subjack is a Hostile Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that are able to be hijacked. With Go's speed and efficiency, this tool really stands out when it comes to mass-testing. Always double check the results manually to rule out false positives.
You need have Go installed. Full details of installation and set up can be found here.
go build subjack.go
How To Use:
./subjack -w domains.txt -t 100 -timeout 30 -o results.txt -https
-w domains.txtis your list of subdomains. I recommend using
cname.sh(included in repository) to sift through your subdomain list for ones that have CNAME records attached and use that list to optimize and speed up testing.
-tis the number of threads (Default: 10 threads).
-timeoutis the seconds to wait before timeout connection (Default: 10 seconds).
-o results.txtwhere to save results to (Optional).
-httpsenforces https requests which may return a different set of results and increase accuracy (Optional).
- Amazon S3 Bucket
- Amazon Cloudfront
- Help Scout
- WP Engine
scanio.shwhich is kind of a PoC script to mass-locate vulnerable subdomains using results from Rapid7's Project Sonar. This script parses and greps through the dump for desired CNAME records and makes a large list of subdomains to check with subjack if they're vulnerable to Hostile Subdomain Takeover. Of course this isn't the only method to get a large amount of data to test.
Linux Mac Python Scan Subdomain SubDomain Analyzer Subdomain Discovery Tool Subdomain Scanner subjack Windows