How To Use Dmitry- Kali Linux- Information Gathering Tool.

Howdy crackers! you all know hacking a system without knowing and understanding it is impossible. In this case, we need to gather information about the system as much as possible to understand the system, to find vulnerabilities available in the system and to hack into it.

That is why, to make these things easier, hackers, pen-testers, developers created a set of tools, some of them are available in Kali Linux Operating system.

Here in this article, we're gonna cover a manual of the Dmitry tool that you will find at the first in the section of Information Gathering tools in Kali Linux.

Who is DMitry?

DMitry sounds like a mafia of Russia. Isn't it? that's funny. But in the real, Dmitry is a powerful tool used by hackers, pen-testers and other people to gather information of online systems, websites, web tools and many more.

DMItry is coded by James Greig. It is an open source project, that means that you can download it for free and also you can develop it. DMitry has the ability to perform TCP port scan on host targets, search subdomain on a target host, whois lookup, E-mail address search on target hosts. It also allows users to specify modules according to them.



you can run Dmitry without specifying any options at the command line rather than just putting the target host name or IP address. If you run it this way, it'll run with the by default commands.

So it is preferred to specify the options you want to use at the command line so that you have more control over the output.

Let's have a look at the tutorial how to use it.

How to Use DMitry in Kali Linux

Fire up your Kali Linux machine, open the terminal, type dmitry and hit enter. It will load Dmitry on the terminal.

Dmitry- Kali Linux- crackitdown

The start page is opened up and showing the parameters we can use. You can use man dmitry command to know more about the tool and to see some examples of how to use it.

Do not use the tool if you don't have the permission to use the tool against the site you want to scan. Because in some places running port scan considered to be illegal. Make sure you've checked the law about port scanning of your local area.

We've created a text file named dmitry-info.txt on the Desktop and where the all results will be saved.

Whois lookup: To perform  whois lookup against a domain  we are using the  command

dmitry -wnse -o dmitry-info.txt domain name



Replace the dmitry-info.txt with your text file and the domain name with your target domain name and hit enter. It is showing up all the information of the domain including the subdomains, registrar company, IP address etc.

Port scan: Now we will scan to find open ports and to get all possible information about the ports. Use the command

dmitry -pb -o dmitry-info.txt target IP Address



Replace the target IP address with your target IP address. The tool will start TCP port scanning and the results will be saved in a text file. This parameter of Dmitry is not so good in comparison with Nmap but still good to start.

Here, we are using the options as a set together where-

w and n performs whois lookups on target address.
s is used to search subdomains on the target domain.
e is used to look the email address at the host.
o sets where the output results will be saved.
p performs a port scan.
b looks the banners of the scanned ports.

Author's opinion about Dmitry: 

Dmitry doesn't offer a lot of stuff in comparison with today's advanced information gathering tools but a few years ago it was really a great tool.

If you look at the strings of Dmitry, you will found it uses altavista.com to scan ports. It will be better to use updated and current tools who do better jobs in information gathering. 
Previous
Next Post »

Leave us a comment. Your comment is valuable to us. ConversionConversion EmoticonEmoticon

Note: Only a member of this blog may post a comment.