(Last Updated On: December 5, 2018)

Are you a penetration tester trying to perform a quick information gathering?. Digger is a multi-functional tool written in python for all of your primary data gathering needs. Digger will help you to do a lot of basic information gathering tasks.

It makes use of APIs to assemble all the data to hide your Identity. In this guide, I’ll show you how you can install and use Digger to perform:

  • Whois Lookup
  • Reverse DNS Lookup
  • DNS Lookup
  • Port Scan
  • HTTP Header Check
  • Online Traceroute
  • IP Location Lookup
  • robots.txt Checker
  • URL Extraction

How to Download Digger Information Gathering Tool

Digger is a Python script which can easily be downloaded on any Linux system using git clone

$ git clone https://github.com/Sameera-Madhushan/Digger
Cloning into 'Digger'...
remote: Enumerating objects: 29, done.
remote: Counting objects: 100% (29/29), done.
remote: Compressing objects: 100% (28/28), done.
remote: Total 29 (delta 14), reused 0 (delta 0), pack-reused 0
Unpacking objects: 100% (29/29), done.

You should get Digger directory after the clone.

tree Digger
Digger
├── digger.py
├── LICENSE
├── README.md
└── requirements.txt
0 directories, 4 files

How to Use Digger Information Gathering Tool

Once the tool has been downloaded, change your working directory to Digger

cd Digger

Install Python dependencies

sudo pip3 install -r requirements.txt

After dependency installation, run the Digger Python script:

python3 digger.py

If you don’t have Python 3, see the article below

How to Install Python 3.6 on Ubuntu 16.04 / CentOS 7 / Debian 9 / macOS

How to install Pip3 & Django on Ubuntu 18.04 / Ubuntu 16.04 LTS

On running the script, you should receive output like below

_____  _
|  __ \(_)
| |  | |_  __ _  __ _  ___ _ __
| |  | | |/ _` |/ _` |/ _ \ '__|
| |__| | | (_| | (_| |  __/ |
|_____/|_|\__, |\__, |\___|_|
           __/ | __/ |       v2.0
          |___/ |___/

[Coded By Sameera a.k.a άλφα Χ]
     

    {1} Whois lookup
    {2} Traceroute
    {3} DNS Lookup
    {4} Reverse DNS Lookup
    {5} GeoIP Lookup
    {6} Port Scan
    {7} HTTP Header Check
    {8} URL Extractor
    {9} robots.txt Checker
    {10} Update
    {11} Exit

Digger:-

Now use the numbers given to perform your Information Gathering anonymously. See examples below.

Perform Whois Lookup

Digger:- 1
Do You Wish to Dig Your Own Information[yes/no] - no
Enter IP or Domain for lookup:- google.com
	 [#] Checking the availability of API server...
	 [#] API Server is Online
   Domain Name: GOOGLE.COM
   Registry Domain ID: 2138514_DOMAIN_COM-VRSN
   Registrar WHOIS Server: whois.markmonitor.com
   Registrar URL: http://www.markmonitor.com
   Updated Date: 2018-02-21T18:36:40Z
   Creation Date: 1997-09-15T04:00:00Z
   Registry Expiry Date: 2020-09-14T04:00:00Z
   Registrar: MarkMonitor Inc.
   Registrar IANA ID: 292
   Registrar Abuse Contact Email: [email protected]
   Registrar Abuse Contact Phone: +1.2083895740
   Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
   Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
   Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
   Domain Status: serverDeleteProhibited https://icann.org/epp#serverDeleteProhibited
   Domain Status: serverTransferProhibited https://icann.org/epp#serverTransferProhibited
   Domain Status: serverUpdateProhibited https://icann.org/epp#serverUpdateProhibited
   Name Server: NS1.GOOGLE.COM
   Name Server: NS2.GOOGLE.COM
   Name Server: NS3.GOOGLE.COM
   Name Server: NS4.GOOGLE.COM
   DNSSEC: unsigned
   URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2018-12-05T05:09:08Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.

Perform DNS Lookup

Digger:- 3
Enter Domain - google.com
	 [#] Checking the availability of API server...
	 [#] API Server is Online
google.com.		299	IN	A	216.58.217.174
google.com.		299	IN	AAAA	2607:f8b0:4004:80e::200e
google.com.		299	IN	TXT	"docusign=05958488-4752-4ef2-95eb-aa7ba8a3bd0e"
google.com.		599	IN	MX	50 alt4.aspmx.l.google.com.
google.com.		59	IN	SOA	ns1.google.com. dns-admin.google.com. 224084865 900 900 1800 60
google.com.		599	IN	MX	30 alt2.aspmx.l.google.com.
google.com.		3599	IN	TXT	"facebook-domain-verification=22rm551cu4k0ab0bxsw536tlds4h95"
google.com.		21599	IN	CAA	0 issue "pki.goog"
google.com.		21599	IN	NS	ns3.google.com.
google.com.		21599	IN	NS	ns2.google.com.
google.com.		599	IN	MX	20 alt1.aspmx.l.google.com.
google.com.		21599	IN	NS	ns4.google.com.
google.com.		599	IN	MX	10 aspmx.l.google.com.
google.com.		3599	IN	TXT	"v=spf1 include:_spf.google.com ~all"
google.com.		599	IN	MX	40 alt3.aspmx.l.google.com.
google.com.		21599	IN	NS	ns1.google.com.

Follow the same pattern to perform other information Gatherings supported by Digger. If you want to update the tool, use {10} Update

Digger:- 10
Checking for updates...
Digger is Upto Date.