Subdomain Takeover
AdvancedA company's DNS still points to a cloud service that was deleted. Discover the dangling CNAME, claim the orphaned resource, and see how an attacker can hijack trusted subdomains to steal cookies and serve phishing pages.
Progress:
1
Discover the Dangling Record2
Claim the Subdomain3
Prevent Takeover🌐 DNS Records — megacorp.com
| Subdomain | Type | Target | Status | Action |
|---|---|---|---|---|
| www.megacorp.com | CNAME | megacorp.github.io | Active | |
| api.megacorp.com | A | 203.0.113.50 | Active | |
| staging.megacorp.com | CNAME | old-app.herokuapp.com | Dangling | |
| docs.megacorp.com | CNAME | megacorp-docs.s3-website-us-east-1.amazonaws.com | Active | |
| blog.megacorp.com | CNAME | megacorp.ghost.io | Active |
🖥 Browser
🔒https://...
Navigate to a subdomain to see its content.
⚡ Attacker Actions
Terminal — DNS & HTTP Log
Click "Resolve" on a DNS record to begin…