Provided by: dmitry_1.3a-1_amd64 bug

NAME

       DMitry - Deepmagic Information Gathering Tool

SYNOPSIS

       dmitry [Options] host

DESCRIPTION

       DMitry   (Deepmagic   Information  Gathering  Tool)  is  a  UNIX/(GNU)Linux  command  line
       application with the ability to gather as much information as possible about a host.

       Basic functionality of DMitry allows for information to be gathered about  a  target  host
       from a simple whois lookup on the target to uptime reports and TCP portscans.

       The  application  is considered a tool to assist in information gathering when information
       is required quickly by removing the need to enter multiple commands and the timely process
       of searching through data from multiple sources.

OPTIONS

       Options should be passed to DMitry in the form of '-option'.  Only options known by DMitry
       will be used and others will be ignored.  If options are not passed as a group block,  the
       trailing options will be considered a host target.

       -o filename
              Create an ascii text output of the results to the filename specified.  If no output
              filename is specified then output will be saved to "target.txt".  If this option is
              not  specified  in  any form output will be sent to the standard output (STDOUT) by
              default.  This option MUST trail all other options, i.e. "dmitry -winseo target".

       -i     Perform an Internet Number whois lookup on the target IP address.

       -w     Perform a whois lookup on the host target.

       -n     Retrieve netcraft.com data concerning the host, this includes operating system, web
              server release and uptime information where available.

       -s     Perform  a subdomain search on the specified target.  This will use serveral search
              engines to attempt to locate subdomains in the form of sub.target.  There is no set
              limit  to  the  level of subdomain that can be located, however, there is a maximum
              string length  of  40  characters  (NCOL  40)  to  limit  memory  usage.   Possible
              subdomains are then reversed to an IP address, if this comes back positive then the
              resulting subdomain is listed.  However, if the host uses an asterisk in their  DNS
              records all resolve subdomains will come back positive.

       -e     Perform an e-mail address search on the specified target.  This modules works using
              the same concept as the subdomain search by attempting to  locate  possible  e-mail
              addresses  for  a  target  host.   The  e-mail  addresses  may also be for possible
              subdomains of the target host. There is a limit to the length of the e-mail address
              set to 50 characters (NCOL 50) to limit memory usage.

       -p     Perform  a  TCP portscan on the host target. This module will list open, closed and
              filtered ports within a specific range.

       -f     This option will cause the TCP portscan module to report/display output of filtered
              ports.  These are usually ports that have been filtered and/or closed by a firewall
              at the specified host/target.  This option requires that the '-p' option be  passed
              as a previous option.  For example, "dmitry -pf target".

       -b     This  option  will  cause  the  TCP  portscan  module to output banners if they are
              received when scanning TCP ports.  This option requires that  the  '-p'  option  be
              passed as a previous option.  For example, "dmitry -pb target".

       -t     This  sets  the  Time To Live (TTL) of the portscan module when scanning individual
              ports.  This is set to 2  seconds  by  default.   This  is  usually  required  when
              scanning a host that has a firewall and/or has filtered ports which can slow down a
              scan.

EXAMPLES

       This section presents some example queries that can be made using dmitry.

       dmitry -w mydomain.com

       This will perform a named whois (INIC-WHOIS) lookup on the target host, displaying results
       to the standard output (STDOUT).

       dmitry -winsepo sometextfile.txt mydomain.com

       This will perform all the basic functions on the target host and store all the output into
       "sometextfile.txt".

       dmitry -winsepo mydomain.com

       This will perform all the basic functions on the target host and store all the output into
       "mydomain.txt".

       dmitry -winsepfbo 127.0.0.1

       This will perform all the basic functions on the target host and store all the output into
       "127.0.0.1.txt".  This will also display banners and show filtered ports.

AUTHOR

       This manual page was written by Runa  Sandvik  <runa.sandvik@gmail.com>,  for  the  Debian
       GNU/Linux system (but may be used by others).

                                                                                        DMitry(1)