Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Microsoft Azure #5

Open
indianajson opened this issue Jun 1, 2021 · 15 comments
Open

Microsoft Azure #5

indianajson opened this issue Jun 1, 2021 · 15 comments
Labels
Edge Case These takeovers are possible, but improbable to happen in the wild.

Comments

@indianajson
Copy link
Owner

indianajson commented Jun 1, 2021

Service Microsoft Azure

Status Edge Case

Nameserver

ns1-**.azure-dns.com
ns2-**.azure-dns.net
ns3-**.azure-dns.org
ns4-**.azure-dns.info

UPDATE

It seems a lot of people have been having trouble performing Azure takeovers and while it was always a bit hit or miss it seems to have gotten more difficult. For now, this is being re-assigned as an Edge Case until further research can be conducted.

Old Explanation

You can set up a free account with Microsoft Azure, as long as you provide a credit card on file. Once you are logged in, head over to the DNS Zones and click + New. In the Name field enter the vulnerable (sub)domain. You will automatically be assigned four nameservers as shown above, but you need the numbers to match your vulnerable domain. If the numbers do not match you need to delete the zone and the resource group associated with it before you try again. Simply creating a new zone within the same resource group will typically assign you the same nameservers. This process could take a while, but typically less than 50 attempts will suffice.

@indianajson indianajson added the Vulnerable This service is vulnerable to takeover. label Jun 1, 2021
@indianajson indianajson reopened this Jun 1, 2021
@indianajson indianajson changed the title Microsoft Azure - Vulnerable Microsoft Azure Jun 12, 2021
@melardev
Copy link

I tested this, to make it work I had to create a zone per resource group. Creating a zone on a resource group gave 4 DNS servers, deleting the zone and re-creating it gave the very same DNS servers (I tried multiple times, the same result was observed).

@indianajson
Copy link
Owner Author

Hi @melardev, yes, you are correct, you do need a new resource group each time to "refresh" which DNS servers it assigns you. Thanks for adding this clarification, I've updated the instructions!

@tolgahand
Copy link

Hi,
Although I tried many times, it did not give the address I needed.
I needed ns1-03.azure.dns.com. All numbers are out except 03.

@mohamed-faris
Copy link

I didn't find (and click + New. In the Name)
image

@indianajson
Copy link
Owner Author

@mohamed-faris You can try under "create a resource" and look for "DNS zones", but you may have to start a free trial or have a payment method on file to do it.

@FalcoXYZ
Copy link

FalcoXYZ commented Apr 7, 2022

@indianajson Can you or anyone else confirm this still works? I've made a script and created a DNS zone (in a new RG each time ) 30 times and only got NS names within the 30-36 range. (ns1-30, ns1-31 etc)

@indianajson indianajson added Edge Case These takeovers are possible, but improbable to happen in the wild. and removed Vulnerable This service is vulnerable to takeover. labels May 16, 2022
@b1bek
Copy link

b1bek commented Sep 11, 2022

I can confirm. This is still vulnerable.

@FalcoXYZ
Copy link

I can confirm. This is still vulnerable.

How long did it take for you to get the same NS servers?

@b1bek
Copy link

b1bek commented Sep 11, 2022

I think it also depends on the account type. I had a student account where I was only getting ns name between 30-36 everytime. Then I tried with a regular account and I was able to get in within 5-6 tries.

@mheranco
Copy link

mheranco commented Nov 8, 2022

I created my third account (with and without trial) and I still only get high numbers > 30 ...

I found a twitter post of shubs explaining how he managed to get high numbers https://twitter.com/infosec_au/status/1559466224794632192

If anyone is wondering how to perform hosted zone takeovers on Azure DNS with a high ns-{number} i.e. 37,38 etc, you can achieve this by signing up to Azure's trial, and then performing your hosted zone takeover.

So it is pretty safe to say, that if you either get only high numbers or low numbers on one account.

High numbers can maybe be achieved by a trial account.
But low numbers... ?

@FalcoXYZ Did you succeed in getting low numbers < 30?

@FalcoXYZ
Copy link

FalcoXYZ commented Nov 8, 2022

@mheranco never managed to get anything < 30. Even with a new account.

@b1bek
Copy link

b1bek commented Nov 9, 2022

I had success in getting lower numbers. DM me over Twitter if you need to test a takeover

@b1bek
Copy link

b1bek commented Nov 6, 2023

Not getting low numbers anymore :|

@pdelteil
Copy link

@mheranco never managed to get anything < 30. Even with a new account.

Same. Nowadays I'm getting between 30 and 39.

@indianajson
Copy link
Owner Author

Appreciate all the comments on this. Do we think the consensus is still Edge Case or Not Vulnerable?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Edge Case These takeovers are possible, but improbable to happen in the wild.
Projects
None yet
Development

No branches or pull requests

8 participants