Is your code secure? Use this FREE tool (CodeSec) to find out: bit.ly/3tcPUQx TOOLS USED IN THIS VIDEO --------------------------------------------------- - AMASS: github.com/OWASP/Amass (find subdomains) -TakeOver: github.com/m4ll0k/takeover (subdomain takeover vulnerability scanner) -Dig (apt install dig) 🔥🔥Join Hackwell Academy!: ntck.co/NCAcademy 0:00 ⏩ Intro 0:18 ⏩ How subdomain takeover works 1:59 ⏩ Why Subdomain takeovers are dangerous 2:33 ⏩ Make sure your code is secure using codesec! 4:06 ⏩ find our targets subdomains using Amass 5:06 ⏩ The username is not available 5:57 ⏩ IT actually worked!! 6:17 ⏩ Once you’re in github… 6:58 ⏩ The same thing can happen with Azure 7:45 ⏩ so how do you protect your website
@karim37412 жыл бұрын
Hey chuck (apt install dig) will not work 😊 its (apt install dnsutils)
@owengames7567 Жыл бұрын
hey your comment section is botted lol
@rdahlinger4509 Жыл бұрын
Do you have any recommendations for someone who bought a new computer and the staples set it up in a bad way with admins and a fake windows defender that I can’t seem to figure out how to fix. I have Apache licenses and open sources and all of this stuff I have no idea how to fix. Thoughts?
@homemedia43252 жыл бұрын
This goes even deeper... you own a DNS name and then abandon it after several years... (perhaps an unforeseen event or your start-up fails)... Some 3rd party eventually purchased my old domain and used the way back machine to re-create the website... WARNING... think hard before abandoning a domain name!
@tristunalekzander56082 жыл бұрын
I don't get it, if the website is deployed from github, why would you ever delete your github account? You would have probably switched to another repo or just uploaded the files directly to your server before you delete your account while your website is still dependent on it. I also don't understand why this is only a vulnerability with subdomains.
@lampagiul2 жыл бұрын
because you cannot create CNAME records for root domains
@LuminousWhispers11 Жыл бұрын
You just have to delete the resource and not alter the dns records. Remember this was a demonstration.
@777Yashobeamofchrist Жыл бұрын
Guys, question. If you have control of the main domain and delete the entry for the subdomain that was took over, that would be the end off correct? Or is there a way to take full control of asub domain regardless of the main domain DNS records?
@LuminousWhispers11 Жыл бұрын
@@777Yashobeamofchrist Yes, if you delete the dns records then no one can hijack the subdomain.
@777Yashobeamofchrist Жыл бұрын
@@LuminousWhispers11 thanks Rashad, do you know why some people claim bounty rewards to give subdomain back if it's as easy as deleting the record on root? That's what confuses me
@n10272 жыл бұрын
Thanks for your video. I learns a lot and useful to my job.
@FunctionGermany2 жыл бұрын
i feel like this video was inspired by the "Avoiding DNS Pain" NDC talk that was uploaded 3 weeks ago. they cover this exact problem and also one solution (basically DNS as code like infrastructure as code).
@NiceOwl84 Жыл бұрын
This happens all the time even for large companies including microsoft, amazon, walmart, etc that people use subdomains to send spam mail from the main domain from the actual company making hard to block spam mail because you can't just block the email address or the domain because you might actually want email from the actual company. Most email services don't allow blocking subdomains only email addresses themselves or primary domains. So people just make infinite amounts of sub domains for the primaries of an actual companies domains making it hard to block spam. At times it almost feels like the spammer have hacked the mail servers themselves and using it to spam and it's even funner when they are able to send spam mail out with no email address at all because the servers don't check to see is the account sending actually exist or even cares if the send mail is blank. It's even more fun when some emails services have auto avatar and names loading that get associated with the spammers email making it even look more like a real email. It's kind of hard for me to explain this lol.
@M3laku2 жыл бұрын
Remember kids ... it's always DNS, always.
@StrokeMahEgo2 жыл бұрын
The worst part of this...as an end user, there is really no way of knowing if this happened. You can get an SSL certificate for the redirected subdomain, which means HTTPS will work fine.
@404-null2 жыл бұрын
Love your content.....keep doing great things!
@MikeHarris19842 жыл бұрын
For my company, our security requires any external facing sub domains can only be on 443, no 80 or re-directs like this shown. The owner has the attest to it and put new certs every 90 days and we monitor all external facing URL's. This is a serious open window that a lot of corporations do not even bother to worry about. But I'm glad I work with and lead one of the best IT security teams in my industry where we are constantly 5 steps further then what is required for our various regulations (PCI/ISO/SEC/FRB/etc...)
@shadowdragon97062 жыл бұрын
Thanks for the video Chuck! It will definitely all the website developers!
@MM-hh Жыл бұрын
Always remember kids - "It's only for educational purposes"
@LifeDigger2004 Жыл бұрын
Thanks for this vid! I have been looking into domain take over a bit recently and this really clears it up for me.
@Asherstitusworld2 жыл бұрын
Super video Chuck Your videos are awesome And informative 👍🏿
@calisthenicarts3122 жыл бұрын
I saw something recently call no-code programming. Can you give your perspective on it?
@Props-Production2 жыл бұрын
Mr Beast Game sweatshirt 😂😂😂 btw. i love your videos!
@mwansa430 Жыл бұрын
Your new studio is nice .... but I like the previous one more😂😅
@willyjancke26222 жыл бұрын
Now I know the difference between real voice chuck and content creator chuck. BTW luv the videos !
@veteranashoe2 жыл бұрын
Nice new studio 🤩
@resourcezander2 жыл бұрын
NetworkChuck: You'res could be next Me who dosent have money for domain: yes.
@PuneriLatika2 жыл бұрын
LESGOOO FIRST COMMENT! keep the vids coming love your content
@sachinbhujel9092 жыл бұрын
you are doing such a fabulous job 😜
@brightjoseph99472 жыл бұрын
Another video by chuck Thank Goodness
@edwardlenovo3240 Жыл бұрын
There are actually some commercial vendors that do monitor for this kind of stuff (RiskIQ being one), it's not cheap, but it does do a decent job of detecting this.
7 ай бұрын
You are better than any AI !
@The_Motivation_Never_Stops2 жыл бұрын
Amazing video. Also can we get a kali Linux intro series
@vivekpandey952 жыл бұрын
Great video, please coninue making these kinds of videos
@najemhaddad84092 жыл бұрын
Keep going men I love your content it's very helpful thank you ♥️
@dany_cool90922 жыл бұрын
Best prevention is to not have a website
@gamingjoe99052 жыл бұрын
Underrated comment
@isaaccerreto86622 жыл бұрын
yes.
@bendorman29302 жыл бұрын
Or don't create cname entries in your dns record for domains that you don't control
@dakoderii42212 жыл бұрын
🤔
@DendrocnideMoroides2 жыл бұрын
Even better is to not be alive
@InfamousKoala2 жыл бұрын
I love your content so much chuck
@scottb40292 жыл бұрын
There is somebody exploiting your number 2 before you had a chance to film. Proof positive that somebody is always trying to mess with your sh*t.
@SetYourBarTo102 жыл бұрын
…that was quick. I am glad I grabbed my small coffee mug.
@MinexCSGO Жыл бұрын
Now this is something of my interest
@localadm2 жыл бұрын
Great vid. subfinder, sublist3r, findomain, assetfinder, subjack and subzy can be used for that purpose too. :)
@neenus Жыл бұрын
Just curious what is your input in the targets.txt file ?
@777Yashobeamofchrist Жыл бұрын
Nice video, just a question. If you have control of the main domain and delete the entry for the subdomain that was took over, that would be the end off correct? Or is there a way to take full control of asub domain regardless of the main domain DNS records?
@cxl520 Жыл бұрын
Yes, they won't be able to use your domain name anymore. Unless your registered domain name is also controlled.
@777Yashobeamofchrist Жыл бұрын
@@cxl520 thx xl c
@mainchannel-l9x Жыл бұрын
he won't tell you. you need to pay. network cuck is useless. David Bombal is 10x better.
@Deetje12122 жыл бұрын
Is there a free hacking software for Windows? Like the one you use in Linux but then for Windows?
@georgesporos25732 жыл бұрын
Yes but if you use A record instead of CNAME aren't you more safe?
@jrfrazier75982 жыл бұрын
No you would have to use a CNAME in this case since you do not have IP access to Github's servers to redirect your site when requests are received for your subdomain. However, if you simply delete he CNAME in your DNS config, the crisis will be averted.
@brolbucht5558 Жыл бұрын
What about a subdomain takeover with Fastly?
@kerimayvaz93652 жыл бұрын
Great video as always. I notice that you display the ANM27T! I just got some too!
@imranmohsin9545 Жыл бұрын
This is as powerful as giving Blue tick for 8$ and achieve any identification and status with a unethical or biased thoughts
@knrd_36072 жыл бұрын
MrBeast Gaming Hoodie. Like a KING
@DavidMaciasPhoto2 жыл бұрын
Thank you for this very informative video, so could you please do a video on the best method to secure DNS and a site? Thanks.
@bendorman29302 жыл бұрын
Don't create cname entries in your dns for domains that you don't control
@amazonserver2844 Жыл бұрын
Cloudflare
@Mimimo2 жыл бұрын
Thank you sir for another great video, been getting much great lesson from your channel 👍
@JustBCA Жыл бұрын
I bet you are...
@bendorman29302 жыл бұрын
Love your videos. Always awesome. Something I have always been curious about. What do you use to draw on your desktop?
@bendorman29302 жыл бұрын
I love how on a how to hack channel, an impersonator of network chuck tried to get me to IM him. I don't think so idiot.
@danjaymz2 жыл бұрын
He uses a graphics tablet on Photoshop, with a green background. Then keys the green out in post. Or at least he used to!
@Naath0002 жыл бұрын
loved your all content sir
@exoticlol2 жыл бұрын
That's something big companies wouldn't do. Nice video, but no big company would do this.
@kuzenerissda69092 жыл бұрын
I hold ANM27T. Very promising project, and its ecosystem maintains complete anonymity
@drac.962 жыл бұрын
This is terrifying.
@estrellatwins13312 жыл бұрын
@networkchuck can you please make a video of your tools and gadgets?! We need to know. Like a tour of your desk :p
@App_galaxy2 жыл бұрын
Hey bro, love your content a lot
@App_galaxy2 жыл бұрын
No worries man, I've always been here watching your better content
@X-razcal-X2 жыл бұрын
So cool content and so less likes. Shame in you guys. Thanks for this.
@petarkolev69282 жыл бұрын
Very very interesting video, sir puted in a very cool and funny way :) You got a sub from me!
@yavuzsatcapar6967 Жыл бұрын
is it possible to takeover the maindomain from a subdomain ? Greets
@K1Pfand Жыл бұрын
thought the same thing
@Test11One-m8n Жыл бұрын
How to run tool in kalilinux from any path ?
@TMoneyJones2 жыл бұрын
* Insert gif of Captain Holt saying “Bingpot!” here *
@pavi013 Жыл бұрын
I didnt know about this, looks scary.
@muhammedabdulrazak90962 жыл бұрын
Sorry I don't understand the part that you created file called fun html.
@jaybiddy955 Жыл бұрын
4:15 is all of us before we found you
@kaosomerk42112 жыл бұрын
New week up as many FOMO in. But the ANM27T story isn’t over yet. The only strat that works under all circumstances is DCA all the time with solid, large companies (not hyped ones).
@innotechtips2 жыл бұрын
I'm loving this!!
@hericerikvar79382 жыл бұрын
Bro, i bought ANM27T in September after your video. i'm up 79%.
@YASIRSHAIKH-mm8ci Жыл бұрын
Please make videos on (Bug Bounty) techniques..........
@devanshtripathi72342 жыл бұрын
Love your videos ❤
@arpitgoyal20352 жыл бұрын
Did mr. Beast sponsor this video btw i love your video
@Orlando.Villanueva2 жыл бұрын
CodeSec!! 🎉
@MikeHarris19842 жыл бұрын
Its always DNS when something bad happens... when there is access issues, its always the network... ALWAYS!!! when I call our NOC "Oh, thats odd, just a second... okay I didnt find anything wrong, can you try again?" "wth its working now!??!" "Yeah, there was nothing over here, musta been a bug on your side" This is every convo with a network admin ever... they always fix a little mistake they found but never fess up to it...
@jasperverbruggen460 Жыл бұрын
I have a question. Is this DNS rebinding?
@Yamayaga2 жыл бұрын
Will you make any research videos about ANM27T
@roykisho70862 жыл бұрын
This man got me all the time 🔥💥
@ardaar10342 жыл бұрын
The reason I got ANM27T is because I believe decentralization is more important than anything else.
@Hmm-c2t Жыл бұрын
what happens if I go to a suspicious link and it crosses out and clears the log, can the page still retrieve data?
@tasfiulhedayet Жыл бұрын
How to get the takeover tool. I didn't find in github
@imkarimkarim_fa3 ай бұрын
second
@developer_hadi2 жыл бұрын
As a front end developer, I understand nothing from the code you wrote
@Ali-lm7uw2 жыл бұрын
He was doing that in Linux terminal, that's not back end Programming
@developer_hadi2 жыл бұрын
@@Ali-lm7uw thanks bro
@Ali-lm7uw2 жыл бұрын
@@developer_hadi yeah, that's bash scripting when using Linux. I am front and back dev too but have to look up the Linux commands always
@developer_hadi2 жыл бұрын
@@Ali-lm7uw I have windows, if I installed linux can I still install cracked apps?
@developer_hadi2 жыл бұрын
@@Ali-lm7uw because I'm using a cracked photoshop and illustrator versions, I don't know if I could do that on linux
@UnknownUser-in1ok2 жыл бұрын
I love this guy, I've learned a lot from you sir
@mainchannel-l9x Жыл бұрын
wtf have you learn? he only presents the basics of basics, for deep learning you need to buy something.
@sosukuestudio22292 жыл бұрын
ANM27T at less than $1. is like BTC at $100. When ANM27T finally blows it's gonna be epic.
@Kurtoglu41532 жыл бұрын
ANM27T has as much potential as ethereum. But unlike ethereum it has a bigger growth potential.
@70nald02 жыл бұрын
make a course on ceh practical
@mtgk-oyuncutv25142 жыл бұрын
What's better holding into crash or being safe with ANM27T tell me
@Usman._2 жыл бұрын
Lesson to be learnt. Don’t use cname record. Specially if you’re going to encrypt using https. Better off using A records. Don’t be lazy!
@mahidalam676111 ай бұрын
TakeOver Script is not available on this user where can i find this exact script?
@snyhper_1394 Жыл бұрын
Awww chuck loves mr beast merch 😌😌😌😌❤️
@0fie.2 жыл бұрын
Nice hairstyle bro!
2 жыл бұрын
This week is hell and a bloodbath can happen but why we don't discuss the fact that Amazon also released their ANM27T in it? Always two sides of a coin
@ward75762 жыл бұрын
It just misses the point on why this can be so effective - if the original creator of the website links it IN his website, it's legit in the eyes of end-user and little to no precaution is taken.
@thbadmin7751 Жыл бұрын
You would need to know that the GETHUB was available and a DNS record was pointing to it....highly unlikely to happen.
@BradleyPitts666 Жыл бұрын
Did you watch the video?
@zadekeys2194 Жыл бұрын
@NetworkChuck - You mention this is untraceable a few times. Off the top of my head, you could get insight via: 1) DNS Token canary (alert when hostname is requested). 2) URL Token canary (alert when URL is visited). Q - Any way to mitigate this with server side permissions or CloudFlare ? I used a PDF canary to track a document (as there was a suspected bad actor) and was able to then get public IP's and some geo data from the WAN they were connected to when opening the document. Proved the suspicion, and then the Executives got talking to the lawyers / police etc.
@IND_SUBODH_GAMING2 жыл бұрын
Wow superb Boss 👍👍
@BaileyMagikz Жыл бұрын
i'm surprised GitHub makes usernames available after only 90 days it should be 365 days same with all socials or logins minimum
@9SMTM6 Жыл бұрын
I don't know how that works precisely, but wouldn't they have to have valid SSL certificates? They could likely get one easy enough, but even for my small domain I get warnings of certificates are issued, so I'd notice if an certificate is issued without it being from me or my services. EDIT: Yup, going by you completing a DNS Challenge you had to get a certificate so that'd protect me. Also I don't point any of my subdomains to some route out of my control, so even not looking for certificates I should be fine as long as that's the case. And even if I do that, these will be the only kind of subdomains attack able with that exploit.
@cxl520 Жыл бұрын
I think the way he showed it from here, you will be using GitHub's certificate? because he points your website to a GitHub website. If you want to know, you can follow his method to find out.
@timecop1983Two10 ай бұрын
takeover moved or was deleted
@Oper8or2 жыл бұрын
NO, its not always DNS! Stopping blaming me! Granted I only manage internal, but still. I'd love to pick your brain about an issue but I ain't got that kind of $$.
@sevval62782 жыл бұрын
How do you feel about ANM27T moving into the nft marketplace? Is it still a buy?.
@ImSecular Жыл бұрын
Same thing I did to take over Facebook account in old days. when an email IDs gets deleted because u didn't logged in for 6 month 😆
@jmr2 жыл бұрын
It's always DNS accept when it's a buffer overflow.
@youtubezalimsehir67322 жыл бұрын
On ANM27T go long when the sell pressure reduce.
@CrankinIt432 жыл бұрын
Gosh darn dangling pointers.
@uhfl6712 жыл бұрын
ANM27T, you've done an amazing job. How are you going to make all of these films and write all of the text in such a short amoun
@God-ld6ll2 жыл бұрын
don't have one, jokes on them 😅.
@krosal35612 жыл бұрын
Everyone waited for Amazon to create ANM27T and the time is ready