Sub-Domain Takeovers — How Can Companies Better Secure Their Assets? Part 1

An Ethical Hacker’s Perspective

Image by Trung Nguyen

Introduction

What are Sub-Domains?

Why do Sub-Domains exist?

How to find potential targets?

What is Certificate Transparency?

Crt.sh — Certificate Transparency Search

https://crt.sh/

What are the Security Impacts of a Sub-Domain takeover?

How should companies secure their Sub-Domain assets?

Conclusion

Security Researcher \ Bug Bounty Hunter \ Programmer

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store