dmitry
Gather information about a target host
SYNOPSIS
dmitry [options] host
PARAMETERS
-i
Perform an Internet number lookup (Netcraft.com). This provides information about the web server, operating system, and hosting provider history.
-w
Perform a Whois lookup on the target host's IP address or domain. This retrieves domain registration details like registrant, contact information, and name servers.
-n
Retrieve Netcraft IP address information from the host. This is related to the Netcraft lookup but specifically targets IP details.
-s
Perform a search for possible subdomains. This attempts to find additional hostnames within the target's domain.
-e
Perform a search for possible email addresses. This tries to extract email addresses associated with the target domain from various sources.
-p
Perform a TCP port scan on the target. This option discovers open ports on the specified host.
-f <file>
Read ports from a file for the TCP port scan (used with -p). This allows specifying a custom list of ports to scan.
-b
Read banner information from open ports during the TCP port scan (used with -p). This helps identify the services running on discovered ports.
-t <timeout>
Set the timeout value in seconds for the TCP port scan. This controls how long dmitry waits for a response from a port.
-F
Perform a fast TCP port scan (used with -p). This option optimizes the scan for speed, potentially sacrificing some accuracy.
-o <file>
Save the output to a specified file. This redirects all command output to a file instead of the console.
-v
Display verbose output. This provides more detailed information about the scanning process and results.
-h
Display help message and exit. Shows all available options and their usage.
DESCRIPTION
dmitry, short for "Deepmagic Information Gathering Tool," is a versatile command-line utility designed for reconnaissance and information gathering on target hosts. It consolidates several functionalities typically found in separate tools, offering a comprehensive suite for initial security assessments and penetration testing.
The tool can perform various lookups, including Netcraft queries to identify web server technologies and hosting details, Whois lookups to retrieve domain registration information, and DNS lookups for hostnames and IP addresses. Additionally, dmitry is capable of scanning for open TCP ports, banners, and even searching for subdomains and email addresses associated with the target. Its primary purpose is to provide a quick, consolidated overview of a target's online presence and infrastructure, aiding security professionals in understanding potential attack surfaces.
CAVEATS
Using dmitry without proper authorization can be considered illegal or unethical. Always ensure you have explicit permission from the target's owner before performing any scans or information gathering. The accuracy of information, especially details like uptime or email addresses, can vary and might not always be current or complete. Furthermore, aggressive scanning, particularly port scans, may trigger Intrusion Detection/Prevention Systems (IDS/IPS) and could lead to your IP address being blocked.
ETHICAL CONSIDERATIONS
It is crucial to use dmitry responsibly and ethically. Unauthorized use against systems you do not own or have permission to test is strictly prohibited and may have legal consequences. This tool is intended for legitimate security research, penetration testing, and system administration on authorized targets only.
HISTORY
dmitry was developed by Deepmagic, Inc., as part of their suite of security tools. It gained significant traction within the cybersecurity community, particularly among users of penetration testing distributions like Kali Linux and BackTrack (its predecessor). Its development aimed to streamline the initial reconnaissance phase of security assessments by integrating multiple information-gathering techniques into a single, easy-to-use command-line interface, reducing the need to switch between various specialized utilities.