Menu

 

Gather Information for websites using Linux Command

Information Gathering commands in Linux

  1. Dmitry
  2. Dnsmap
  3. SPARTA
  4. Maltego

 

  1. dmitry: Dmitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux command line application with the ability to gather as much information as possible about a host. Basic functionality of  DMitry  allows for information to be gathered about a target host from a simple whois lookup on the target to  uptime reports and TCP portscans. The application is considered a tool to assist in information gathering when information is required quickly by removing the need to enter multiple  commands  and  the timely process of searching through data from multiple sources.

 

  1. dnsmap: dnsmap is mainly meant to be used by pentesters during the information gathering/enumeration phase of infrastructure security assessments. During the enumeration stage, the security consultant would typically discover the target company’s IP netblocks, domain names, phone numbers, etc.

 

  1. sparta : It is a python GUI application that simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to their toolkit and by displaying all tool output in a convenient way. If

 

  1. Maltego : It is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego’s unique advantage is to demonstrate the complexity and severity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure.

The unique perspective that Maltego offers to both network and resource based entities is the aggregation of information posted all over the internet – whether it’s the current configuration of a router poised on the edge of your network or the current whereabouts of your Vice President on his international visits, Maltego can locate, aggregate and visualize this information.

Categories:   Linux Server, Security

Comments