Skip to content

Digbit

2017-11-14 03:00:35

Documentation

Digbit github page: BitSquatting is not new but it’s relatively new. This type of attack relies on a random bit that switches from 0 to 1 or from 1 to 0 inside a RAM. Because of this even though you try to access domain like cnn.com, in fact your computer is requesting ann.com. It’s rare but it happens. It can be caused by a cosmic radiation or overheated memory modules.

In this post you fill find small guide how to install this tool. There is two possibilities. Install digbit on your local host or choose docker with pre-installed tool. Tested on Ubuntu 16.04 LTS

Docker

Docker image you can find here https://hub.docker.com/r/szalek/pentest-tools/

docker pull szalek/pentest-tools
docker run -it szalek/pentest-tools

How to use

digbit example.com

Install

If you prefer installation, here is what I using too add this tool to docker

apt-get update && \\
apt-get install -y git && \\
apt-get install -y python3 && \\
git clone https://github.com/szalek/digbit.git /home/digbit && \\
chmod +x /home/digbit/src/digbit.sh && \\
chmod +x /home/digbit/src/digbit.py && \\
ln -s /home/digbit/src/digbit.sh /usr/bin/digbit && \\
ln -s /home/digbit/src/digbit.py /usr/bin/digbit.py