May 212015
 

Dmitry (Deepmagic Information Gathering Tool) is a basic scanning tool found in the Kali Linux penetration testing distribution.

Written in C, Dmitry is the creation of James Greig.

You can access the tool by typing dmitry on the command line.

When you run the base tool on a host (a web site or ip address) without any options, you get a bunch of information like IP number of the host, sub-domains, e-mail addresses (if available on google), whois details and open ports.

The tool comes with multiple options including one (-o option) that lets you save the output to a text file for later study.

Here are a couple of examples where we use dmitry with some options.

dmitry -p example-test.com
HostIP:83.2xx.1xx.xx
HostName: example-test.com
Gathered TCP Port information for 83.2xx.1xx.xx
---------------------------------
 Port		State
21/tcp		open
80/tcp		open
110/tcp		open
143/tcp		open
Portscan Finished: Scanned 150 ports, 143 ports were in state closed

Let’s now try dmitry with the -pf option.

As you can see below, the output is slightly different compared to our previous result (above).

dmitry -pf example-test.com
HostIP:83.2xx.1xx.xx
HostName:example-test.com
Gathered TCP Port information for 83.2xx.1xx.xx
--------------------------------- 
Port State 
21/tcp open 
22/tcp filtered 
25/tcp filtered 
80/tcp open 
110/tcp open 
143/tcp open 
Portscan Finished: Scanned 150 ports, 143 ports were in state closed

Dmitry Options

Let’s take a quick deko at the various dmitry options:

Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host
-o Save output to %host.txt or to file specified by -o file
-i Perform a whois lookup on the IP address of a host
-w Perform a whois lookup on the domain name of a host
-n Retrieve Netcraft.com information on a host
-s Perform a search for possible subdomains
-e Perform a search for possible email addresses
-p Perform a TCP port scan on a host
* -f Perform a TCP port scan on a host showing output reporting filtered ports
* -b Read in the banner received from the scanned port
* -t 0-9 Set the TTL in seconds when scanning a TCP port ( Default 2 )

Note: As with any penetration test tool, always ensure you have permission from the host owners before running dmitry or do it on your own web site.

 Posted by at 3:38 pm  Tagged with:

Sorry, the comment form is closed at this time.