Detecting and Measuring Security Risks of Hosting-Based Dangling Domains

Author:

Zhang Mingming1ORCID,Li Xiang1ORCID,Liu Baojun2ORCID,Lu Jianyu3ORCID,Zhang Yiming1ORCID,Chen Jianjun4ORCID,Duan Haixin2ORCID,Hao Shuang5ORCID,Zheng Xiaofeng6ORCID

Affiliation:

1. Tsinghua University, Beijing, China

2. Tsinghua University and Quan Cheng Laboratory, Beijing, China

3. QI-ANXIN Technology Research Institute, Beijing, China

4. Tsinghua University and Zhongguancun Laboratory, Beijing, China

5. University of Texas at Dallas, Dallas, TX, USA

6. Tsinghua University and QI-ANXIN Technology Research Institute, Beijing, China

Abstract

Public hosting services provide convenience for domain owners to build web applications with better scalability and security. However, if a domain name points to released service endpoints (e.g., nameservers allocated by a provider), adversaries can take over the domain by applying the same endpoints. Such a security threat is called "hosting-based domain takeover''. In recent years, a large number of domain takeover incidents have occurred; even well-known websites like the subdomains of microsoft.com have been impacted. However, until now, there has been no effective detection system to identify these vulnerable domains on a large scale. In this paper, we fill this research gap by presenting a novel framework, HostingChecker, for detecting domain takeovers. Compared with previous work, HostingChecker expands the detection scope and improves the detection efficiency by: (i) systematically identifying vulnerable hosting services using a semi-automated method; and (ii) effectively detecting vulnerable domains through passive reconstruction of domain dependency chains. The framework enables us to detect the subdomains of Tranco sites on a daily basis. We evaluate the effectiveness of HostingChecker and eventually detect 10,351 subdomains from Tranco Top-1M apex domains vulnerable to domain takeover, which are over 8× more than previous findings. Furthermore, we conduct an in-depth security analysis on the affected vendors, like Amazon and Alibaba, and gain a suite of new insights, including flawed implementation of domain ownership validation. Following responsible disclosure processes, we have reported issues to the security response centers of affected vendors, and some (e.g., Baidu and Tencent) have adopted our mitigation.

Funder

National Natural Science Foundation of China

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Hardware and Architecture,Safety, Risk, Reliability and Quality,Computer Science (miscellaneous)

Reference67 articles.

1. 2018. HackerOne: A Guide To Subdomain Takeovers. https://www.hackerone.com/application-security/guide-subdomain-takeovers. 2018. HackerOne: A Guide To Subdomain Takeovers. https://www.hackerone.com/application-security/guide-subdomain-takeovers.

2. 2020. 670 Subdomains of Microsoft are Vulnerable to Takeover. https://vullnerability.com/blog/microsoft-subdomain-account-takeover. 2020. 670 Subdomains of Microsoft are Vulnerable to Takeover. https://vullnerability.com/blog/microsoft-subdomain-account-takeover.

3. 2020. American News Site's Subdomains Left Open for Takeover. https://www.wizcase.com/blog/cbslocal-vulnerabilty-research/. 2020. American News Site's Subdomains Left Open for Takeover. https://www.wizcase.com/blog/cbslocal-vulnerabilty-research/.

4. 2021. Alibaba Cloud. https://www.alibabacloud.com/. 2021. Alibaba Cloud. https://www.alibabacloud.com/.

5. 2021. Amazon Web Services. https://aws.amazon.com/. 2021. Amazon Web Services. https://aws.amazon.com/.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Detecting Subdomain TakeOver Threats and Real-Time Alerting for Rapid Response;2023 26th International Conference on Computer and Information Technology (ICCIT);2023-12-13

2. Detecting and Measuring Security Risks of Hosting-Based Dangling Domains;ACM SIGMETRICS Performance Evaluation Review;2023-06-26

3. Detecting and Measuring Security Risks of Hosting-Based Dangling Domains;Abstract Proceedings of the 2023 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems;2023-06-19

4. A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies;IEEE Communications Surveys & Tutorials;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3