Tumblr Subdomain Takeover
2024-2-8 18:27:40 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Scott Lindh

InfoSec Write-ups

Write up about how I successfully took over the subdomain of an Tumblr blog.

A Subdomain takeover is a cybersecurity vulnerability where attackers exploit abandoned or misconfigured subdomains, gaining unauthorized control. This can lead to malicious activities such as phishing, malware distribution, and defacement.

Tumblr suggesting a 404 error, could mean the sub domain points to a blog that can be taken over

These are the steps I took to successfully take over this subdomain and link it to my own Tumblr blog

  1. Enumerate subdomains using a recon tool in our case we will use Subfinder.
  2. Check subdomains for “signatures” In the case of Tumblr the signature would be “Whatever you were looking for doesn’t currently exist at this address”, the tool used for this is Subzy.
  3. Confirm the takeover with the help of can-i-take-over-XYZ
  4. Profit !!

The initial step involved reconnaissance to identify all available target assets. This entailed employing subdomain enumeration techniques, which utilize a blend of methods to uncover target sub-domains. This encompasses scouring external data sources like search engines, public databases, and third-party services, alongside scanning DNS records such as NS, MX, TXT, and AXFR.

Numerous tools are available for this task, and I strongly recommend configuring external data source API keys within these tools to maximize results. Among these tools, we’ll utilize Subfinder, although other notable options include Sublist3r, Amass, or Knockpy.

Using Subfinder after you install, Let’s run:
docker run projectdiscovery/subfinder:latest -d target.com -o out.txt

The output will be located in “out.txt,” prepared for the subsequent step. These are the results obtained from Subfinder’s subdomain enumeration.

Results from Subfinder sub domain enumeration

Numerous methods are available to check subdomains for potential takeovers, ranging from utilizing tools to capture screenshots to employing text/regex matching tools and even manually inspecting the domain. To automate the search for matching text signatures, we’ll employ a tool called Subzy.

Assuming you have installed Subzy, let’s run:
subzy run — targets out.txt

Wait for it to complete and let’s see what we can find:

Wow lucky us, what have we found here …. a hit !

It appears luck is on our side as we’ve identified a vulnerable domain, and to our fortune, we’ve been provided with a convenient link to the “can-i-take-over-xyz” repository.

We can also verify like so:

curl -s -N http://$SOURCE_DOMAIN_NAME | grep -E -q “Whatever you were looking for doesn’t currently exist at this address” && echo “Subdomain takeover may be possible” || echo “Subdomain takeover is not possible”

or make a little bash script to do it yourself !

Now that we’re aware of this domain’s vulnerability, let’s head over to “can-i-take-over-xyz” and delve deeper.


  1. Log in to Tumblr account (MUST validate email address)
  2. Go to Tumblr Account drop down
  3. Click Edit Appearance
  4. Click on the pencil icon next to your username
  5. Select Use a custom domain
  6. Set custom domain to source domain name
  7. Click on Test Domain (Should return It’s good!)
  8. Click on Save

Some reports on HackerOne, for Tumblr blog takeovers:


Success !!
We have taken over this domain/subdomain and uploaded our POC to the bug bounty program.

“Until next time” — Scott Lindh

文章来源: https://infosecwriteups.com/tumblr-subdomain-takeover-55f9cb494d65?source=rss----7b722bfd1b8d---4