Biscuit's Bug Bounty Playbook
  • ๐Ÿ‘‹Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • ๐ŸงพResume For Cyber Security Freshie
    • ๐Ÿ“—Browser extension For Bug Bounty
    • ๐Ÿ“€POC Videos YT Channel
    • ๐Ÿ“บ55 YouTube Channels To Learn Hacking
    • ๐Ÿ‘€Hackers to Follow on Social Media
      • Twitter
      • Medium
      • YouTube
      • GitHub
      • Discord Server
      • Security GitBooks
    • ๐Ÿ…Learn The Basics
      • ๐ŸŽ–๏ธType Of Cyber Security
      • ๐ŸฅˆCommon Job Roles
      • ๐Ÿฅ‰Get Started With InfoSec
      • โš•๏ธBest Bug Bounty Platform
      • ๐Ÿ—ž๏ธBest InfoSec Writeups Website
      • ๐ŸชHacking Books
      • ๐Ÿฅ‚CLI Commands
      • ๐Ÿ’ฟLearn WSL
    • ๐Ÿ‘ฉโ€๐Ÿ’ปFun Programming Codes
    • ๐Ÿ”ฎBuild your own Bug Bounty Methodology
    • ๐ŸŽดBug Bounty Checklist
  • Learn Android Bug Bounty
    • ๐ŸŽฅVideo Tutorials
  • โค๏ธYouTube Channels
  • ๐Ÿ“ฐBug Bounty Reports
  • ๐Ÿ“šBlogs & Writeups
  • ๐ŸนGitHub Repository
  • ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งConference Talks
  • ๐Ÿ–จ๏ธAutomated Scanners
  • โš™๏ธIntentionally Vulnerable Apps
  • ๐ŸŽฑLearn Drozer For Android Pentesting
  • ๐Ÿช€Learn Frida For Android Pentesting
  • ๐ŸˆBypassing Security Protections in APKs via Objection and Frida
  • ๐ŸชSecurity Tools For Android Pentesting
  • ๐ŸŽนCLI Commands & Shortcuts
  • Bug Bounty Reports & Articles
    • 0๏ธโƒฃIndex
    • 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)
      • ๐ŸšกSub Domain Takeover
      • ๐Ÿš Account Takeover
      • ๐ŸšŸdependency confusion vulnerability
    • 2๏ธโƒฃIDOR (Indirect Object Reference)
    • 3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)
    • 4๏ธโƒฃOpen Redirects
    • 5๏ธโƒฃRequest Forgery (CSRF & SSRF)
      • ๐ŸŸขCSRF
      • ๐Ÿ”ดSSRF
    • 6๏ธโƒฃInjections (HTML, XSS, etc)
      • ๐ŸŸกXSS
      • ๐ŸŸ HTML Injection
      • โšซSQL Injection
      • ๐ŸŸฃCR/LF Injection
      • ๐ŸŸขSSTI
      • ๐Ÿ”ดHost Header Injection
      • ๐Ÿ”ตCSV Injection
    • 7๏ธโƒฃBroken Access Control & Broken Authentication
      • โš™๏ธFile Upload Functionality
      • โš™๏ธPassword Reset Functionality
      • โš™๏ธ2FA Functionality
      • โš™๏ธOauth Functionality
      • โš™๏ธBypassing
      • โš™๏ธMisconfiguration
      • โš™๏ธCaptcha Bypass
    • 8๏ธโƒฃWeb Socket
    • 9๏ธโƒฃMiscellaneous Reports
    • ๐ŸงปRole Management Issue
    • 0๏ธCloud
      • ๐ŸŒฉ๏ธAWS S3
    • 1๏ธLow Hanging Fruits
    • 2๏ธCache Vulnerabilities
    • 3๏ธDOS/DDOS
  • 4๏ธForced Browsing
  • Bug Bounty Platforms
    • ๐Ÿ›BugCrowd
    • ๐ŸžHackerOne
    • ๐ŸIntigriti
    • ๐ŸœOpen Bug Bounty
  • Exploiting Technologies
    • 0๏ธโƒฃIntroduction
    • 1๏ธโƒฃWordpress
    • 2๏ธโƒฃGraphQL API
    • 3๏ธโƒฃIDOR Vulnerability
Powered by GitBook
On this page
  1. Bug Bounty Reports & Articles
  2. Takeover's (Accounts, Sub-domains, etc)

Sub Domain Takeover

PreviousTakeover's (Accounts, Sub-domains, etc)NextAccount Takeover

Last updated 1 month ago


1๏ธโƒฃ
๐Ÿšก
What I learnt from reading 217* Subdomain Takeover bug reports.Medium
Subdomain takeover via AWS s3 bucketInfoSec Write-ups
Simple Subdomain TakeoverInfoSec Write-ups
Subdomain TakeoverBePractical Blogs
Subdomain Takeover in Azure: making a PoCGoDiego
Logo
Subdomain Takeover: Starbucks points to AzurePatrik Hudak
Subdomain Takeover: Yet another Starbucks casePatrik Hudak
Subdomain Hijacking Of Any Qwilrโ€™s Customer - 0xPrialPrial Islam - Ethical Hacker | Cyber Security Researcher
Unclaimed Medium Publication takeover in WeTransfer - 0xPrialPrial Islam - Ethical Hacker | Cyber Security Researcher
Subdomain takeover due to misconfigured project settings - 0xPrialPrial Islam - Ethical Hacker | Cyber Security Researcher
UBER Wildcard Subdomain Takeover | BugBounty POCSecurity Breached Blog
Subdomain Takeover worth 200$Medium
Subdomain Takeover Through Expired Cloudfront Distribution | live.lamborghini.com - Security Breached BlogSecurity Breached Blog
Subdomain Takeover leading to Full Account TakeoverHacktus
Dangling DNS: AWS EC2InfoSec Write-ups
Fastly Subdomain Takeover $2000Medium
How i buy a subdomain of Tokopediaโ€™s website (yeah you read it right)InfoSec Write-ups
The unexpected bounty: a story of Zendesk takeover on REDACTED.comInfoSec Write-ups
Unauthorized Sign-up on Subdomain of Subdomain leading to Organization takeover worth $2000InfoSec Write-ups
Again? Subdomain takeover via ideanote.ioMedium
Subdomain takeover via nolt.ioMedium
How I Took Over 2 Subdomains with Azure CDN Profilesm0chan Blog - Info Sec, CTF & Hacking
Logo
Weird "Subdomain Take Over" pattern of Amazon S3 | by secureITmania | in entersoftsecurity - Freedium
Passive Recon with Spyse (Part-II)remonsec
How i hijacked 12 Subdomains in one ProgramMedium
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo