Skip to content

Latest commit

 

History

History
19 lines (11 loc) · 679 Bytes

Subdomain_Takeover.md

File metadata and controls

19 lines (11 loc) · 679 Bytes

Subdomain Takeover

Table of Contents

Bypass browser security mechanisms

A compromised subdomain can be used to bypass the SameSite.

  • Even if SameSite is applied to mitigate CSRF attacks, in most cases, attackers can still exploit CSRF.

Data leakage can occur even with relatively secure CORS configurations.

Phishing with trusted domains

Phishing can be effectively carried out through trusted domain.