Header Banner
Null Byte Logo
Null Byte
wonderhowto.mark.png
Cyber Weapons Lab Forum Metasploit Basics Facebook Hacks Password Cracking Top Wi-Fi Adapters Wi-Fi Hacking Linux Basics Mr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker

How to Use Dmitry Effectively.

May 10, 2016 12:59 AM
"How to Use Dmitry Effectively." cover image

Greetings comrades! Great leader has ordered that we gain intel on a website owned by the opposition. For all general purposes we will be scanning nmap.org because they really don't care if Big Brother decides to perform a whois on their IP. We will be using Dmitry for the scanning.

Wait who is Dmitry? Dmitry is a 'Deepmagic Information Gathering Tool' that is very basic in comparison to other programs, but it can gather a lot of information.

Start off by firing up Kali and typing dmitry in the console to see the start screen.

635984123478047386.jpg

Almost none of these flags require anything to be added after them, besides the t and 0 flags.

I'll go ahead and summarize what each flag does.

o :Everything the program gathers will be saved in a file that you name.

i, w, and n :perform lookups on the domain or IP.

s :searches for sub domains, such null-byte.wonderhowto.com.

e :Will look for email addresses on the host.

p :Performs a scan and f is used to provide more verbose output.

b :Reads the banner that the scanned ports have (Pretty much verbose)

t :Just serves as a timeout.

Now it is time to begin our scan based on our needs. We don't necessarily have to scan every single port, but we can later if we want. Right now we just want to see the WHOIS, sub-domains, and possible email addresses.

The command for this is dmitry -wise -o Comrade.txt nmap.org

635984127016015790.jpg

I chose to order the flags to spell 'wise' which serves as a useful acronym. Technically we could put all the flags but we don't want to come off as too aggressive. Sometimes a passive approach is the best to reconnaissance.

635984127734609681.jpg

Woa! What happened here? Something went wrong...

Let's try re-running that code, but this time on a sub-domain. For some reason the main nmap site is causing a buffer overflow in our program.

Discussion Why could this be? Post your theories below.

Instead of googling our problem like a normal person, we just took a detour by scanning the sub-domain, scanme.

dmitry -wise -o Comrade.txt scanme.nmap.org

635984129014454765.jpg

Everything seems to be working fine now!

635984129787265675.jpg

No buffer overflows? Let's double check the file it was supposed to write out to and make sure it recorded everything we flagged.

635984131162578406.jpg

Your output should be saved in the home directory.

635984131522266621.jpg

Hm...everything looks good here. I think our mission is complete.

Comrade dmitry is just one tool in the arsenal of big brother. Join me next week for our next tutorial...which will surely shock you.

--If you find any errors in my tutorials - either technical or grammatical- please let me know.

The ripper has taken another victim

The next big software update for iPhone is coming sometime in April and will include a Food section in Apple News+, an easy-to-miss new Ambient Music app, Priority Notifications thanks to Apple Intelligence, and updates to apps like Mail, Photos, Podcasts, and Safari. See what else is coming to your iPhone with the iOS 18.4 update.

Related Articles

Comments

No Comments Exist

Be the first, drop a comment!