Provided by: dnstwist_0~20220131-1_all bug

NAME

       dnstwist - domain name permutation engine

SYNOPSIS

       dnstwist [-a|--all] [-b|--banners] [-d|--dictionary FILE] [-f|--format FORMAT]
                [-g|--geoip] [-m|--mxcheck] [-o|--output FILE] [-r|--registered] [-s|--ssdeep]
                [--ssdeep-url URL] [-t|--threads NUMBER] [-w|--whois] [--nameservers LIST]
                [--tld FILE] [--useragent STRING] DOMAIN

DESCRIPTION

       Find similar-looking domain names that adversaries can use to attack you.

       Detect typosquatters, phishing attacks, fraud and brand impersonation.

       Useful as an additional source of targeted threat intelligence.

OPTIONS

       -a, --all
              Show all DNS records.

       -b, --banners
              Determine HTTP and SMTP service banners.

       -d, --dictionary FILE
              Generate additional domains using a dictionary read from FILE.

       -f, --format FORMAT
              Select the output format. Supported values are: cli (default), csv, list, json.

       -g, --geoip
              Perform lookup for GeoIP location.

       -h, --help
              Display a help message and exit.

       -m, --mxcheck
              Check if MX host can be used to intercept e-mails.

       -o, --output FILE
              Save output to FILE.

       -r, --registered
              Show only registered domain names.

       -s, --ssdeep
              Fetch web pages and compare their fuzzy hashes to evaluate similarity.

       --ssdeep-url URL
              Override URL to fetch the original web page from.

       -t, --threads NUMBER
              Start specified NUMBER of threads (default: 10).

       -w, --whois
              Perform lookup for WHOIS creation date.

       --nameservers LIST
              DNS servers to query (comma-separated LIST).

       --tld FILE
              Generate additional domains by swapping TLD as read from FILE.

       --useragent STRING
              User-Agent to send with HTTP requests (default: Mozilla/5.0 dnstwist).

NOTES

       The program will run the provided domain through its fuzzing  algorithms  and  generate  a
       list  of  potential  phishing  domains with the following DNS records: A, AAAA, NS and MX.
       Usually thousands of domain permutations are  generated  -  especially  for  longer  input
       domains.   In such cases, it may be practical to display only registered (resolvable) ones
       using --registered argument.  Ensure  your  local  DNS  server  can  handle  thousands  of
       requests within a short period of time.  Otherwise, you can specify an external DNS server
       with --nameservers argument.

   Fuzzy hashing
       Manually checking each domain name in terms of serving a  phishing  site  might  be  time-
       consuming.   To  address  this,  dnstwist  makes  use  of  so-called fuzzy hashes (context
       triggered piecewise hashes).  Fuzzy hashing is a concept which  involves  the  ability  to
       compare  two  inputs  (in  this  case  HTML  code)  and  determine  a fundamental level of
       similarity.  This unique feature of dnstwist can be enabled with --ssdeep  argument.   For
       each  generated domain, dnstwist will fetch content from responding HTTP server (following
       possible redirects) and compare its fuzzy hash with the one  for  the  original  (initial)
       domain.  The level of similarity will be expressed as a percentage.

       Please keep in mind it's rather unlikely to get 100% match for a dynamically generated web
       page.  However, each notification should be inspected carefully regardless of the score.

       In some cases, phishing sites are served from a specific URL.  If you provide  a  full  or
       partial  URL  address  as an argument, dnstwist will parse it and apply for each generated
       domain name variant.  This is obviously useful only with the fuzzy hashing feature.

   MX checking
       Very often attackers set up e-mail honey pots on phishing domains and wait for mistyped e-
       mails  to  arrive.   In this scenario, attackers would configure their server to vacuum up
       all e-mail addressed to that domain, regardless of the user it was sent  towards.  Another
       dnstwist  feature  allows performing a simple test on each mail server (advertised through
       DNS MX record) in order  to  check  which  one  can  be  used  for  such  hostile  intent.
       Suspicious servers will be marked with the SPYING-MX string.

       Please  be  aware  of  possible false positives.  Some mail servers only pretend to accept
       incorrectly addressed e-mails but then discard those messages.  This technique is used  to
       prevent "directory harvesting attack".

   Dictionaries
       If  domain  permutations  generated by the fuzzing algorithms are insufficient, please use
       --dictionary option with a file to generate more domain variants.  If you  need  to  check
       whether domains with different TLDs exist, you can use --tld argument.

   Coverage
       Along  with  the  length of the domain, the number of variants generated by the algorithms
       increases considerably, and therefore the number of DNS queries  needed  to  verify  them.
       It's  mathematically  impossible  to check all domain permutations - especially for longer
       input domains.

       For this reason, dnstwist generates and checks domains very close  to  the  original  one.
       Theoretically,  these  are  the most attractive domains from the attacker's point of view.
       However, be aware that the imagination of the aggressors is unlimited.

                                            2020-07-05                                DNSTWIST(1)