Skip to content

Digbit

2017-11-14 03:00:35

Documentation


Digbit github page: BitSquatting is not new but it’s relatively new. This type of attack relies on a random bit that switches from 0 to 1 or from 1 to 0 inside a RAM. Because of this even though you try to access domain like cnn.com, in fact your computer is requesting ann.com. It’s rare but it happens. It can be caused by a cosmic radiation or overheated memory modules.

In this post you fill find small guide how to install this tool. There is two possibilities. Install digbit on your local host or choose docker with pre-installed tool. Tested on Ubuntu 16.04 LTS

Docker


Docker image you can find here https://hub.docker.com/r/szalek/pentest-tools/

docker pull szalek/pentest-tools
docker run -it szalek/pentest-tools

How to use


digbit example.com

Install


If you prefer installation, here is what I using too add this tool to docker

apt-get update && \\
apt-get install -y git && \\
apt-get install -y python3 && \\
git clone https://github.com/szalek/digbit.git /home/digbit && \\
chmod +x /home/digbit/src/digbit.sh && \\
chmod +x /home/digbit/src/digbit.py && \\
ln -s /home/digbit/src/digbit.sh /usr/bin/digbit && \\
ln -s /home/digbit/src/digbit.py /usr/bin/digbit.py