Second-Order – Subdomain Takeover Scanner
Scans web applications for second-order subdomain takeover by crawling the app, and collecting URLs (and other data) that match certain rules, or respond in a certain way.
Installation
From binary
Download a prebuilt binary from the releases page and unzip it.
From source
Go version 1.17 is recommended.
go install -v github.com/mhmdiaa/second-order@latest
Docker
docker pull mhmdiaa/second-order
Command line options
  -target string
        Target URL
  -config string
        Configuration file (default "config.json")
  -depth int
        Depth to crawl (default 1)
  -header value
    	Header name and value separated by a colon 'Name: Value' (can be used more than once)
  -insecure
        Accept untrusted SSL/TLS certificates
  -output string
        Directory to save results in (default "output")
  -threads int
        Number of threads (default 10)
Configuration File
Example configuration files are in config
- LogQueries: A map of tag-attribute queries that will be searched for in crawled pages. For example,- "a": "href"means log every- hrefattribute of every- atag.
- LogNon200Queries: A map of tag-attribute queries that will be searched for in crawled pages, and logged only if they contain a valid URL that doesn’t return a- 200status code.
- LogInline: A list of tags whose inline content (between the opening and closing tags) will be logged, like- titleand- script
Output
All results are saved in JSON files that specify what and where data was found
- The results of LogQueriesare saved inattributes.json
{
    "https://example.com/": {
        "input[name]": [
            "user",
            "id",
            "debug"
        ]
    }
}
- The results of LogNon200Queriesare saved innon-200-url-attributes.json
{
    "https://example.com/": {
        "script[src]": [
            "https://cdn.old_abandoned_domain.com/app.js",
        ]
    }
}
- The results of LogInlineare saved ininline.json
{
    "https://example.com/": {
        "title": [
            "Example - Home"
        ]
    },
      "https://example.com/login": {
        "title": [
            "Example - login"
        ]
    }
}
Usage Ideas
This is a list of tips and ideas (not necessarily related to second-order subdomain takeover) on what to use Second Order for.
- Check for second-order subdomain takeover: takeover.json. (Duh!)
- Collect inline and imported JS code: javascript.json.
- Find where a target hosts static files cdn.json. (S3 buckets, anyone?)
- Collect <input>names to build a tailored parameter bruteforcing wordlist: parameters.json.
- Feel free to contribute more ideas!
References
https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/#secondorder
https://edoverflow.com/2017/broken-link-hijacking/
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.


![[INCRANSOM] - Ransomware Victim: VZW Avalon 2 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image-300x300.png) 
                       
                       
