This document discusses typosquatting, which involves registering misspelled domain names to mimic legitimate domains. Typosquatters aim to trick users into visiting malicious sites for financial or malware delivery purposes. Various typosquatting techniques are described, along with real world examples. Available tools for detecting typosquatting like UrlCrazy and dnstwist are outlined. The document also presents CrazyParser, a tool developed by the author that improves on earlier tools. Methods for preventing typosquatting like blocking domains and monitoring DNS queries are recommended.
1 of 21
Downloaded 16 times
More Related Content
DetectingSpearPhishingAttacks
1. Detecting and Preventing Spear
Phishing Attacks Using DNS
Mike Saunders - @hardwaterhacker
mike@hardwatersecurity.com
2. About Mike
Pen tester with a defender background (purple team!)
17 years in IT
9 years security
3. The Problem: Typosquatting
What is it?
Intentionally misspelled domain names intended to
imitate legitimate domain names
Why is it bad?
4. The Problem
Why is it bad?
Often dif鍖cult to easily spot
Users may be duped into visiting a malicious site
15. Available Tools
UrlCrazy
Andrew Horton - @urbanadventur3r
http://www.morningstarsecurity.com/research/urlcrazy
dnstwist
Marcin Ulikowski - @elceef
https://github.com/elceef/dnstwist
18. Preventative Measures
Block in web proxy
Blackhole DNS
Increase monitoring
Proxy logs
email containing links to these domains
Client DNS queries
19. + and -
Will 鍖nd some variations, like we11point.com
prennera.com not originally detected - dnstwist supported - 9/16
care鍖rst.com detected, caref1st.com wasnt originally. dnstwist
support added 9/16
20. + and -
Will not detect things like service-paypal.com
Does not protect external users / customers
Unless you pursue domain seizure under WIPO UDRP
or US Anticybersquatting Consumer Protection Act
https://www.icann.org/en/system/鍖les/鍖les/guidance-
domain-seizures-07mar12-en.pdf