Online DNSTwist

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
33 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:00
hello to you all as promised. In this short lesson, I will show you to cool online Web services that you, venous twist or, better to say, allow you to use it.
00:13
The 1st 1 is called Vienna's Twister dot report,
00:17
and the 2nd 1 is Dennis Twist that I t. So let's dive in
00:22
here. We are in my safe browser called Brave. I also encourage you to check it out
00:28
when we go to the website DNS twister dot report.
00:35
You can see that it is pretty much straightforward to use simply enter a domain.
00:41
Indiana's Twister. Better to say, Dennis Twist will find similar ones.
00:55
Additional great features that the Deena's Twister has our email alerts so it can alert you via email within 24 hours. If a new domain is registered like yours, and if the I P or an existing domain has changed or some domain got unregistered,
01:11
it even has an 80 I or application programming interface
01:15
for you to play with. If you are prone to that kind of development, I'm not but encouraged to go for it. The 2nd 1 resource that we mentioned is Dennis twist
01:26
dot i t.
01:29
I like the idea domains because of its referral to information technology as a side note that I D is the top level domain for Italy. So as you can see Dennis Twist that I t. Is even more straightforward, but with fewer options.
01:44
You just entered the domain and breast scan.
01:49
It will output. The Dennis twists results, and you can also download it as a CSP for further use of the output.
01:59
In this lesson, we demonstrated to cool. Online Resource is to use Deanna's twists capabilities, and in the next one we will do a module summary. So see you in the following video.
Up Next
DNSTwist Fundamentals

In this particular video course, we are going to show how to install and use a tool called DNSTWIST. This tool is probably used by the whole spectre of the Cybersecurity community, from the good guys to hackers and criminals.

Instructed By