amass
Attack surface mapping and asset discovery. OWASP project.
Quickstart
amass enum -passive -d target.com
amass enum -d target.com
amass enum -d target.com -config config.ini
amass intel -d target.com
Core Concepts
| Concept |
Description |
| enum |
Subdomain enumeration |
| intel |
OSINT/related domain discovery |
| passive |
No direct target contact |
| active |
DNS brute force, zone transfers |
Syntax
amass enum [options] -d <domain>
amass intel [options] -d <domain>
Options
Enum Mode
| Option |
Description |
-d <domain> |
Target domain |
-df <file> |
Domains file |
-passive |
Passive only (no brute force) |
-active |
Active techniques |
-brute |
Brute force subdomain names |
-w <file> |
Wordlist for brute force |
-ip |
Show IP addresses |
-ipv4 |
IPv4 only |
-ipv6 |
IPv6 only |
-src |
Show data sources |
-o <file> |
Output file |
-oA <base> |
All output formats |
-json <file> |
JSON output |
-config <file> |
Config file |
Intel Mode
| Option |
Description |
-d <domain> |
Target domain |
-org <name> |
Organization name |
-asn <asn> |
ASN number |
-whois |
Use WHOIS |
-ip <ip> |
Search by IP |
-cidr <cidr> |
Search by CIDR |
| Option |
Description |
-timeout <min> |
Timeout in minutes |
-max-dns-queries <n> |
Max DNS queries |
-rf <file> |
Resolvers file |
Recipes
Passive Enumeration
amass enum -passive -d target.com
amass enum -passive -d target.com -ip
amass enum -passive -d target.com -src
amass enum -passive -df domains.txt
Active Enumeration
amass enum -d target.com
amass enum -brute -d target.com
amass enum -brute -w wordlist.txt -d target.com
amass enum -active -d target.com
Intel Mode
amass intel -d target.com
amass intel -org "Target Company"
amass intel -asn 12345
amass intel -ip 10.10.10.10
amass intel -cidr 10.10.10.0/24
amass intel -whois -d target.com
amass enum -passive -d target.com -o subs.txt
amass enum -passive -d target.com -json results.json
amass enum -passive -d target.com -oA results
With Config (API Keys)
[data_sources]
[data_sources.Shodan]
apikey = YOUR_SHODAN_KEY
[data_sources.Censys]
apikey = YOUR_CENSYS_ID
secret = YOUR_CENSYS_SECRET
[data_sources.VirusTotal]
apikey = YOUR_VT_KEY
[data_sources.SecurityTrails]
apikey = YOUR_ST_KEY
amass enum -d target.com -config config.ini
Pipeline Integration
amass enum -passive -d target.com -o subs.txt
cat subs.txt | httpx -silent
amass enum -passive -d target.com | naabu -silent | httpx -silent
amass enum -passive -d target.com | \
httpx -silent | \
nuclei -t cves/
Custom Resolvers
amass enum -d target.com -rf resolvers.txt
Database
amass db -names -d target.com
amass viz -d target.com -d3
amass track -d target.com
Output & Parsing
amass enum -passive -d target.com -json results.json
cat results.json | jq -r '.name'
amass enum -passive -d target.com | wc -l
amass enum -passive -d target.com | sort -u
Troubleshooting
| Issue |
Solution |
| Slow/no results |
Use -passive, add API keys |
| DNS errors |
Use custom resolvers -rf |
| Rate limited |
Add -max-dns-queries |
| Timeout |
Increase -timeout |
References