsap5kDjyJZpcLZDvGA_URqlFbq2r40a81cVkZoqJsYyuIDjviBqLUAa-T_cfoX31V5ZVu4WlPWn0rVEmkZaw9ZFptu1t54XTRCTfmNItACcVpPUVH-kR8HE-TYq_SLXAK-7A4oG9xE73QCfLr4kE\/s728\/dns-yellow.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipto8t3cxiYROFfCnVie9xM9JO5htfHeOuiTyFsap5kDjyJZpcLZDvGA_URqlFbq2r40a81cVkZoqJsYyuIDjviBqLUAa-T_cfoX31V5ZVu4WlPWn0rVEmkZaw9ZFptu1t54XTRCTfmNItACcVpPUVH-kR8HE-TYq_SLXAK-7A4oG9xE73QCfLr4kE\/s728\/dns-yellow.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipto8t3cxiYROFfCnVie9xM9JO5htfHeOuiTyFsap5kDjyJZpcLZDvGA_URqlFbq2r40a81cVkZoqJsYyuIDjviBqLUAa-T_cfoX31V5ZVu4WlPWn0rVEmkZaw9ZFptu1t54XTRCTfmNItACcVpPUVH-kR8HE-TYq_SLXAK-7A4oG9xE73QCfLr4kE\/s728\/dns-yellow.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipto8t3cxiYROFfCnVie9xM9JO5htfHeOuiTyFsap5kDjyJZpcLZDvGA_URqlFbq2r40a81cVkZoqJsYyuIDjviBqLUAa-T_cfoX31V5ZVu4WlPWn0rVEmkZaw9ZFptu1t54XTRCTfmNItACcVpPUVH-kR8HE-TYq_SLXAK-7A4oG9xE73QCfLr4kE\/s728\/dns-yellow.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/18533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=18533"}],"version-history":[{"count":15,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/18533\/revisions"}],"predecessor-version":[{"id":18549,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/18533\/revisions\/18549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/18548"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=18533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=18533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=18533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}