Yoncu Domain Take Over Method ( NameServer Take Over ) - CXSecurity.com

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1826523 漏洞类型
发布时间 2019-11-18 更新时间 2019-11-18
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2019110117
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Method Title : Yoncu Domain Take Over Method ( NameServer Take Over )
Exploit Risk : 8/10
Exploit Description : Thanks to this method, you will be able to take over the hosting over time and hack the sites.
Author : Gaddar ~ Turkish Vulnerability Researcher and Bug Bounty Finder
Google Dork : intext:"Bu Alan Adı Yöncü Bilişim Çözümleri Tarafından Sağlanmıştır"
Google Dork 2 : intitle: "Site Yapım Aşamasındadır"
* * * Yer6Sec.ORG ***
Tutorials ;
 - Search dork on a web browser.
 - Control targets.
 - Yoncu nameservers give this error. (Site Yapım Aşamasındadır)
 - Go www.yoncu.com
 - Register and Login
 - Add free 5 days hosting for hack the targets.
 - Register the target website names for hosting.
 - And control the websites :)
Instagram : @poyrazsec
Youtube : youtube.com/c/gaddarsec
Facebook : fb.me/gaddarsec
Mail : gaddarvip@protonmail.com - gaddar@yer6sec.org