【Kail 學習筆記】Dmitry信息收集工具


DMitry(Deepmagic Information Gathering Tool)是一個一體化的信息收集工具。它可以用來收集以下信息:

 

  • 根據IP(或域名)來查詢目標主機的Whois信息
  • 在Netcraft.com的網站上挖掘主機信息
  • 查找目標域中用的子域
  • 查找目標域的電子郵件地址
  • 探測目標主機上打開的端口、被屏蔽的端口和關閉的端口
root@kali:~# dmitry -h
Deepmagic Information Gathering Tool
"There be some deep magic going on"

dmitry: invalid option -- 'h'
Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host
  -o     Save output to %host.txt or to file specified by -o file  //將輸出保存到%host.txt或由-o文件指定的文件
  -i     Perform a whois lookup on the IP address of a host  //對主機的IP地址執行whois查找
  -w     Perform a whois lookup on the domain name of a host  //對主機的域名執行whois查找
  -n     Retrieve Netcraft.com information on a host  //在主機上檢索Netcraft.com信息
  -s     Perform a search for possible subdomains  //執行搜索可能的子域
  -e     Perform a search for possible email addresses  //執行搜索可能的電子郵件地址
  -p     Perform a TCP port scan on a host  //在主機上執行TCP端口掃描
* -f     Perform a TCP port scan on a host showing output reporting filtered ports  //在顯示輸出報告過濾端口的主機上執行TCP端口掃描
* -b     Read in the banner received from the scanned port  //讀取從掃描端口接收的banner
* -t 0-9 Set the TTL in seconds when scanning a TCP port ( Default 2 )  //0-9掃描TCP端口時設置TTL(默認為2)
*Requires the -p flagged to be passed  //需要-p標記才能傳遞

   dmitry -iwnse example.com

root@kali:~# dmitry -h Deepmagic Information Gathering Tool "There be some deep magic going on" dmitry: invalid option -- 'h' Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host -o Save output to %host.txt ortofile specified by -o file //將輸出保存到%host.txt或由-o文件指定的文件 -i Perform a whois lookup on the IP address of a host //對主機的IP地址執行whois查找 -w Perform a whois lookup on the domain name of a host //對主機的域名執行whois查找 -n Retrieve Netcraft.com information on a host //在主機上檢索Netcraft.com信息 -s Perform a search for possible subdomains //執行搜索可能的子域 -e Perform a search for possible email addresses //執行搜索可能的電子郵件地址 -p Perform a TCP port scan on a host //在主機上執行TCP端口掃描 * -f Perform a TCP port scan on a host showing output reporting filtered ports //在顯示輸出報告過濾端口的主機上執行TCP端口掃描 * -b Read inthe banner received fromthe scanned port //讀取從掃描端口接收的banner * -t 0-9 Set the TTL inseconds when scanning a TCP port ( Default 2 ) //0-9掃描TCP端口時設置TTL(默認為2) *Requires the -p flagged to be passed //需要-p標記才能傳遞


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM