Subdomain takeover tester
Why Choose This Project
Subdomain takeovers are a common security risk where attackers gain control of unclaimed or misconfigured subdomains, potentially defacing websites, stealing data, or launching phishing campaigns. Traditional monitoring often misses unclaimed subdomains or DNS misconfigurations. This project provides a web-based platform to automatically detect vulnerable subdomains, helping organizations proactively secure their domain infrastructure.
What You Get
A web-based tool that scans all subdomains of a given domain, checks for misconfigurations or unclaimed resources, and identifies potential takeover risks. Administrators can generate reports, visualize vulnerable subdomains, and receive alerts when new subdomains become vulnerable. Ideal for security teams, pentesters, and DevOps engineers to maintain domain security hygiene.
Key Features
| Feature | Description |
|---|---|
| User Authentication | Secure login for admins and security personnel |
| Domain Scanning | Scan all subdomains for a given root domain |
| Misconfiguration Detection | Identify unclaimed CNAME records, expired cloud resources, or dangling DNS |
| Vulnerability Reporting | Generate reports with details of potential takeover targets |
| Alert Notifications | Email/SMS alerts for newly detected vulnerable subdomains |
| Dashboard Visualization | Visual representation of vulnerable vs safe subdomains |
| Audit Logs | Maintain logs of scans, alerts, and administrative actions |
| Integration API | Optional REST API for integrating scanning results with internal tools |
Technology Stack
| Layer | Technology |
|---|---|
| Frontend Layer | HTML, CSS, JavaScript, Bootstrap for responsive UI |
| Backend Layer | Node.js (Express) / Java Spring Boot / Python Flask |
| Database Layer | MongoDB / MySQL / PostgreSQL for storing scan results and vulnerability logs |
| DNS & HTTP Analysis Layer | Python libraries (dnspython, requests), Node.js DNS modules |
| Security Layer | HTTPS, JWT / OAuth2 for authentication and role-based access |
| Optional Libraries & APIs | Email/SMS APIs for alerts, Chart.js/D3.js for dashboard visualizations |
Working Flow
-
User Login – Secure authentication for admins or security personnel.
-
Domain Input – User provides a root domain to scan.
-
Subdomain Enumeration – System enumerates all subdomains using public records and DNS queries.
-
Vulnerability Check – Each subdomain is checked for dangling CNAMEs, unclaimed cloud resources, and misconfigurations.
-
Risk Assessment – Assign severity based on the likelihood of takeover and criticality of the service.
-
Report Generation – Generate a report listing vulnerable subdomains, findings, and recommended remediation.
-
Dashboard & Alerts – Visualize safe vs vulnerable subdomains and send notifications for critical findings.
-
Audit Logging – Track scans, detected vulnerabilities, and notifications for compliance.
Main Modules
-
Authentication Module → Secure login and role management
-
Subdomain Enumeration Module → Discover all subdomains of a given domain
-
Vulnerability Detection Module → Identify potential takeover risks using DNS checks and HTTP analysis
-
Report Module → Generate detailed vulnerability reports
-
Dashboard Module → Visualize scan results and risk distribution
-
Alert Module → Notify admins of newly detected vulnerable subdomains
-
API Module → Optional REST API to provide scan results to other internal tools
Security Features
-
HTTPS-secured portal and API endpoints
-
JWT/OAuth2 authentication for access control
-
Role-based access for admins and testers
-
Audit logging for all scans, findings, and notifications
-
Real-time alerts for newly discovered subdomain vulnerabilities
-
Optional IP and access restriction for high-security environments