praetorian-inc / chariot-ui

Chariot Offensive Security Platform
https://preview.chariot.praetorian.com
MIT License
15 stars 6 forks source link

Improved Detection of Dangling DNS Records #163

Open Ameston opened 5 days ago

Ameston commented 5 days ago

Feature Description

Original ticket description: Past experience has shown that Nuclei alone is inadequate in detecting dangling DNS records (namely, A and CNAME). The issue of speed (how quickly we find a record once it begins to dangle) should be improved with the tighter scan cadence, but we also need to improve the means by which we detect dangling records.

Currently, most instances of this issue are identified manually through the investigation of other Nuclei detections; incongruous site content and mismatched SSL certificate data usually make confirmation pretty straightforward, but sometimes context from Chariot screenshots / Wayback Machine / etc. is needed to confirm that the record is pointing to something that no longer belongs to a specific organization.

Ideally, we should detect these records before the IP is reissued, but this is challenging because an inactive IP that belongs to the customer and an inactive IP that used to belong to the customer look awfully similar. Attribution data from CSPs should help here, but that depends on some potentially complex functionality and wouldn't cover non-CSP hosting providers.

Preferred Solution

Problem What problem does this feature solve?