Skip site navigation (1)Skip section navigation (2)

FreeBSD Manual Pages


home | help
DMitry(1)		    General Commands Manual		     DMitry(1)

       DMitry -	Deepmagic Information Gathering	Tool

       dmitry [Options]	host

       DMitry (Deepmagic Information Gathering Tool) is	a UNIX/(GNU)Linux Com-
       mand Line program coded purely in C with	the ability to gather as  much
       information as possible about a host.

       DMitry  has a base functionality	with the ability to add	new functions.
       Basic functionality of DMitry allows for	 information  to  be  gathered
       about  a	target host from a simple whois	lookup on the target to	UpTime
       reports and TCP portscans.

       The application is considered a tool to assist in information gathering
       when information	is required quickly by removing	the need to enter mul-
       tiple commands and the timely process of	searching  through  data  from
       multiple	sources.

       To get straight into DMitry without reading this	document, you can ini-
       tially type "dmitry target", this will perform the  majority  of	 func-
       tions on	the target.

       Options	should be passed to DMitry in the form of '-option'.  Only op-
       tions known by DMitry will be used and others will be ignored.  If  op-
       tions  are  not	passed	as a group block, the trailing options will be
       considered a host target.

       -o filename
	      Create an	ascii text output of the  results  to  the  "filename"
	      specified.   If no output	filename is specified then output will
	      be saved to "target.txt".	 If this option	is  not	 specified  in
	      any  form	output will be sent to the standard output (STDOUT) by
	      default.	 This  option  MUST  trail  all	 other	options,  i.e.
	      "./dmitry	-winseo	target".

       -i     Perform an Internet Number whois lookup on the target.  This re-
	      quires that the target be	in the form of a 4 part	Internet  Num-
	      ber  with	each octal seperated using the `.' notation. For exam-
	      ple, "./dmitry -i".

       -w     Perform a	whois lookup on	the 'host' target.  This requires that
	      the  target  be  in  a  named  character	format.	  For example,
	      "./dmitry	-w target" will	perform	a standard named whois lookup.

       -n     Retrieve data concerning the	 host,	this  includes
	      Operating	 System,  Web  Server  release	and UpTime information
	      where available.

       -s     Perform a	SubDomain search on the	specified target.   This  will
	      use  serveral search engines to attempt to locate	sub-domains in
	      the form of  There is	no set limit to	the  level  of
	      sub-domain  that	can  be	 located,  however, there is a maximum
	      string length of 40 characters (NCOL 40) to limit	memory	usage.
	      Possible	subdomains are then reversed to	an IP address, if this
	      comes back positive then	the  resulting	subdomain  is  listed.
	      However,	if  the	host uses an asterisk in their DNS records all
	      resolve subdomains will come back	positive.

       -e     Perform an EmailAddress search on	the  specified	target.	  This
	      modules  works using the same concept as the SubDomain search by
	      attempting to locate possible  e-mail  addresses	for  a	target
	      host.  The e-mail	addresses may also be for possible sub-domains
	      of the target host.  There is a limit to the length  of  the  e-
	      mail  address set	to 50 characters (NCOL 50) to limit memory us-

       -p     Perform a	TCP Portscan on	the host target.  This is a pretty ba-
	      sic  module  at  the moment, and we do advise users to use some-
	      thing like nmap ( instead.	  This	module
	      will  list  open,	 closed	 and  filtered ports within a specific
	      range.  There will probably be little advancement	upon this mod-
	      ule,  though  there will be some alterations to make it a	little
	      more user	friendly.  There are also other	options	for this  mod-
	      ule that can affect the scan and its relative output.

       -f     This option will cause the TCP Portscan module to	report/display
	      output of	filtered ports.	 These are  usually  ports  that  have
	      been  filtered  and/or  closed  by  a  firewall at the specified
	      host/target.  This option	 requires  that	 the  '-p'  option  be
	      passed  as  a  previous option.  For example, "./dmitry -pf tar-

       -b     This option will cause the TCP Portscan module to	output Banners
	      if  they	are received when scanning TCP Ports.  This option re-
	      qures that the '-p' option be passed as a	previous option.   For
	      example, "./dmitry -pb target".

       -t     This  sets  the  Time  To	Live (TTL) of the Portscan module when
	      scanning individual ports.  This is set to 2 seconds by default.
	      This  is	usually	required when scanning a host that has a fire-
	      wall and/or has filtered ports which can slow a scan down.

       This section presents some example  queries  that  can  be  made	 using
       dmitry.	The hosts and targets used in the examples are merely used for

       dmitry -w

       This will perform a named whois (INIC-WHOIS) lookup on the target host,
       displaying results to the standard output (STDOUT).

       dmitry -winsepo sometextfile.txt

       This  will perform all the basic	functions on the target	host and store
       all the output into "sometextfile.txt".

       dmitry -winsepo

       This will perform all the basic functions on the	target host and	 store
       all the output into "".

       dmitry -winsepfbo

       This  will perform all the basic	functions on the target	host and store
       all the output into "".  This will	also  display  banners
       and show	filtered ports.

       Bugs?  if  you find any e-mail me at with information
       your OS,	what caused the	problem, the error, suggestions	etc.  Thanx

       DMitry, Deepmagic Information Gathering Tool is Copyright  (C)  2001  -
       2005 by James Greig.

       Source  code is provided	with this software to allow users and develop-
       ers to understand the software for security auditing purposes.  We  al-
       low  users  to  view  the source	code so	that they are able to port the
       software	to different Operating Systems with the	ability	to locate bugs
       and so forth.

       James Greig - -
       Conceptual Design
       Phased -

1.3a				  March	2006			     DMitry(1)


Want to link to this manual page? Use this URL:

home | help