Advertisement






Yoncu Domain Take Over Method ( NameServer Take Over )

CVE Category Price Severity
N/A CWE-Other N/A High
Author Risk Exploitation Type Date
yoncu High Remote 2019-11-18
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N 0 0

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019110117

Below is a copy:

Yoncu Domain Take Over Method ( NameServer Take Over )
Method Title : Yoncu Domain Take Over Method ( NameServer Take Over )
Exploit Risk : 8/10
Exploit Description : Thanks to this method, you will be able to take over the hosting over time and hack the sites.
Author : Gaddar ~ Turkish Vulnerability Researcher and Bug Bounty Finder
Google Dork : intext:"Bu Alan Ad Ync Biliim zmleri Tarafndan Salanmtr"
Google Dork 2 : intitle: "Site Yapm Aamasndadr"
* * * Yer6Sec.ORG ***
Tutorials ;
 - Search dork on a web browser.
 - Control targets.
 - Yoncu nameservers give this error. (Site Yapm Aamasndadr)
 - Go www.yoncu.com
 - Register and Login
 - Add free 5 days hosting for hack the targets.
 - Register the target website names for hosting.
 - And control the websites :)
Instagram : @poyrazsec
Youtube : youtube.com/c/gaddarsec
Facebook : fb.me/gaddarsec
Mail : [email protected] - [email protected]

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum