- 概述:
DMitry(Deepmagic Information Gathering Tool)是一个一体化的信息收集工具。它可以用来收集以下信息:
1. 端口扫描
2. whois主机IP和域名信息
3. 从Netcraft.com获取主机信息
4. 子域名
5. 域名中包含的邮件地址
尽管这些信息可以在Kali中通过多种工具获取,但是使用DMitry可以将收集的信息保存在一个文件中,方便查看。
- 参数:
- 常用:
-
获取 whois ,ip,主机信息,子域名,电子邮件
子域名和电子邮箱依赖谷歌搜索,没有FQ的可能比较蛋疼一点,可以只用 -win参数
dnt@Kali:~$ dmitry -winse cnblogs.com
Deepmagic Information Gathering Tool
"There be some deep magic going on"
ERROR: Unable to locate Host IP addr. for cnblogs.com
Continuing with limited modules
HostIP:
HostName:cnblogs.com
Gathered Inic-whois information for cnblogs.com
---------------------------------
Domain Name: CNBLOGS.COM
Registrar: 35 TECHNOLOGY CO., LTD
Sponsoring Registrar IANA ID: 1316
Whois Server: whois.35.com
Referral URL: http://www.35.com
Name Server: NS3.DNSV4.COM
Name Server: NS4.DNSV4.COM
Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Updated Date: 12-nov-2014
Creation Date: 12-nov-2003
Expiration Date: 12-nov-2021
>>> Last update of whois database: Thu, 24 Dec 2015 15:40:29 GMT <<<
For more information on Whois status codes, please visit
https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
NOTICE: The expiration date displayed in this record is the date the
regi in
ist Z L Dry ris l
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.
TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
gis ter dom Z ai Z N n names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
wi ll you Z us Z N e th
is cesData
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
to acce Z N ss or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.
Theoma
ins and
Registrars.
Gathered Netcraft information for cnblogs.com
---------------------------------
Retrieving Netcraft.com information for cnblogs.com
Netcraft.com Information gathered
Gathered Subdomain information for cnblogs.com
---------------------------------
Searching Google.com:80...
…………………………………
- 扫描网站端口(这个建议使用Nmap)
dnt@Kali:~$ dmitry -p cnblogs.com -f -b
Deepmagic Information Gathering Tool
"There be some deep magic going on"
HostIP:42.121.252.58
HostName:cnblogs.com
Gathered TCP Port information for 42.121.252.58
---------------------------------
Port State
1/tcp filtered
2/tcp filtered
3/tcp filtered
4/tcp filtered
5/tcp filtered
6/tcp filtered
7/tcp filtered
8/tcp filtered
9/tcp filtered
10/tcp filtered
11/tcp filtered
12/tcp filtered
13/tcp filtered
14/tcp filtered
15/tcp filtered
16/tcp filtered
17/tcp filtered
18/tcp filtered
19/tcp filtered
20/tcp filtered
21/tcp filtered
22/tcp filtered
23/tcp filtered
24/tcp filtered
25/tcp filtered
26/tcp filtered
27/tcp filtered
28/tcp filtered
29/tcp filtered
30/tcp filtered
31/tcp filtered
32/tcp filtered
33/tcp filtered
34/tcp filtered
35/tcp filtered
36/tcp filtered
37/tcp filtered
38/tcp filtered
39/tcp filtered
40/tcp filtered
41/tcp filtered
42/tcp filtered
43/tcp filtered
…………………………
★Kali信息收集~★6.Dmitry:汇总收集
时间: 2024-09-15 11:38:35
★Kali信息收集~★6.Dmitry:汇总收集的相关文章
Kali信息收集系列:(都是我以前的笔记整理了一下,就没加水印,习惯就好)
好几天没发微信公众号了,今天一起发下.(最近有点事情) 前些天老业界的一位朋友问我一些Safe新时代信息收集的问题 逆天虽然好多年不干老本行,但隔段时间都会关注一下 于是就花了点时间整理了一下,你们就当看笑话看看吧 不知道的就长点见识,知道了就笑笑~~~~~~~~ 下周起继续更新专业知识~~ 请容忍我偶尔开个安全的小差~~~(*^__^*) ~~~ ------------------------------ Kali信息收集~ 0.Httrack 网站复制机 http://www.cnblog
★Kali信息收集★8.Nmap :端口扫描
Kali信息收集~ 0.Httrack 网站复制机 http://www.cnblogs.com/dunitian/p/5061954.html Kali信息收集~ 1.Google Hacking + Github Hacking http://www.cnblogs.com/dunitian/p/5074765.html Kali信息收集~2.Whois :域名信息 http://www.cnblogs.com/dunitian/p/5074768.html Kali信息
5·12汶川地震--专题网站收集,以及专题大图收集
中介交易 http://www.aliyun.com/zixun/aggregation/6858.html">SEO诊断 淘宝客 云主机 技术大厅 5·12汶川地震--专题网站收集,以及专题大图收集5·12汶川地震 汶川大地震新浪专题 汶川大地震搜狐专题 汶川大地震网易专题 汶川大地震腾讯专题 汶川大地震人民网专题 汶川大地震 新华网专题 汶川大地震百度贴吧 天涯 网友发地震现场图 四川天府论坛网友播报√ 汶川大地震财经网专题 汶川大地震大江网专题 汶川大地震红网专题 汶川地震阿里巴巴专
★Kali信息收集~ 1.Google Hacking + Github Hacking
一.google hacking site site:cnblogs.com 毒逆天 intitle intitle:login allintitle allintitle:index of allinurl:forcedownload.php?file= inurl inurl:/cgi-bin/MANGA/index.cgi cache 快照页 cache:stackoverflow.com filetype filetype:pdf Kali
★Kali信息收集~4.DNS系列
.1host:DNS信息 参数: 一般情况下,host查找的是A,AAAA,和MX的记录 案例: DNS服务器查询 host -t ns 域名 A记录和MX记录查询 host 域名(host -t a 域名 + host -t mx 域名) PS:A (Address) 记录是用来指定主机名(或域名)对应的IP地址记录.用户可以将该域名下的网站服务器指向到自己的web server上.同时也可以设置您域名的子域名.通俗来说A记录就是服务器的IP,域名绑定A记录就是告诉DNS,当你输入
★Kali信息收集~3.子域名系列
3.1Netcraft :子域名查询 官网:http://searchdns.netcraft.com/ 输入要查询的域名,即可得知子域名 3.2Fierce :子域名查询 概述: fierce 是使用多种技术来扫描目标主机IP地址和主机名的一个DNS服务器枚举工具.运用递归的方式来工作.它的工作原理是先通过查询本地DNS服务器来查找目标DNS服务器,然后使用目标DNS服务器来查找子域名.fierce的主要特点就是可以用来定位独立IP空间对应域名和主机名. 参数: root
★Kali信息收集~★7.FPing :ip段扫描
参数: 使用方法: fping [选项] [目标...] -a显示是活着的目标 -A 显示目标地址 -b n 大量 ping 数据要发送,以字节为单位 (默认 56) -B f 将指数退避算法因子设置为 f -c n 的计数的 ping 命令发送到每个目标 (默认为 1) -C n-c,相同报告结果在冗长的格式 -D 打印前每个输出行的时间戳 -e 显示经过的时间上返回数据包 -f 文件读取列表中的目标是从一个文件 (-意味着 stdin) (仅当没有-g 指定) -g 生成目标列表 (
★Kali信息收集~ 5.The Harvester:邮箱挖掘器
官网:http://www.edge-security.com 安装:apt-get install theHarvester 运行:终端输入 theharvester (小写) 用法+参数:(返回邮箱+子域名) 最常见用法:theharvester -d 域名|公司名 -b 搜索来源(google,bing,pgp,linkedin等)
★Kali信息收集~2.Whois :域名信息
Web地址:http://whois.chinaz.com/ | http://www.whois.net/ 软件参数:whois 常用命令:whois 域名 (重点看whois server和Referral URL)