domain takeover
Description
Domain takeover occurs when an attacker gains control of a domain due to misconfigurations, expired services, or DNS vulnerabilities. This allows the attacker to redirect traffic, impersonate the domain, and potentially steal sensitive information.
Remediation
- Remove or update DNS records that point to unused or expired domains.
- Implement strict access controls and regularly audit domain ownership.
- Use domain registrar features like domain locking to prevent unauthorized changes.
- Regularly monitor and renew domain registrations to prevent expiration.
- Implement security measures such as DNSSEC to protect DNS records.
- Conduct regular security assessments to identify potential domain vulnerabilities.
- Educate staff on the importance of domain security and best practices.
Configuration
Identifier:
configuration/domain_takeover
Examples
Ignore this check
checks:
configuration/domain_takeover:
skip: true
Score
- Escape Severity: HIGH
Compliance
- OWASP: API8:2023
- OWASP LLM: LLM05:2023
- pci: 6.1
- gdpr: Article-32
- soc2: CC9
- psd2: Article-95
- iso27001: A.12.6
- nist: SP800-81-2
- fedramp: SC-20
Classification
- CWE: 284
Score
- CVSS_VECTOR: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- CVSS_SCORE: 3.0