Awesome
<h1 align="center">Can I Take Over DNS?<br><sup><sub>A list of DNS providers and whether their zones are vulnerable to DNS takeover!<br><sup> Maintained by</sup> <a target="_blank" href="https://twitter.com/intent/user?screen_name=indianajson"><img src="https://img.shields.io/twitter/follow/indianajson?style=social&label=%40indianajson"/></a> </sub></sup> </h1>Inspired by the popular Can I Take Over XYZ? project by @EdOverflow this project is uniquely oriented towards DNS takeovers. DNS takeovers pose a high threat to companies, warrant high bounties, and are easy to find. We are trying to make this list comprehensive, so please contribute!
Here's a public $500 bounty report for a DNS takeover that I wrote with a thorough explanation to help you understand the issue.
DNS Providers
These companies provide DNS nameserver services to the general public. In this list you will find out whether domains pointing to these nameservers are vulnerable to DNS takeover and where you can learn more about them.
Provider | Status | Fingerprint | Takeover Instructions |
---|---|---|---|
000Domains | Vulnerable <sub><sup>(w/ purchase)</sub></sup> | ns1.000domains.com<br>ns2.000domains.com<br>fwns1.000domains.com<br>fwns2.000domains.com | Issue #19 |
AWS Route 53 | Not Vulnerable | ns-****.awsdns-**.org<br>ns-****.awsdns-**.co.uk<br>ns-***.awsdns-**.com<br>ns-***.awsdns-**.net | Issue #1 |
Azure (Microsoft) | Edge Case | ns1-**.azure-dns.com<br>ns2-**.azure-dns.net<br>ns3-**.azure-dns.org<br>ns4-**.azure-dns.info | Issue #5 |
BigCommerce | Not Vulnerable | ns1.bigcommerce.com<br>ns2.bigcommerce.com<br>ns3.bigcommerce.com | Issue #35 |
Bizland | No New Accounts | ns1.bizland.com<br>ns2.bizland.com<br>clickme.click2site.com<br>clickme2.click2site.com | Issue #3 |
ClouDNS | Not Vulnerable | *.cloudns.net | |
Cloudflare | Not Vulnerable | *.ns.cloudflare.com | Issue #10 |
Digital Ocean | Vulnerable | ns1.digitalocean.com<br>ns2.digitalocean.com<br>ns3.digitalocean.com | Issue #22 |
DNSMadeEasy | Vulnerable | ns**.dnsmadeeasy.com | Issue #6 |
DNSimple | Vulnerable | ns1.dnsimple.com<br>ns2.dnsimple.com<br>ns3.dnsimple.com<br>ns4.dnsimple.com | Issue #16 |
Domain.com | Vulnerable <sub><sup>(w/ purchase)</sub></sup> | ns1.domain.com<br>ns2.domain.com | Issue #17 |
DomainPeople | Not Vulnerable | ns1.domainpeople.com<br>ns2.domainpeople.com | Issue #14 |
Dotster | No New Accounts | ns1.dotster.com<br>ns2.dotster.com<br>ns1.nameresolve.com<br>ns2.nameresolve.com | Issue #18 |
EasyDNS | Not Vulnerable | dns1.easydns.com<br>dns2.easydns.net<br>dns3.easydns.org<br>dns4.easydns.info | Issue #9 |
Gandi.net | Not Vulnerable | a.dns.gandi.net<br>b.dns.gandi.net<br>c.dns.gandi.net | |
Google Cloud | Vulnerable | ns-cloud-**.googledomains.com | Issue #2 |
Hostinger (old NS) | Not Vulnerable | ns1.hostinger.com<br>ns2.hostinger.com | |
Hover | Not Vulnerable | ns1.hover.com<br>ns2.hover.com | Issue #21 |
Hurricane Electric | Vulnerable | ns5.he.net<br>ns4.he.net<br>ns3.he.net<br>ns2.he.net<br>ns1.he.net | Issue #25 |
Linode | Vulnerable | ns1.linode.com<br>ns2.linode.com | Issue #26 |
MediaTemple (mt) | Not Vulnerable | ns1.mediatemple.net<br>ns2.mediatemple.net | Issue #23 |
MyDomain | Vulnerable <sub><sup>(w/ purchase)</sub></sup> | ns1.mydomain.com<br>ns2.mydomain.com | Issue #4 |
Name.com | Vulnerable <sub><sup>(w/ purchase)</sub></sup> | ns1***.name.com<br>ns2***.name.com<br>ns3***.name.com<br>ns4***.name.com | Issue #8 |
namecheap | Not Vulnerable</sup> | *.namecheaphosting.com<br>*.registrar-servers.com | |
Network Solutions | Not Vulnerable | ns**.worldnic.com | Issue #15 |
NS1 | Registration Closed <br><sub>I can help, comment on the linked issue.</sub> | dns1.p**.nsone.net<br>dns2.p**.nsone.net<br>dns3.p**.nsone.net<br>dns4.p**.nsone.net | Issue #7 |
TierraNet | Vulnerable | ns1.domaindiscover.com<br>ns2.domaindiscover.com | Issue #24 |
Reg.ru | Vulnerable <sub><sup><br>(sanctions may stop payments)</sub></sup> | ns1.reg.ru<br>ns2.reg.ru | Issue #28 |
UltraDNS | Not Vulnerable | pdns***.ultradns.com<br>udns***.ultradns.com<br>sdns***.ultradns.com | Issue #29 |
Yahoo Small Business | Vulnerable <sub><sup>(w/ purchase)</sub></sup> | yns1.yahoo.com<br>yns2.yahoo.com | Issue #20 |
Private DNS
These are private nameservers operated by various companies. The general public cannot create zones on these nameservers and thus takeovers are not possible. Knowning nameservers that are private and not vulnerable can be helpful to eliminate false positives from your testing.
Owner | Status | Fingerprint |
---|---|---|
Activision | Not Vulnerable | ns*.activision.com |
Adobe | Not Vulnerable | adobe-dns-0*.adobe.com |
Apple | Not Vulnerable | a.ns.apple.com<br>b.ns.apple.com<br>c.ns.apple.com<br>d.ns.apple.com |
Automattic | Not Vulnerable | ns*.automattic.com |
Capital One | Not Vulnerable | ns*.capitalone.com |
Disney | Not Vulnerable | ns*.twdcns.com<br>ns*.twdcns.info<br>ns*.twdcns.co.uk |
Not Vulnerable | ns*.google.com | |
Lowe's | Not Vulnerable | authns*.lowes.com |
T-Mobile | Not Vulnerable | ns10.tmobileus.com<br>ns10.tmobileus.net |
What is a DNS takeover?
DNS takeover vulnerabilities occur when a subdomain (subdomain.example.com) or domain has its authoritative nameserver set to a provider (e.g. AWS Route 53, Akamai, Microsoft Azure, etc.) but the hosted zone has been removed or deleted. Consequently, when making a request for DNS records the server responds with a
SERVFAIL
error. This allows an attacker to create the missing hosted zone on the service that was being used and thus control all DNS records for that (sub)domain. <!--For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com.-->
You can read more at: https://0xpatrik.com/subdomain-takeover-ns/
A python implementation of DNS takeovers: https://github.com/pwnesia/dnstake
Contributions
We need more DNS providers added to the database with information about their services.
If you want to help out, please check out the getting started guide here.
Press
"How does one know whether a DNS provider is exploitable? There is a frequently updated list published on GitHub called “Can I take over DNS,” which has been documenting exploitability by DNS provider over the past several years."<br>Brian Krebs
"I honestly think this is a great resource for security researchers and bug bounty hunters."<br> @0xpatrik
"A new, but incredibly useful resource.. Essentially, a more modern/accurate can-i-take-over list for the STO you likely don't yet know about"<br> Michael Skelton, Director of Security @ BugCrowd
"Still trying to find your first domain/subdomain takeover vulnerability? Go to indianajson/can-i-take-over-dns for a curated DNS takeover list. "<br>Intigriti, Bug Bounty Platform
"There's this excellent resource on GitHub... which has a list of nameservers... that you can perform takeovers on, so I think this is an excellent resource" <br>Shubham Shah, CTO of Assetnote
.