Find unique information about host using Dmitry

Introduction

Dmitry (Deepmagic information gathering tool). This tool is Preinstalled in Kali Linux. We can use this tool for the first stage of penetration testing and this tool is designed to collect the information about the target hosts by using some commands of Dmitry. We have different options in this and we will explain to you some options which show unique information about the host

Environment

OS: Kali Linux 2019, 64 Bit

Kernel-Version : 5.2.0-kali2-amd64

Dmitry Diagram

Steps To Execute

  • Firstly use command dmitry –help, this command displays all the help options of Dmitry.
Dmitry Help
  •  Use command dmitry -o www.nmap.org. When we use this command we can find some unique information about host Like (Host IP, Hostname, Domain name, Registry Domain ID, Registrar WHOIS server, Registrar URL, Creation Date, Updated Date, Registry Expiry date, Contact Email, Contact Phone, Registrar IANA ID, Number of name servers)
SNIPPED
SNIPPED
SNIPPED
Dmitry Information
  • Use command dmitry -s www.nmap.org.
  • This command is used to find out the Subdomain Information of Host with a number of Host Names and Host IP
  • -s to perform a search for the possible subdomains
Dmitry subdomain
  • Use command dmitry -e www.nmap.org.
  • This command finds outs number of possible email addresses
  • -e To perform a search for the possible email address
Dmitry Emails
  • Use command dmitry -p www.nmap.org.
  • This command finds outs all TCP Open Ports
    • -p is used to perform TCP port scan
      • 22/tcp  is used for Secure shell
      • 25/tcp  is used for Simple mail transfer protocol
Dmitry TCP Open Ports
Dmitry TCP Open Ports
  • Use command dmitry -b www.nmap.org.
  • This command shows banner received from the scanned open port
    • -b shows the banner received from the scanned port
      • SSH – Secure Shell
      • EMSTP – Enhanced Simple Mail Transport Protocol
Dmitry Banner Open Ports
Dmitry Banner Open Ports