https://github.com/ndr-repo/thatsmytype
DNS enumeration through targeted RFC queries.
https://github.com/ndr-repo/thatsmytype
cyber-threat-intelligence cybersecurity dns reconnaissance subdomains
Last synced: 2 months ago
JSON representation
DNS enumeration through targeted RFC queries.
- Host: GitHub
- URL: https://github.com/ndr-repo/thatsmytype
- Owner: ndr-repo
- License: gpl-3.0
- Created: 2025-02-18T18:47:39.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2025-03-10T21:21:00.000Z (7 months ago)
- Last Synced: 2025-05-23T18:19:33.352Z (5 months ago)
- Topics: cyber-threat-intelligence, cybersecurity, dns, reconnaissance, subdomains
- Language: PowerShell
- Homepage:
- Size: 65.4 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ThatsMyType
DNS enumeration through targeted RFC queries.
# Usage Instructions
1. Enter the path of the file containing target hostnames. This could be a list of hundreds or even thousands of domain names that you would like to resolve.
2. Select the DNS server to query. This could be a public resolver such as Google, or a private corporate DNS server that you are auditing.
3. Select the RFC type for your DNS queries. (ex: A, CNAME, PTR, TXT, MINFO, HINFO, ALL, ANY)
- If you arent sure which option to use, the [IANA DNS Parameters](https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml) portal is a great place to start.
- Results are saved in your working directory based on the type of query ran and the target resolver. (ex: resolutions-ALL-8.8.4.4.txt )
- If the file already exists, ThatsMyType will append the existing file, so no results are lost.
Image Source: [Wikipedia](https://upload.wikimedia.org/wikipedia/commons/5/59/All_active_dns_record_types.png)# Testing Methodologies
I created a spreadsheet using the IANA resources provided from the webpage above. It has served me as a good reference for testing possible DNS types.
The spreadsheet is available in the docs folder here.