Open In App

Dmitry – Passive Information Gathering Tool in Kali Linux

Dmitry is a free and open-source tool available on GitHub. The tool is used for information gathering. You can download the tool and install in your Kali Linux. Dmitry stands for DeepMagic Information Gathering Tool. It’s a command-line tool Using Dmitry tool You can collect information about the target, this information can be used for social engineering attacks. It can be used to gather a number of valuable pieces of information

Usages of Dmitry Tool :

Flags of Dmitry Tool :

Dmitry Tool is a command-line tool. There are various commands of the Dmitry tool that can be used with different commands. Different flags used with commands. Flags are given below. 



Flags                                                  Uses of flags
1. -o Allows the user to specify a location to write the output of the application to.  
2. -i This flag Performs a whois lookup on the IP address of the target. 
3. -w This flag Performs a whois lookup on the domain name of the host.
4. -n This flag Retrieves all available Netcraft information for a given target.
5. -s This flag is used to search all subdomains of the target.
6. -e This flag is used to search all emails associated with the target.
7. -p This flag performs TCP port scanning and find open ports of the target

Installation of Dmitry tool :

Step 1. Turn on your Kali Linux. Move to Desktop Directory.

command : cd Desktop



Step 2. Now create a new directory called Dmitry.

command : mkdir Dmitry

Step 3. As you have created the Dmitry Directory. Now move into this directory because in this directory you have to install Dmitry tool.

command : cd Dmitry

Step 4.  As you can see now you are in Dmitry directory. Now you have to clone and download the Dmitry tool from GitHub. Clone the tool using the following command. 

command : git clone https://github.com/jaygreig86/dmitry.git

Step 5. Congratulations the Dmitry tool has been downloaded into your Kali Linux. Now you can use the tool. Now to check the listing of the directory using the following command.

command : ls

Step 6. You can see a new directory here called dmitry. Move to this directory using the following command and list the content using the following commands.

command : cd dmitry , ls

Step 7. The file has been downloaded in the directory now you have to install the directory using following command. This will download all the dependencies.

Command : sudo apt-get install automake autoconf

Step 8. All the dependencies have been downloaded, Now you have to give permissions to the tool using following command.

Command : chmod +x configure

Step 9. Permission has been given to the tool for execution. It’s time to initialize the configuration file using the following command.

Command : ./configure

Step 10. Now, this is the time to make a configuration available for the tool, to do that type following command.

command : make

Step 11. Now install the tool using the following command.

Command : make install./

Step 12. Finally, all the dependencies and tool configuration have been completed now you can run the tool using the following command.

Command : ./dmitry

You can see the tool is in the running mode now we can see different flags here. These flags can be used with commands to set a target and to get information about the target. Now we will see some examples to use the tool. Some examples are given below.

Run the tool and get the information about any target.

Run the tool and type the following command for any basic information gathering.

command : ./dmitry scanme.org

Instead of scanme.org you can take any domain name here which is your target.

Run the tool and get specific information about any target with the help of a flag.

Run the tool and type the following command with the flag for specific information gathering. We have used -o flag here to get details about ports.

command : ./dmitry -o scanme.org

Article Tags :