10 Short links on Cybersquatting domain detection

dnstwist results for covert.io

In this short blog, I share 3 papers and 7 tools that focus on detecting cyber squatting domains (including typosquating, homograph, combosquatting, etc.).

Tools for generating cybersquatting domains (for use in detection)

Lots of other tools/libraries now exist if you need an implementation in a different language. See these github tags for lots more tools: typosquatting, homoglyph, and homograph-attack.

Lastly, if you’re interested in discovering more interesting papers like these, use the method I outlined here.

— Jason

@jason_trost

The “short links” format was inspired by O’Reilly’s Four Short Links series.

Interests: Network security, Digital Forensics, Machine Learning, Big Data. retweets are not endorsements.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Exploring Network Hacking

Impersonating Police Officers for a Social Engineering Attack

Vendible selects Onfido to secure blockchain transactions with trusted identity verification.

Understanding Transit Gateway Peering over the Internet with Insane Mode on GCP

TYPH/USDT Will be Available on CoinTiger at 18:00 on Apr 27, 2021. 14,250 TYPH to Give Away!

[Lesson 10] Network Vulnerability and Scanning: Explanation of Nmap Script Engine(NSE)in

🔥IDO IS LIVE!🔥

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jason Trost

Jason Trost

Interests: Network security, Digital Forensics, Machine Learning, Big Data. retweets are not endorsements.

More from Medium

Detection and hunting of Web shells

Detection Design Patterns — Process Creation

Threat Detection & Hunting with Google Chronicle Security

Analysis of Registry Files(Registry Forensic)