<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>10 Minute Tip: Discovering DNS Typosquatting Domains</title>
        <link>https://stream.echo6.co/videos/watch/71fb1c15-a84d-41f9-b84f-8373834ddccd</link>
        <description>This OSINTCurio.us 10 Minute Tip by Micah Hoffman shows how to find domain names that are similar to a target domain. Typosquatting can be used by an attacker to register a domain similar to a target and then trick users into submitting credentials to it instead of the live, target domain. Think about logging into faceboook.com (extra "o") instead of facebook.com. Web sites in this episode: https://github.com/elceef/dnstwist, https://osintframework.com/, https://dnstwister.report/</description>
        <lastBuildDate>Wed, 15 Apr 2026 18:51:54 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>10 Minute Tip: Discovering DNS Typosquatting Domains</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/71fb1c15-a84d-41f9-b84f-8373834ddccd</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=71fb1c15-a84d-41f9-b84f-8373834ddccd" rel="self" type="application/rss+xml"/>
    </channel>
</rss>