A Guide to DNS Takeovers: The Misunderstood Cousin of Subdomain Takeovers IntroductionLet's start with this: A DNS takeover is not the same as a subdomain takeover. Subdomain takeovers are old news. Hackers who caught onto them early made busloads of bounties by automating their detection and exploitation. They're still out there, but competition is fierce. Crafty hackers built bots that detect an
1. å§ãã« ããã«ã¡ã¯ãmorioka12 ã§ãã æ¬ç¨¿ã§ã¯ãAmazon EC2 ä¸ã§åã Web ã¢ããªã±ã¼ã·ã§ã³ã®èå¼±æ§ã«ãã£ã¦èå¼±æ§æ»æãå¯è½ã ã£ãå®éã®äºä¾ã«ã¤ãã¦ç´¹ä»ãã¾ãã 1. å§ãã« 2. Amazon EC2 ã«ãããã»ãã¥ãªãã£ãªã¹ã¯ Amazon EBS 被害ããã£ãå ¬éäºä¾ 3. Amazon EC2 ã§èµ·ããããèå¼±æ§æ»æ SSRF ãå¯è½ãªèå¼±æ§ SSRF ã«ãããåé¿æ¹æ³ 4. Amazon EC2 ã®èå¼±ãªå ±åäºä¾ ç»åèªã¿è¾¼ã¿æ©è½ã«æ½ã SSRF ãæªç¨ãã EC2 ã®ã¯ã¬ãã³ã·ã£ã«ã®ä¸æ£å ¥æãå¯è½ SAML ã¢ããªã±ã¼ã·ã§ã³ã«æ½ã SSRF ãæªç¨ãã EC2 ã®ã¯ã¬ãã³ã·ã£ã«ã®ä¸æ£å ¥æãå¯è½ Webhook æ©è½ã«æ½ã SSRF ãæªç¨ãã EC2 ã®ã¯ã¬ãã³ã·ã£ã«ã®ä¸æ£å ¥æãå¯è½ Webhook æ©è½ã«æ½ã SSRF ãæªç¨ãã EC2 ã®ã¯ã¬ã
Hello there, ('Ï')ã AWS S3 ãã±ããã®è¨å®ãã¹ã«ããèå¼±æ§ã§æ å ±æ¼ããã¨ãµããã¡ã¤ã³ã®ä¹ã£åããã èå¼±æ§ï¼ AWS ã®è¨å®ãã¹ è¨äºï¼ https://medium.com/@gguzelkokar.mdbf15/hatal%C4%B1-yap%C4%B1land%C4%B1r%C4%B1lm%C4%B1%C5%9F-aws-s3-bucket-%C3%BCzerinde-bulunan-g%C3%BCvenlik-a%C3%A7%C4%B1%C4%9F%C4%B1n%C4%B1n-yaratt%C4%B1%C4%9F%C4%B1-etkiler-cb073179360d ä»åã¯ãHackerOne ãã©ãããã©ã¼ã ã«æ¥ç¶ããã¦ããæ°éä¼æ¥ã§ã çºè¦ããã»ãã¥ãªãã£ã®èå¼±æ§ã«ã¤ãã¦ã ã¾ãã¯ãæ»æå´ã¨é²å¾¡å´ã®ä¸¡æ¹ã調ã¹ã¦ã ä¼ç¤¾åã XYZ ã¨ããã¨ã ï¼ï¼çºè¦
Route53ã®Aã¬ã³ã¼ãã§ææãã¦ããªãEIPããããªãã¯IPãè¨å®ããã¦ããªãããGhostbusterãã使ã£ã¦ææ¡ãã¦ã¿ã ããã«ã¡ã¯ãã³ã³ãµã«é¨ï¼ 大éªãªãã£ã¹ã®Todaã§ãã Route53ã¨EC2ãå©ç¨ããä¸ã§Elastic IP(EIP)ããããªãã¯IPãAã¬ã³ã¼ãã«è¨å®ãã¦ãã¤ã³ã¹ã¿ã³ã¹ç ´æ£ãEIP解æ¾æã«æ¶ãå¿ããã¨ãããçµé¨ã¯ããã¾ããã§ããããï¼ æ¶ãå¿ããAã¬ã³ã¼ãã¯æªæã®ããã¦ã¼ã¶ã«IPãååå¾ããã¦ãµããã¡ã¤ã³ä¹ã£åãã«ã¤ãªããå ´åããããã¾ãã ä»åã¯Route53ã®Aã¬ã³ã¼ãã§ãææãã¦ããªãEIPããããªãã¯IPãè¨å®ããã¦ããªããã Ghostbusterã¨ãããã¼ã«ãå©ç¨ãã¦ç¢ºèªãã¦ã¿ã¾ããã â Github assetnote / ghostbuster https://github.com/assetnote/ghostbuster Route5
ææ°ã®ã¬ãã¼ããDefender's Advantageï¼é²å¾¡å´ã®åªä½æ§ - ãµã¤ãã¼ã»ã¹ãããã·ã§ãããã®è¨äºãã¤ã³ã¿ã¼ãããã«æ¥ç¶ããã¦ããä¸è¬çãªã¨ã¯ã¹ããã¤ãçµè·¯ãæ¤ç¥ãããã«ããã¦ãMandiantã¯æ»æã®çµè·¯ã¨ãªãå¾ãã¤ã³ã¿ã¼ãããä¸ã§ä¸æ£ã«å ¬éããã¦ãããã¹ãç¹å®ãã¾ããããã®ããã°ã§ã¯ãå¤é¨è³ç£ã®ã»ãã¥ãªãã£å¼·åã«é¢ããMandiantã®æ¨å¥¨äºé ãã¾ã¨ãã¦ãã¾ãã å³1ï¼ Mandiant Advantage Attack Surface Managementã«ãã観å¯ãããåé¡ããã5ï¼2022å¹´1æ1æ¥ï½2022å¹´3æ31æ¥ï¼å¤é¨ã¢ã»ããã®æ¢ç´¢ããªã¹ãã¢ãããä¸æ£å ¬éã®æ¤ç¥Â   æ»æè ã¯ãèå¼±ãªå¤é¨ã¢ã»ããã è¨å®ãã¹ãã¨ã³ããªãã¤ã³ãï¼åæä¾µå ¥ãã¯ã¿ã¼ï¼ã¨ãã¦å©ç¨ããåµå¯ãæ°´å¹³å±éãã¢ã¯ã»ã¹ã®ç¶æãå³ããããã·ã§ã³ãéæãããã¨ãã¾ããå¤é¨ã¢ã»ãããæªç¨ããæåã®ä¾µ
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}