Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Subdomain takeover AWS S3

By kannthu

Vidoc logoVidoc Module

Subdomain takeover AWS S3

What is the "Subdomain takeover AWS S3?"

The "Subdomain takeover AWS S3" module is designed to detect misconfigurations in AWS S3 buckets that could potentially lead to subdomain takeover vulnerabilities. This module targets the AWS S3 service, which is a cloud storage solution provided by Amazon Web Services. The severity of this module is classified as informative, meaning it provides valuable information about potential vulnerabilities without directly exploiting them. The original author of this module is manikanta, also known as @secureitmania.


This module helps identify misconfigured AWS S3 buckets that could be vulnerable to subdomain takeover attacks. Subdomain takeover occurs when an attacker gains control over a subdomain that is associated with an organization's AWS S3 bucket. This can lead to various security risks, including unauthorized access to sensitive data, potential data breaches, and reputational damage for the affected organization.

How the module works?

The "Subdomain takeover AWS S3" module works by sending HTTP requests to the target domain and analyzing the responses based on predefined matching conditions. It checks for specific HTTP status codes and headers to identify potential misconfigurations that indicate the possibility of subdomain takeover. For example, it looks for a 307 status code and the presence of the "Location:" header in the response.

By detecting these indicators, the module alerts users to the presence of misconfigured AWS S3 buckets that may be susceptible to subdomain takeover. It provides valuable information for organizations to take necessary actions and secure their AWS S3 configurations to prevent potential security breaches.




max-request: 1

Module preview

Concurrent Requests (0)
Passive global matcher
status: 307and
word: Location:
On match action
Report vulnerability