[German]A tip for people who are responsible for the administration of Amazon Cloud Solutions (AWS etc.). In order to detect weaknesses early, you should be aware of the IP addresses and subdomains used.
An orphaned subdomain that refers to a service that no longer exists could be taken over by a third party (this has happened many times before). However, there are tools that can be used to check whether, for example, subdomains refer to services that no longer exist and can thus be taken over. Other tools allow you to list all subdomains or public IP addresses associated with an AWS account.
Sub-Domain TakeOver Vulnerability Scannerhttps://t.co/sxN38nAiwo
Recursive DNS Subdomain Enumeratorhttps://t.co/B9bFhdEQ5U
ReconPi – A lightweight recon toolhttps://t.co/vVJXIeVntx
— A hacker's life (@Unknownuser1806) January 6, 2020
The tweet above contains links to various tools available on GitHub to support specific tasks in this area. It might help some blog readers
Cookies helps to fund this blog: Cookie settings