Skip to content

Bergee's Stories on Bug Hunting

hacking, cyber security and programming

Menu
  • Blog
  • About Me
  • Contact
  • Resources
  • Side projects
Menu

Subdomain takeover – easy $150 for five minutes of work

2025-08-072025-08-07

Hello

The title might have been clickbait but it is not. I started from recon and discovered as many subdomains as possible of the target.com company. Then I used dnsx tool to check all  NXDOMAINS which have CNAME records. Among them I found the subdomain pointing to cloudapp.azure.com domain, which looked like this:

dev.target.com 600 IN CNAME devexamplename.eastus.cloudapp.azure.com.

I logged into the MS Azure portal and created the virtual machine service, then entered devexamplename as the name of virtual machine and selected the East US region… and the green tick has appeared :), pointing that I probably can takeover this domain. The best part is the company clearly stated in bug bounty policy: “If you find subdomain takeover, DO NOT take over it, just send us the proof”.

So I took the screenshot of the Azure panel, sent the report and cashed out $150.

See you next bug 🙂

 

  • Subdomain takeover – easy $150 for five minutes of work
  • How I hacked XXXX for fun and !profit
  • Accessing admin panel with fuzzing, digging and guessing
  • From AngularJS CSTI to credentials theft
  • The story of exposed service, SSRF, CSP bypass and credentials stealing via XSS
  • “Hacking” the hotel room TV
  • Broken links hijacking and CDN takeover
  • How I found multiple critical bugs in Red Bull
  • Chaining multiple vulnerabilities for credential stealing
  • Blind account takeover
  • Turning cookie based XSS into account takeover
  • Blind os command injection
  • Five-minute hunting for hidden XSS
  • URL filter bypass, RFI and XSS
  • The forgotten API and XSS filter bypass
  • XSS via Angular Template Injection
  • Breaking things legally for fun and profit

Hackers' playground


https://www.tryhackme.com
https://www.pentesterlab.com
https://www.hackthebox.com
https://portswigger.net/web-security/all-labs
© 2025 Bergee's Stories on Bug Hunting