dmitry man page on DragonFly

Man page or keyword search:  
man Server   44335 pages
apropos Keyword Search (all sections)
Output format
DragonFly logo
[printable version]

DMitry(1)							     DMitry(1)

NAME
       DMitry - Deepmagic Information Gathering Tool

SYNOPSIS
       dmitry [Options] host

DESCRIPTION
       DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Com‐
       mand Line program coded purely in C with the ability to gather as  much
       information as possible about a host.

       DMitry  has a base functionality with the ability to add new functions.
       Basic functionality of DMitry allows for	 information  to  be  gathered
       about  a target host from a simple whois lookup on the target to UpTime
       reports and TCP portscans.

       The application is considered a tool to assist in information gathering
       when information is required quickly by removing the need to enter mul‐
       tiple commands and the timely process of searching  through  data  from
       multiple sources.

       To get straight into DMitry without reading this document, you can ini‐
       tially type "dmitry target", this will perform the  majority  of	 func‐
       tions on the target.

OPTIONS
       Options	should	be  passed  to	DMitry in the form of '-option'.  Only
       options known by DMitry will be used and others will  be	 ignored.   If
       options	are  not passed as a group block, the trailing options will be
       considered a host target.

       -o filename
	      Create an ascii text output of the  results  to  the  "filename"
	      specified.   If no output filename is specified then output will
	      be saved to "target.txt".	 If this option is  not	 specified  in
	      any  form output will be sent to the standard output (STDOUT) by
	      default.	 This  option  MUST  trail  all	 other	options,  i.e.
	      "./dmitry -winseo target".

       -i     Perform  an  Internet  Number  whois lookup on the target.  This
	      requires that the target be in the form of  a  4	part  Internet
	      Number  with  each  octal	 seperated using the `.' notation. For
	      example, "./dmitry -i 255.255.255.255".

       -w     Perform a whois lookup on the 'host' target.  This requires that
	      the  target  be  in  a  named  character	format.	  For example,
	      "./dmitry -w target" will perform a standard named whois lookup.

       -n     Retrieve netcraft.com data concerning the	 host,	this  includes
	      Operating	 System,  Web  Server  release	and UpTime information
	      where available.

       -s     Perform a SubDomain search on the specified target.   This  will
	      use  serveral search engines to attempt to locate sub-domains in
	      the form of sub.target.  There is no set limit to the  level  of
	      sub-domain  that	can  be	 located,  however, there is a maximum
	      string length of 40 characters (NCOL 40) to limit memory	usage.
	      Possible	subdomains are then reversed to an IP address, if this
	      comes back positive then	the  resulting	subdomain  is  listed.
	      However,	if  the host uses an asterisk in their DNS records all
	      resolve subdomains will come back positive.

       -e     Perform an EmailAddress search on the  specified	target.	  This
	      modules  works using the same concept as the SubDomain search by
	      attempting to locate possible  e-mail  addresses	for  a	target
	      host.  The e-mail addresses may also be for possible sub-domains
	      of the target host.  There is a limit to the length  of  the  e-
	      mail  address  set  to  50  characters (NCOL 50) to limit memory
	      usage.

       -p     Perform a TCP Portscan on the host target.   This	 is  a	pretty
	      basic  module at the moment, and we do advise users to use some‐
	      thing like nmap (www.insecure.org/nmap/) instead.	  This	module
	      will  list  open,	 closed	 and  filtered ports within a specific
	      range.  There will probably be little advancement upon this mod‐
	      ule,  though  there will be some alterations to make it a little
	      more user friendly.  There are also other options for this  mod‐
	      ule that can affect the scan and its relative output.

       -f     This option will cause the TCP Portscan module to report/display
	      output of filtered ports.	 These are  usually  ports  that  have
	      been  filtered  and/or  closed  by  a  firewall at the specified
	      host/target.  This option	 requires  that	 the  '-p'  option  be
	      passed  as  a  previous option.  For example, "./dmitry -pf tar‐
	      get".

       -b     This option will cause the TCP Portscan module to output Banners
	      if  they	are  received  when  scanning  TCP Ports.  This option
	      requres that the '-p' option be passed  as  a  previous  option.
	      For example, "./dmitry -pb target".

       -t     This  sets  the  Time  To Live (TTL) of the Portscan module when
	      scanning individual ports.  This is set to 2 seconds by default.
	      This  is	usually required when scanning a host that has a fire‐
	      wall and/or has filtered ports which can slow a scan down.

EXAMPLES
       This section presents some example  queries  that  can  be  made	 using
       dmitry.	The hosts and targets used in the examples are merely used for
       demonstration.

       dmitry -w example-host.com

       This will perform a named whois (INIC-WHOIS) lookup on the target host,
       displaying results to the standard output (STDOUT).

       dmitry -winsepo sometextfile.txt example-host.com

       This  will perform all the basic functions on the target host and store
       all the output into "sometextfile.txt".

       dmitry -winsepo example-host.com

       This will perform all the basic functions on the target host and	 store
       all the output into "example-host.com.txt".

       dmitry -winsepfbo 127.0.0.1

       This  will perform all the basic functions on the target host and store
       all the output into "127.0.0.1.txt".  This will	also  display  banners
       and show filtered ports.

BUGS
       Bugs?  if  you find any e-mail me at james@mor-pah.net with information
       your OS, what caused the problem, the error, suggestions etc.  Thanx

DISTRIBUTION
       DMitry, Deepmagic Information Gathering Tool is Copyright  (C)  2001  -
       2005 by James Greig.

       Source  code is provided with this software to allow users and develop‐
       ers to understand the software  for  security  auditing	purposes.   We
       allow  users  to view the source code so that they are able to port the
       software to different Operating Systems with the ability to locate bugs
       and so forth.

AUTHOR
       Programmer/Creator
       James Greig - James@mor-pah.net - http://www.mor-pah.net
       Conceptual Design
       Phased - http://www.deepmagic.org.uk

1.3a				  March 2006			     DMitry(1)
[top]

List of man pages available for DragonFly

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net