I generated 16 character (upper/lower) subdomain and set up a virtual host for it in Apache, and within an hour was seeing vulnerability scans.

How are folks digging this up? What’s the strategy to avoid this?

I am serving it all with a single wildcard SSL cert, if that’s relevant.

Thanks

Edit:

  • I am using a single wildcard cert, with no subdomains attached/embedded/however those work
  • I don’t have any subdomains registered with DNS.
  • I attempted dig axfr example.com @ns1.example.com returned zone transfer DENIED

Edit 2: I’m left wondering, is there an apache endpoint that returns all configured virtual hosts?

Edit 3: I’m going to go through this hardening guide and try against with a new random subdomain https://www.tecmint.com/apache-security-tips/

  • yeehaw@lemmy.ca
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    17 hours ago

    Reverse DNS? Or vuln scans just hitting IPs. Don’t need DNS for that.

    • Fair Fairy@thelemmy.club
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 hours ago

      Op is doing hidden subdomain pattern. Wildcard dns and wildcard ssl.

      This way subdomain acts as a password and application essentially inaccessible for bot crawls.

      Works very well