Bitsquatting, the Glossary
Bitsquatting is a form of cybersquatting which relies on bit-flip errors that occur during the process of making a DNS request.[1]
Table of Contents
4 relations: Black Hat Briefings, Cybersquatting, Domain name, Domain Name System.
- Network addressing
- Types of cyberattacks
- URL
Black Hat Briefings
Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world.
See Bitsquatting and Black Hat Briefings
Cybersquatting
Cybersquatting (also known as domain squatting) is the practice of registering, trafficking in, or using an Internet domain name, with a bad faith intent to profit from the goodwill of a trademark belonging to someone else. Bitsquatting and Cybersquatting are domain Name System and Types of cyberattacks.
See Bitsquatting and Cybersquatting
Domain name
In the Internet, a domain name is a string that identifies a realm of administrative autonomy, authority or control. Bitsquatting and domain name are domain Name System.
See Bitsquatting and Domain name
Domain Name System
The Domain Name System (DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks. Bitsquatting and Domain Name System are network addressing.
See Bitsquatting and Domain Name System
See also
Network addressing
- Authenticated Received Chain
- Bitsquatting
- Broadcast address
- Care-of address
- Circuit ID
- Computer network naming scheme
- Domain Name System
- DomainKeys Identified Mail
- Doppelganger domain
- Dot-decimal notation
- E.123
- Getaddrinfo
- IEEE Registration Authority
- IP addresses
- Link-local address
- List of assigned /8 IPv4 address blocks
- MAC address
- Multicast address
- Network address
- Network address translation
- Network service access point address
- Organizationally unique identifier
- Provider-aggregatable address space
- Provider-independent address space
- RealNames
- Sender Policy Framework
- Solicited-node multicast address
- Telephone number
- Typosquatting
- URI schemes
- Unique user
Types of cyberattacks
- ARP spoofing
- Bitsquatting
- Carding (fraud)
- Cybersquatting
- DNS spoofing
- Data breaches
- Denial-of-service attack
- Denial-of-service attacks
- Directory harvest attack
- Email fraud
- Email spoofing
- IP address spoofing
- Joanap
- LAND
- List of phishing incidents
- Lottery scam
- MAC spoofing
- Phishing
- Referer spoofing
- Rogue DHCP
- Scam baiting
- Spoofing attack
- Web skimming
URL
- Backlink
- Bitsquatting
- Clean URL
- Contextual deep linking
- Deep linking
- Doppelganger domain
- HTTP referer
- Internationalized Resource Identifier
- Link rot
- Mobile deep linking
- Permalink
- Query string
- Rewrite engine
- Search/Retrieve via URL
- Semantic URL attack
- Spoofed URL
- TinyURL
- Typosquatting
- URI Template
- URI normalization
- URL
- URL redirection
- URL shortening
- UTM parameters
- Uniform Resource Identifier
- Vanity domain