Dmitry is a free and open-source tool available on GitHub. The tool is used for information gathering. You can download the tool and install in your Kali Linux. Dmitry stands for DeepMagic Information Gathering Tool. It’s a command-line tool Using Dmitry tool You can collect information about the target, this information can be used for social engineering attacks. It can be used to gather a number of valuable pieces of information
Usages of Dmitry Tool :
- Dmitry Tool can be used to search subdomains of the target.
- Dmitry Tool can be used to find open ports of the target system.
- Dmitry Tool can be used to perform TCP scan.
- Dmitry Tool can be used with netcraft service to get the target information such as operating system, web server details, web host details, hosting service details, etc.
- Dmitry Tool can be used with whois service to get the target information such as registered domain, name, address, the contact information of the person who registered it.
- Dmitry Tool can be used to get email addresses that are associated with the domain of the target.
Flags of Dmitry Tool :
Dmitry Tool is a command-line tool. There are various commands of the Dmitry tool that can be used with different commands. Different flags used with commands. Flags are given below.
Flags Uses of flags 1. -o Allows the user to specify a location to write the output of the application to. 2. -i This flag Performs a whois lookup on the IP address of the target. 3. -w This flag Performs a whois lookup on the domain name of the host. 4. -n This flag Retrieves all available Netcraft information for a given target. 5. -s This flag is used to search all subdomains of the target. 6. -e This flag is used to search all emails associated with the target. 7. -p This flag performs TCP port scanning and find open ports of the target
Installation of Dmitry tool :
Step 1. Turn on your Kali Linux. Move to Desktop Directory.
command : cd Desktop
Step 2. Now create a new directory called Dmitry.
command : mkdir Dmitry
Step 3. As you have created the Dmitry Directory. Now move into this directory because in this directory you have to install Dmitry tool.
command : cd Dmitry
Step 4. As you can see now you are in Dmitry directory. Now you have to clone and download the Dmitry tool from GitHub. Clone the tool using the following command.
command : git clone https://github.com/jaygreig86/dmitry.git
Step 5. Congratulations the Dmitry tool has been downloaded into your Kali Linux. Now you can use the tool. Now to check the listing of the directory using the following command.
command : ls
Step 6. You can see a new directory here called dmitry. Move to this directory using the following command and list the content using the following commands.
command : cd dmitry , ls
Step 7. The file has been downloaded in the directory now you have to install the directory using following command. This will download all the dependencies.
Command : sudo apt-get install automake autoconf
Step 8. All the dependencies have been downloaded, Now you have to give permissions to the tool using following command.
Command : chmod +x configure
Step 9. Permission has been given to the tool for execution. It’s time to initialize the configuration file using the following command.
Command : ./configure
Step 10. Now, this is the time to make a configuration available for the tool, to do that type following command.
command : make
Step 11. Now install the tool using the following command.
Command : make install./
Step 12. Finally, all the dependencies and tool configuration have been completed now you can run the tool using the following command.
Command : ./dmitry
You can see the tool is in the running mode now we can see different flags here. These flags can be used with commands to set a target and to get information about the target. Now we will see some examples to use the tool. Some examples are given below.
Run the tool and get the information about any target.
Run the tool and type the following command for any basic information gathering.
command : ./dmitry scanme.org
Instead of scanme.org you can take any domain name here which is your target.
Run the tool and get specific information about any target with the help of a flag.
Run the tool and type the following command with the flag for specific information gathering. We have used -o flag here to get details about ports.
command : ./dmitry -o scanme.org