Getting to know sub-domain take over vulnerability

What does it take to perform a sub-domain takeover vulnerability? Can anyone explain this in detail?

@Rootsec Ed has done an in depth guide for this. Ed’s Guide
He really covers sub domain takeover thoroughly. Give it a read and tell me what you think.

Yeah i read that and it’s quite deep and knowledgeable stuff. Btw thanks for sharing.

1 Like