# URLCrazy軟件包描述
生成和測試域名錯誤及其變體,以檢測域名欺騙、URL劫持、網絡釣魚、企業間諜等活動。
特點
- 能生成15種類型的域名變體
- 已知超過8000個常見的拼寫錯誤
- 支持隨機性(宇宙射線引發)的位翻轉
- 多種鍵盤布局(qwerty、azerty、qwertz、dvorak)
- 域名變體有效性檢查
- 測試域名變體是否正在使用
- 評估域名變體的流行度
資料來源:http://www.morningstarsecurity.com/research/urlcrazy
[URLCrazy首頁](http://www.morningstarsecurity.com/research/urlcrazy) | [Kali URLCrazy資源](http://git.kali.org/gitweb/?p=packages/urlcrazy.git;a=summary)
- 作者:Andrew Horton
- 許可證:Non-commercial
## URLCrazy包含的工具
### urlcrazy - 域名錯誤生成器
```
root@kali:~# urlcrazy -h
URLCrazy version 0.5
by Andrew Horton (urbanadventurer)
http://www.morningstarsecurity.com/research/urlcrazy
生成和測試域名錯誤及其變體,以檢測域名欺騙、URL劫持、網絡釣魚、企業間諜等活動。
支持以下域名變體:
字符遺漏、字符重復、相鄰字符交換、相鄰字符替換、雙重字符替換、相鄰字符插入、缺少點、條形破折號、
單數或復數、常見拼寫錯誤、元音互換、同音詞、位翻轉(宇宙射線)、同形異義、頂級域名錯誤和二級域名錯誤。
用法:/usr/bin/urlcrazy [選項] 域名
選項
-k,--keyboard=LAYOUT 選項有:qwerty、azerty、qwertz、dvorak(默認:qwerty)
-p,--popularity 使用Google檢查域名流行度
-r,--no-resolve 不進行域名解析
-i,--show-invalid 顯示無效的域名
-f,--format=TYPE Human readable或CSV(默認: human readable)
-o,--output=FILE 輸出文件
-h,--help 顯示幫助信息
-v,--version 打印版本信息。這個版本是0.5
```
## urlcrazy用法示例
使用dvorak鍵盤布局(-k dvorak)搜索網址,不對給定域(example.com)解析主機名(-r):
```
root@kali:~# urlcrazy -k dvorak -r example.com
URLCrazy Domain Report
Domain : example.com
Keyboard : dvorak
At : 2014-05-13 17:04:01 -0600
# Please wait. 95 hostnames to process
Typo Type Typo CC-A Extn
---------------------------------------------------
Character Omission eample.com ? com
Character Omission examle.com ? com
Character Omission exampe.com ? com
Character Omission exampl.com ? com
Character Omission example.cm ? cm
Character Omission exaple.com ? com
```
原文鏈接:[http://tools.kali.org/information-gathering/urlcrazy](http://tools.kali.org/information-gathering/urlcrazy)
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool