Tuesday, 11 September 2012

dmitry on backtrack 5


Dmitry


Introduction 
  • DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host.
  • DMitry( ( Deepmagic Information Gathering Tool )  is created by  James Greig .
How To Open DMitry 
  • To open DMitry goto , BackTrack > Information Gathering > Network Analysis > Route Analysis > dmitry 
  • See the below image for more details - 
dmitry path

dmitry started

HELP OPTION
  • To use help option , enter the command given below .
  • Command Used : dmitry -h 
  • See the below image for more details -
dmitry help option

-i Option 

  • Perform an Internet Number whois lookup on the target. This requires that the target be in the form of a 4 part Internet Number with each octal seperated using the '.' notation. For example, "dmitry -i 255.255.255.255".
  • See the below image for more details - 
dmitry -i option


-w Option 
  • Perform a whois lookup on the 'host' target. This requires that the target be in a named character format. For example, "./dmitry -w target" will perform a standard named whois lookup.
  • See the below image for moe details -
dmitry -w option

-n Options
  • Retrieve netcraft.com data concerning the host, this includes Operating System, Web Server release and UpTime information where available.
  • See the below image for more details - 
dmitry -n option

-s Option 
  • Perform a SubDomain search on the specified target.
  •  This will use serveral search engines to attempt to locate sub-domains in the form of sub.target.
  •  There is no set limit to the level of sub-domain that can be located, however, there is a maximum string length of 40 characters (NCOL 40) to limit memory usage.
  •  Possible subdomains are then reversed to an IP address, if this comes back positive then the resulting subdomain is listed.
  •  However, if the host uses an asterisk in their DNS records all resolve subdomains will come back positive.
  • See the below image for more details - 
dmitry -s option

-e Option
  • Perform an EmailAddress search on the specified target.
  • See the below image for more details - 
dmitry -e option

-p Option 
  • Perform a TCP Portscan on the host target.
  • See the below image for more details - 
dmitry -p option

-f option 
  • This option will cause the TCP Portscan module to report/display output of filtered ports. These are usually ports that have been filtered and/or closed by a firewall at the specified host/target. This option requires that the '-p' option be passed as a previous option. For example, "dmitry -pf target".
  • See the below image for more details - 
dmitry -f option

-b Options
  • This option will cause the TCP Portscan module to output Banners if they are received when scanning TCP Ports. This option requres that the '-p' option be passed as a previous option.
  • See the below image for more details - 
dmitry -b option
-t option 
  • This sets the Time To Live (TTL) of the Portscan module when scanning individual ports. This is set to 2 seconds by default. This is usually required when scanning a host that has a firewall and/or has filtered ports which can slow a scan down.
  • See the below image for more details-
dmitry -t option

-o Option 
  •  Create an ascii text output of the results to the "filename" specified.
  •  If this option is not specified in any form output will be sent to the standard output (STDOUT) by default.
  • See  the below image for more details -
dmitry -o option
dmitry cat option

THIS IS HOW WE CAN USE " DMitry Tool  " ON BACKTRACK 5 

No comments:

Post a Comment