EncryptCodecencryptcodec
Simulations/Subdomain Takeover

Subdomain Takeover

Advanced

A company's DNS still points to a cloud service that was deleted. Discover the dangling CNAME, claim the orphaned resource, and see how an attacker can hijack trusted subdomains to steal cookies and serve phishing pages.

Progress:
1
Discover the Dangling Record
2
Claim the Subdomain
3
Prevent Takeover
🌐 DNS Records — megacorp.com
SubdomainTypeTargetStatusAction
www.megacorp.comCNAMEmegacorp.github.ioActive
api.megacorp.comA203.0.113.50Active
staging.megacorp.comCNAMEold-app.herokuapp.comDangling
docs.megacorp.comCNAMEmegacorp-docs.s3-website-us-east-1.amazonaws.comActive
blog.megacorp.comCNAMEmegacorp.ghost.ioActive
🖥 Browser
🔒https://...
Navigate to a subdomain to see its content.
⚡ Attacker Actions
Terminal — DNS & HTTP Log
Click "Resolve" on a DNS record to begin…

Challenges

1
Discover the Dangling Record
Inspect the DNS panel and identify the CNAME record pointing to a deprovisioned cloud resource.
hints
2
Claim the Subdomain
Register the orphaned cloud resource name and serve attacker-controlled content on the victim's subdomain.
hints
3
Prevent Takeover
Remove the dangling DNS record and enable monitoring to prevent future takeovers.
hints
How to prevent subdomain takeover
DNS hygiene, monitoring, and cloud resource lifecycle management

Frequently Asked Questions