Categories: Kali Linux

URLCrazy : OSINT Tool To Generate And Test Domain

URLCrazy is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL hijacking, phishing, and corporate espionage.

Use Cases

  • Detect typo squatters profiting from typos on your domain name
  • Protect your brand by registering popular typos
  • Identify typo domain names that will receive traffic intended for another domain
  • Conduct phishing attacks during a penetration test

Features

  • Generates 15 types of domain variants
  • Knows over 8000 common misspellings
  • Supports bit flipping attacks
  • Multiple keyboard layouts (qwerty, azerty, qwertz, dvorak)
  • Checks if a domain variant is valid
  • Test if domain variants are in use
  • Estimate popularity of a domain variant

Installation

  • Install from a package manager

If you are using Kali Linux, Ubuntu or Debian use:

$ sudo apt install urlcrazy

  • Install latest release

Visit https://github.com/urbanadventurer/urlcrazy/releases

  • Install current development version

Be aware the latest development version may not be stable.

$ git clone https://github.com/urbanadventurer/urlcrazy.git

  • Install Ruby

URLCrazy has been tested with Ruby versions 2.4 and 2.6.

If you are using Ubuntu or Debian use:

$ sudo apt install ruby

  • Install Bundler

Bundler provides dependecy management for Ruby projects

$ gem install bundler

  • Install Dependencies

$ bundle install

Alternatively, if you don’t want to install bundler, the following command will install the gem dependencies.

$ gem install json colorize async async-dns async-http

Also Read – DroidFiles : Get Files From Android Directories

Usage

  • Simple Usage

With default options, URLCrazy will check over 2000 typo variants for google.com.

$ urlcrazy google.com

  • With popularity estimate

$ urlcrazy -p domain.com

  • Commandline Usage

Usage: ./urlcrazy [options] domain
Options
-k, –keyboard=LAYOUT Options are: qwerty, azerty, qwertz, dvorak (default: qwerty)
-p, –popularity Check domain popularity with Google
-r, –no-resolve Do not resolve DNS
-i, –show-invalid Show invalid domain names
-f, –format=TYPE Human readable or CSV (default: human readable)
-o, –output=FILE Output file
-n, –nocolor Disable colour
-h, –help This help
-v, –version Print version information. This version is 0.7

Types of Domain Variations Supported

  • Character Omission
    • These typos are created by leaving out a letter of the domain name, one letter at a time. For example, www.goole.com and www.gogle.com
  • Character Repeat
  • Adjacent Character Swap
  • Adjacent Character Replacement
    • These typos are created by replacing each letter of the domain name with letters to the immediate left and right on the keyboard. For example, www.googke.com and www.goohle.com
  • Double Character Replacement
    • These typos are created by replacing identical, consecutive letters of the domain name with letters to the immediate left and right on the keyboard. For example, www.gppgle.com and www.giigle.com
  • Adjacent Character Insertion
    • These typos are created by inserting letters to the immediate left and right on the keyboard of each letter. For example, www.googhle.com and www.goopgle.com
  • Missing Dot
    • These typos are created by omitting a dot from the domainname. For example, wwwgoogle.com and www.googlecom
  • Strip Dashes
  • Singular or Pluralise
  • Common Misspellings
  • Vowel Swapping
  • Homophones
  • Bit Flipping
    • Each letter in a domain name is an 8bit character. The character is substituted with the set of valid characters that can be made after a single bit flip. For example, facebook.com becomes bacebook.com, dacebook.com, faaebook.com,fabebook.com,facabook.com, etc.
  • Homoglyphs
    • One or more characters that look similar to another character but are different are called homogylphs. An example is that the lower case l looks similar to the numeral one, e.g. l vs 1. For example, google.com becomes goog1e.com.
  • Wrong Top Level Domain
  • Wrong Second Level Domain

Supported Keyboard Layouts

Keyboard layouts supported are:

  • QWERTY
  • AZERTY
  • QWERTZ
  • DVORAK

Is the domain valid?

URLCrazy has a database of valid top level and second level domains. This information has been compiled from Wikipedia and domain registrars. We know whether a domain is valid by checking if it matches top level and second level domains. For example, www.trademe.co.bz is a valid domain in Belize which allows any second level domain registrations but www.trademe.xo.nz isn’t because xo.nz isn’t an allowed second level domain in New Zealand.

Popularity Estimate

URLCrazy pioneered the technique of estimating the relative popularity of a typo from search engine results data. By measuring how many times a typo appears in webpages, we can estimate how popular that typo will be made when users type in a URL.

The inherent limitation of this technique, is that a typo for one domain, can be a legitimate domain in its own right. For example, googles.com is a typo of google.com but it also a legitimate domain.

For example, consider the following typos for google.com.

Count.Typo
25424gogle.com
24031googel.com
22490gooogle.com
19172googles.com
19148goole.com
18855googl.com
17842ggoogle.com

Known Issues

  • Macos File Descriptor Limit

If DNS resolution fails under Macos it could be due to the small default file descriptor limit.

To display the current file descriptor limit use:

$ ulimit -a

To increase the file descriptor limit use:

$ ulimit -n 10000

URLCrazy Appearances

  • Kali Linux
  • The Browser Hacker’s Handbook
    • Authored by Wade Alcorn, Christian Frichot, and Michele Orru.
    • URLCrazy is included in Chapter 2 of this seminal work on the topic.

PTES Technical Guidelines

Penetration Testing Execution Standard (PTES) is a standard designed to provide a common language and scope for performing penetration testing (i.e. Security evaluations). URLCrazy is included in the Tools Required section.

http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines

Network Security Toolkit

Network Security Toolkit is a bootable Linux distribution designed to provide easy access to best-of-breed Open Source Network Security Applications. https://www.networksecuritytoolkit.org/

See Also

URLCrazy was first published in 2009, and for many years was the most advanced opensource tool for studying typosquatting. Since then multiple other tools have been developed by the infosec community.

DNSTwist

DNSTwist is developed by Marcin Ulikowski and first published in 2015. DNSTwist had a significant feature overlap with URLCrazy at the time, and introduced many new features.

Language: Python

https://github.com/elceef/dnstwist

URLInsane

URLInsane was developed by Rangertaha in 2018 and claims to match the features of URLCrazy and DNSTwist.

Language: Go

https://github.com/cybint/urlinsane

DomainFuzz

DomainFuzz was developed by monkeym4sterin 2017. Language: Node.JS

https://github.com/monkeym4ster/DomainFuzz

R K

Recent Posts

Kali Linux 2024.4 Released, What’s New?

Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…

13 hours ago

Lifetime-Amsi-EtwPatch : Disabling PowerShell’s AMSI And ETW Protections

This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…

14 hours ago

GPOHunter – Active Directory Group Policy Security Analyzer

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…

3 days ago

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection & Protection

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…

5 days ago

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

1 week ago

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don't worry if there are any bugs in the tool, we will try to fix…

1 week ago