Skip to content

Worksites Takeover Detection

ID: worksites-takeover

Severity: high

Author: melbadry9,dogasantos

Tags: takeover,dns

Worksites takeover was detected.

id: worksites-takeover
info:
name: Worksites Takeover Detection
author: melbadry9,dogasantos
severity: high
description: Worksites takeover was detected.
reference:
- https://melbadry9.gitbook.io/blog/dangling-dns/xyz-services/ddns-worksites
metadata:
verified: true
max-request: 2
tags: takeover,dns
dns:
- name: "{{FQDN}}"
type: A
class: inet
recursion: true
retries: 3
matchers:
- type: word
words:
- "69.164.223.206"
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: dsl
dsl:
- Host != ip
- type: word
words:
- "Company Not Found"
- "worksites.net"
condition: and
- type: status
status:
- 404
extractors:
- type: dsl
dsl:
- cname
# digest: 4a0a004730450220357b72fdd509a091904bebbeae1b0b8e9dd483444ec402e96867741daec2c869022100e405bccd3c41fc42aa4fb5f79b6ad04ac027c6734712cad64e3cbb62c29b3e55:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/takeovers/worksites-takeover.yaml"

View on Github