How To Setup an Automated Sub-domain Takeover Scanner for All Bug Bounty Programs in 5 Minutes

You, with your new subdomain scanner, literally punching clean through a laptop because you’re so awesome.

Sub-domain takeovers are all the rage in the bug bounty scene at the moment. You’ve probably heard about some bug bounty legends who are raking in the dough because they’ve managed to set up an automated sub-domain takeover scanner, if you haven’t, Google “Frans Rosén”. I’m going to let you in on a secret, it’s not as hard as it…

--

--

--

Pentester | Hubby | Musician

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Biometrics: Fingerprint and Facial

How to Audit Linux Systems using OpenSCAP

Messenger’s New Chat & Call Encryption ​| PLUGHITZ Live

Idena Chronicles

Week 72 with EPNS

ELD Decentralized Wallet

{UPDATE} W.AR - Augmented Reality Hack Free Resources Generator

802.1X — automated printer certificate rollout via web scraping

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Luke Stephens (@hakluke)

Luke Stephens (@hakluke)

Pentester | Hubby | Musician

More from Medium

Bug Bounty — How to approach Vulnerabilities ( PART 1 )

Intigriti — XSS Challenge — February 2022 — Bug Bounty Hunting — Writeup

Creating easy proof-of-concept scripts with Python and Curl.

Weapons in my quiver: Tools and extension I use in bounties