【Kail 学习笔记】Dmitry信息收集工具

DMitry(Deepmagic Information Gathering Tool)是一个一体化的信息收集工具。它可以用来收集以下信息:

  • 根据IP(或域名)来查询目标主机的Whois信息
  • 在Netcraft.com的网站上挖掘主机信息
  • 查找目标域中用的子域
  • 查找目标域的电子邮件地址
  • 探测目标主机上打开的端口、被屏蔽的端口和关闭的端口
root@kali:~# dmitry -h
Deepmagic Information Gathering Tool
"There be some deep magic going on"

dmitry: invalid option -- 'h'
Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host
  -o     Save output to %host.txt or to file specified by -o file  //将输出保存到%host.txt或由-o文件指定的文件
  -i     Perform a whois lookup on the IP address of a host  //对主机的IP地址执行whois查找
  -w     Perform a whois lookup on the domain name of a host  //对主机的域名执行whois查找
  -n     Retrieve Netcraft.com information on a host  //在主机上检索Netcraft.com信息
  -s     Perform a search for possible subdomains  //执行搜索可能的子域
  -e     Perform a search for possible email addresses  //执行搜索可能的电子邮件地址
  -p     Perform a TCP port scan on a host  //在主机上执行TCP端口扫描
* -f     Perform a TCP port scan on a host showing output reporting filtered ports  //在显示输出报告过滤端口的主机上执行TCP端口扫描
* -b     Read in the banner received from the scanned port  //读取从扫描端口接收的banner
* -t 0-9 Set the TTL in seconds when scanning a TCP port ( Default 2 )  //0-9扫描TCP端口时设置TTL(默认为2)
*Requires the -p flagged to be passed  //需要-p标记才能传递

   dmitry -iwnse example.com

root@kali:~# dmitry -h Deepmagic Information Gathering Tool "There be some deep magic going on" dmitry: invalid option -- 'h' Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host -o Save output to %host.txt ortofile specified by -o file //将输出保存到%host.txt或由-o文件指定的文件 -i Perform a whois lookup on the IP address of a host //对主机的IP地址执行whois查找 -w Perform a whois lookup on the domain name of a host //对主机的域名执行whois查找 -n Retrieve Netcraft.com information on a host //在主机上检索Netcraft.com信息 -s Perform a search for possible subdomains //执行搜索可能的子域 -e Perform a search for possible email addresses //执行搜索可能的电子邮件地址 -p Perform a TCP port scan on a host //在主机上执行TCP端口扫描 * -f Perform a TCP port scan on a host showing output reporting filtered ports //在显示输出报告过滤端口的主机上执行TCP端口扫描 * -b Read inthe banner received fromthe scanned port //读取从扫描端口接收的banner * -t 0-9 Set the TTL inseconds when scanning a TCP port ( Default 2 ) //0-9扫描TCP端口时设置TTL(默认为2) *Requires the -p flagged to be passed //需要-p标记才能传递

猜你喜欢

转载自www.cnblogs.com/xiaoyehack/p/9541946.html