How to Perform Information Gathering on Linux with Digger
source link: https://computingforgeeks.com/how-to-perform-information-gathering-on-linux-with-digger/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Are you a penetration tester trying to perform a quick information gathering?. Digger is a multi-functional tool written in python for all of your primary data gathering needs. Digger will help you to do a lot of basic information gathering tasks.
It makes use of APIs to assemble all the data to hide your Identity. In this guide, I’ll show you how you can install and use Digger to perform:
- Whois Lookup
- Reverse DNS Lookup
- DNS Lookup
- Port Scan
- HTTP Header Check
- Online Traceroute
- IP Location Lookup
- robots.txt Checker
- URL Extraction
How to Download Digger Information Gathering Tool
Digger is a Python script which can easily be downloaded on any Linux system using git clone
$ git clone https://github.com/Sameera-Madhushan/Digger Cloning into 'Digger'... remote: Enumerating objects: 29, done. remote: Counting objects: 100% (29/29), done. remote: Compressing objects: 100% (28/28), done. remote: Total 29 (delta 14), reused 0 (delta 0), pack-reused 0 Unpacking objects: 100% (29/29), done.
You should get Digger directory after the clone.
$ tree Digger Digger ├── digger.py ├── LICENSE ├── README.md └── requirements.txt 0 directories, 4 files
How to Use Digger Information Gathering Tool
Once the tool has been downloaded, change your working directory to Digger
cd Digger
Install Python dependencies
sudo pip3 install -r requirements.txt
After dependency installation, run the Digger Python script:
python3 digger.py
If you don’t have Python 3, see the article below
How to Install Python 3.6 on Ubuntu 16.04 / CentOS 7 / Debian 9 / macOS
How to install Pip3 & Django on Ubuntu 18.04 / Ubuntu 16.04 LTS
On running the script, you should receive output like below
_____ _ | __ \(_) | | | |_ __ _ __ _ ___ _ __ | | | | |/ _` |/ _` |/ _ \ '__| | |__| | | (_| | (_| | __/ | |_____/|_|\__, |\__, |\___|_| __/ | __/ | v2.0 |___/ |___/ [Coded By Sameera a.k.a άλφα Χ] {1} Whois lookup {2} Traceroute {3} DNS Lookup {4} Reverse DNS Lookup {5} GeoIP Lookup {6} Port Scan {7} HTTP Header Check {8} URL Extractor {9} robots.txt Checker {10} Update {11} Exit Digger:-
Now use the numbers given to perform your Information Gathering anonymously. See examples below.
Perform Whois Lookup
Digger:- 1 Do You Wish to Dig Your Own Information[yes/no] - no Enter IP or Domain for lookup:- google.com [#] Checking the availability of API server... [#] API Server is Online Domain Name: GOOGLE.COM Registry Domain ID: 2138514_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.markmonitor.com Registrar URL: http://www.markmonitor.com Updated Date: 2018-02-21T18:36:40Z Creation Date: 1997-09-15T04:00:00Z Registry Expiry Date: 2020-09-14T04:00:00Z Registrar: MarkMonitor Inc. Registrar IANA ID: 292 Registrar Abuse Contact Email: [email protected] Registrar Abuse Contact Phone: +1.2083895740 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Domain Status: serverDeleteProhibited https://icann.org/epp#serverDeleteProhibited Domain Status: serverTransferProhibited https://icann.org/epp#serverTransferProhibited Domain Status: serverUpdateProhibited https://icann.org/epp#serverUpdateProhibited Name Server: NS1.GOOGLE.COM Name Server: NS2.GOOGLE.COM Name Server: NS3.GOOGLE.COM Name Server: NS4.GOOGLE.COM DNSSEC: unsigned URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/ >>> Last update of whois database: 2018-12-05T05:09:08Z <<< For more information on Whois status codes, please visit https://icann.org/epp The Registry database contains ONLY .COM, .NET, .EDU domains and Registrars.
Perform DNS Lookup
Digger:- 3 Enter Domain - google.com [#] Checking the availability of API server... [#] API Server is Online google.com. 299 IN A 216.58.217.174 google.com. 299 IN AAAA 2607:f8b0:4004:80e::200e google.com. 299 IN TXT "docusign=05958488-4752-4ef2-95eb-aa7ba8a3bd0e" google.com. 599 IN MX 50 alt4.aspmx.l.google.com. google.com. 59 IN SOA ns1.google.com. dns-admin.google.com. 224084865 900 900 1800 60 google.com. 599 IN MX 30 alt2.aspmx.l.google.com. google.com. 3599 IN TXT "facebook-domain-verification=22rm551cu4k0ab0bxsw536tlds4h95" google.com. 21599 IN CAA 0 issue "pki.goog" google.com. 21599 IN NS ns3.google.com. google.com. 21599 IN NS ns2.google.com. google.com. 599 IN MX 20 alt1.aspmx.l.google.com. google.com. 21599 IN NS ns4.google.com. google.com. 599 IN MX 10 aspmx.l.google.com. google.com. 3599 IN TXT "v=spf1 include:_spf.google.com ~all" google.com. 599 IN MX 40 alt3.aspmx.l.google.com. google.com. 21599 IN NS ns1.google.com.
Follow the same pattern to perform other information Gatherings supported by Digger. If you want to update the tool, use {10} Update
Digger:- 10 Checking for updates... Digger is Upto Date.
Recommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK