Digbit tool

What info you can find on digbit github page: BitSquatting is not new but it’s relatively new. This type of attack relies on a random bit that switches from 0 to 1 or from 1 to 0 inside a RAM. Because of this even though you try to access domain like cnn.com, in fact your computer is requesting ann.com. It’s rare but it happens. It can be caused by a cosmic radiation or overheated memory modules.

In this post you fill find small guide how to install this tool. There is two possibilities. Install digbit on your local host or choose docker with pre-installed tool. Tested on Ubuntu 16.04 LTS


Docker image you can find here https://hub.docker.com/r/szalek/pentest-tools/

docker pull szalek/pentest-tools
docker run -it szalek/pentest-tools

How to use

digbit btbw.pl


If you prefer installation, here is what I using too add this tool to docker

apt-get update && \
apt-get install -y git && \
apt-get install -y python3 && \
git clone https://github.com/szalek/digbit.git /home/digbit && \
chmod +x /home/digbit/src/digbit.sh && \
chmod +x /home/digbit/src/digbit.py && \
ln -s /home/digbit/src/digbit.sh /usr/bin/digbit && \
ln -s /home/digbit/src/digbit.py /usr/bin/digbit.py