Attacking DNS
Last updated
Last updated
Related Websites:
The (DNS
) translates domain names (e.g., hackthebox.com) to the numerical IP addresses (e.g., 104.17.42.72). DNS is mostly UDP/53
, but DNS will rely on TCP/53
more heavily as time progresses. DNS has always been designed to use both UDP and TCP port 53 from the start, with UDP being the default, and falls back to using TCP when it cannot communicate on UDP, typically when the packet size is too large to push through in a single UDP packet. Since nearly all network applications use DNS, attacks against DNS servers represent one of the most prevalent and significant threats today.
DNS holds interesting information for an organization. As discussed in the Domain Information section in we can understand how a company operates and the services they provide, as well as third-party service providers like emails.
The Nmap -sC
(default scripts) and -sV
(version scan) options can be used to perform initial enumeration against the target DNS servers:
A DNS zone is a portion of the DNS namespace that a specific organization or administrator manages. Since DNS comprises multiple DNS zones, DNS servers utilize DNS zone transfers to copy a portion of their database to another DNS server. Unless a DNS server is configured correctly (limiting which IPs can perform a DNS zone transfer), anyone can ask a DNS server for a copy of its zone information since DNS zone transfers do not require any authentication. In addition, the DNS service usually runs on a UDP port; however, when performing DNS zone transfer, it uses a TCP port for reliable data transmission.
An attacker could leverage this DNS zone transfer vulnerability to learn more about the target organization's DNS namespace, increasing the attack surface. For exploitation, we can use the dig
utility with DNS query type AXFR
option to dump the entire DNS namespaces from a vulnerable DNS server:
Domain takeover
is registering a non-existent domain name to gain control over another domain. If attackers find an expired domain, they can claim that domain to perform further attacks such as hosting malicious content on a website or sending a phishing email leveraging the claimed domain.
Domain takeover is also possible with subdomains called subdomain takeover
. A DNS's canonical name (CNAME
) record is used to map different domains to a parent domain. Many organizations use third-party services like AWS, GitHub, Akamai, Fastly, and other content delivery networks (CDNs) to host their content. In this case, they usually create a subdomain and make it point to those services. For example,
The domain name (e.g., sub.target.com
) uses a CNAME record to another domain (e.g., anotherdomain.com
). Suppose the anotherdomain.com
expires and is available for anyone to claim the domain since the target.com
's DNS server has the CNAME
record. In that case, anyone who registers anotherdomain.com
will have complete control over sub.target.com
until the DNS record is updated.
Sometimes internal physical configurations are poorly secured, which we can exploit to upload our tools from a USB stick. Another scenario would be that we have reached an internal host through pivoting and want to work from there. Of course, there are other alternatives, but it does not hurt to know alternative ways and possibilities.
The tool has found four subdomains associated with inlanefreight.com
. Using the nslookup
or host
command, we can enumerate the CNAME
records for those subdomains.
The support
subdomain has an alias record pointing to an AWS S3 bucket. However, the URL https://support.inlanefreight.com
shows a NoSuchBucket
error indicating that the subdomain is potentially vulnerable to a subdomain takeover. Now, we can take over the subdomain by creating an AWS S3 bucket with the same subdomain name.
DNS spoofing is also referred to as DNS Cache Poisoning. This attack involves altering legitimate DNS records with false information so that they can be used to redirect online traffic to a fraudulent website. Example attack paths for the DNS Cache Poisoning are as follows:
An attacker could intercept the communication between a user and a DNS server to route the user to a fraudulent destination instead of a legitimate one by performing a Man-in-the-Middle (MITM
) attack.
Exploiting a vulnerability found in a DNS server could yield control over the server by an attacker to modify the DNS records.
To exploit the DNS cache poisoning via Ettercap
, we should first edit the /etc/ettercap/etter.dns
file to map the target domain name (e.g., inlanefreight.com
) that they want to spoof and the attacker's IP address (e.g., 192.168.225.110
) that they want to redirect a user to:
Next, start the Ettercap
tool and scan for live hosts within the network by navigating to Hosts > Scan for Hosts
. Once completed, add the target IP address (e.g., 192.168.152.129
) to Target1 and add a default gateway IP (e.g., 192.168.152.2
) to Target2.
Activate dns_spoof
attack by navigating to Plugins > Manage Plugins
. This sends the target machine with fake DNS responses that will resolve inlanefreight.com
to IP address 192.168.225.110
:
After a successful DNS spoof attack, if a victim user coming from the target machine 192.168.152.129
visits the inlanefreight.com
domain on a web browser, they will be redirected to a Fake page
that is hosted on IP address 192.168.225.110
:
In addition, a ping coming from the target IP address 192.168.152.129
to inlanefreight.com
should be resolved to 192.168.225.110
as well:
Question: Find all available DNS records for the "inlanefreight.htb" domain on the target name server and submit the flag found as a DNS record as the answer.
We have an IP 10.129.203.6
We need to find DNS records of available subdomains
Add the IP address to resolve to inlanefreight.htb
in /etc/hosts:
Now we need to find subdomains that could be associated with inlanefreight.htb
.:
We first add the IP address to resolvers file (because this is an exercise, otherwise we would use the given one for public IPs). Then we use the domain, and supply a wordlist of subdomains and specify the resolver.
We find that hr.inlanefreight.htb
was found:
Now that we have a subdomain, we can use dig to check the dns records:
We see the flag in the TXT record for hr.inlanefreight.htb
One of the biggest dangers of a subdomain takeover is that a phishing campaign can be launched that is considered part of the official domain of the target company. For example, customers would look at the link and see that the domain customer-drive.inlanefreight.com
(which points to a nonexisting S3 bucket from AWS) is behind the official domain inlanefreight.com
and trust it as a customer. However, the customers do not know that this page has been mirrored or created by an attacker to provoke a login by the company's customers, for example.
Therefore, if an attacker finds a CNAME
record in the company's DNS records that points to a subdomain that no longer exists and returns an HTTP 404 error
, this subdomain can most likely be taken over by us through the use of the third-party provider. A subdomain takeover occurs when a subdomain points to another domain using the CNAME record that does not currently exist. When an attacker registers this nonexistent domain, the subdomain points to the domain registration by us. By making a single DNS change, we make ourselves the owner of that particular subdomain, and after that, we can manage the subdomain as we choose.
What happens here is that the existing subdomain no longer points to a third-party provider and is therefore no longer occupied by this provider. Pretty much anyone can register this subdomain as their own. Visiting this subdomain and the presence of the CNAME record in the company's DNS leads, in most cases, to things working as expected. However, the design and function of this subdomain are in the hands of the attacker.
1.
The source, in this case, is the subdomain name that is no longer used by the company that we discovered.
Source
2.
The registration of this subdomain on the third-party provider's site is done by registering and linking to own sources.
Process
3.
Here, the privileges lie with the primary domain owner and its entries in its DNS servers. In most cases, the third-party provider is not responsible for whether this subdomain is accessible via others.
Privileges
4.
The successful registration and linking are done on our server, which is the destination in this case.
Destination
This is when the cycle starts all over again, but this time to trigger the forwarding to the server we control.
5.
The visitor of the subdomain enters the URL in his browser, and the outdated DNS record (CNAME) that has not been removed is used as the source.
Source
6.
The DNS server looks in its list to see if it has knowledge about this subdomain and if so, the user is redirected to the corresponding subdomain (which is controlled by us).
Process
7.
The privileges for this already lie with the administrators who manage the domain, as only they are authorized to change the domain and its DNS servers. Since this subdomain is in the list, the DNS server considers the subdomain as trustworthy and forwards the visitor.
Privileges
8.
The destination here is the person who requests the IP address of the subdomain where they want to be forwarded via the network.
Destination
Tools like can also be used to enumerate all DNS servers of the root domain and scan for a DNS zone transfer:
Before performing a subdomain takeover, we should enumerate subdomains for a target domain using tools like . This tool can scrape subdomains from open sources like . Other tools like can also be used to brute-force subdomains by supplying a pre-generated wordlist:
An excellent alternative is a tool called . This tool allows us to use self-defined resolvers and perform pure DNS brute-forcing attacks during internal penetration tests on hosts that do not have Internet access.
The repository is also an excellent reference for a subdomain takeover vulnerability. It shows whether the target services are vulnerable to a subdomain takeover and provides guidelines on assessing the vulnerability.
From a local network perspective, an attacker can also perform DNS Cache Poisoning using MITM tools like or .
We can find thousands of subdomains and domains on the web. Often they point to no longer active third-party service providers such as AWS, GitHub, and others and, at best, display an error message as confirmation of a deactivated third-party service. Large companies and corporations are also affected time and again. Companies often cancel services from third-party providers but forget to delete the associated DNS records. This is because no additional costs are incurred for a DNS entry. Many well-known bug bounty platforms, such as , already explicitly list Subdomain Takeover
as a bounty category. With a simple search, we can find several tools on GitHub, for example, that automate the discovery of vulnerable subdomains or help create Proof of Concepts (PoC
) that can then be submitted to the bug bounty program of our choice or the affected company. RedHuntLabs did a on this in 2020, and they found that over 400,000 subdomains out of 220 million were vulnerable to subdomain takeover. 62% of them belonged to the e-commerce sector.
Source:
Subdomain takeover can be used not only for phishing but also for many other attacks. These include, for example, stealing cookies, cross-site request forgery (CSRF), abusing CORS, and defeating content security policy (CSP). We can see some examples of subdomain takeovers on the , which have earned the bug bounty hunters considerable payouts.