We announce the new version of HEDnsExtractor with new features and automation mechanisms for discovering new phishings using yaml recips and finally an introduction to the use of regex directly in HEDnsExtractor:

  • Implementing workflows with yaml 🔥
  • Adds support to work with multiples domains as target 🔥
  • Regex support 🥷
  • Adds support to work with IPv6 filters 🔥
  • Change to Golang 1.21 🆙

Workflows

With this new feature it is possible to map multiple domains and use regex to identify domains based on their regex, see example below:

$ HEDnsExtractor -workflow WellsFargo_Detection.yaml

domains:
  - 104.237.252.65
  - cancelfrgoref3eb0d.com
  
regex: (well|frgo|fargo)


image

ProTip: You can insert the list of authorized targets into yaml and run the query periodically to see if new domains have been identified.

Regex

In the yaml recipe you can perform your filters without having to use another tool to perform the action:

Example 1: regex: (well|frgo|fargo)
Example 2: regex: (*gov\d+)
Example 3: regex: (cancel\d{3})

image

IPv6 filters

We have added the possibility of querying via IPv6:

$ hednsextractor -target 2001:db8:85a3::8a2e:370:7334