What does it take to perform a sub-domain takeover vulnerability? Can anyone explain this in detail?
@Rootsec Ed has done an in depth guide for this. Ed’s Guide
He really covers sub domain takeover thoroughly. Give it a read and tell me what you think.
Yeah i read that and it’s quite deep and knowledgeable stuff. Btw thanks for sharing.
1 Like