This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1318
dnstwist
External Tool
External Data Source
GitHub
Unknown
Unknown
51 (lowest rank is 51)

Category & Restrictions

Other
cyber crime, phishing
Unrestricted
true

Description


dnstwist is a domain name permutation engine for detecting typo squatting, phishing and corporate espionage.

dnstwist takes in your domain name as a seed, generates a list of potential phishing domains and then checks to see if they are registered. Additionally it can test if the mail server from MX record can be used to intercept misdirected corporate e-mails and it can generate fuzzy hashes of the web pages to see if they are live phishing sites.

Key features:
A wide range of efficient domain fuzzing algorithms
Unicode domain names (IDN)
Multithreaded job distribution
Queries A, AAAA, NS and MX records
Evaluates web page similarity with fuzzy hashes to find live phishing sites
Tests if MX host (mail server) can be used to intercept misdirected e-mails
Additional domain variants using dictionary files
GeoIP location information
Grabs HTTP and SMTP service banners
WHOIS lookups for creation and modification date
Output in CSV and JSON format

Additional Details

3.2MB
false
Unknown
dbcs, internet mail protocols, cybercrime, typosquatting, message transfer agent, spamming, computer memory, espionage techniques, cryptographic protocol, communication protocol, privacy, application layer protocols, web design, data serialization formats, computer security procedures, transport layer security, external data source, industrial espionage, mx record, domain name system, json, internet protocol, domain name, communication, uniform resource locator, 1318, email, fuzzing, phishing, uniform resource identifier, dnstwist, hypertext transfer protocol, registered memory, internet privacy, simple mail transfer protocol, web page, mobile phone tracking, inferlink corporation, mobile technology, cyberwarfare, secure communication, history of computing, corporate crime, the intercept, character encoding, geolocation