BOOK THIS SPACE FOR AD
ARTICLE ADAmass is an open-source reconnaissance tool by OWASP, designed for network mapping and external asset discovery. It performs DNS enumeration and deep scanning to identify subdomains, IPs, and network-related assets, leveraging multiple data sources simultaneously.
https://github.com/owasp-amass/amass
Key Features and Capabilities:
DNS Enumeration: Brute force subdomain discovery, recursive lookups, zone transfers, certificate transparency logs, wildcard detection, and name alterations.Data Sources Integration: Collects data from DNS databases, search engines, SSL/TLS logs, APIs, web archives, and WHOIS records.Advanced Features: Graph database support, visualization tools, custom scripting, active/passive gathering, and multi-format output (JSON, CSV, GraphML).The primary subcommands of Amass are:
amass intel: Collects open-source intelligence to discover targets for enumeration.amass enum: Performs DNS enumeration and network mapping.amass db: Manages the graph databases storing the enumeration results.To enhance Amass’s capabilities with additional data sources, you can configure APIs for services like Shodan, Censys, VirusTotal, etc.
Configuration File: The default configuration file for Amass is located at ~/.config/amass/config.ini.Edit the Configuration File: Open the config.ini file in a text editor:nano ~/.config/amass/config.ini3. Add Your API Keys: Paste your API keys under the respective sections.
[Censys] api = <your_censys_api_key>[Shodan] api = <your_shodan_api_key>
[VirusTotal] api = <your_virustotal_api_key>
Save the changes and exit the editor. Amass will now use these APIs during enumeration.
1. Subdomain Enumeration
amass enum -d <target_domain> Performs active and passive subdomain enumeration.amass enum -d <target_domain> -passivePassive subdomain enumeration only (doesn't interact directly with the target).amass enum -d <target_domain> -active Active enumeration using DNS, web scraping, and other techniques.amass enum -d <target_domain> -ip Enumerates subdomains and resolves them to their associated IPs.amass enum -d <target_domain> -src Displays the sources of discovered subdomains.2. Domain Asset Discovery
amass intel -org <organization_name> Discovers domains owned by the specified organization.amass intel -d <target_domain> Identifies additional domains.amass intel -whois -d <target_domain> Uses WHOIS data to find domains sharing the same WHOIS details.amass intel -asn <ASN_number> Finds domains within a specific Autonomous System Number.3. Network Mapping
Purpose: Map out the target’s network infrastructure.
amass track -d <target_domain> Tracks changesamass viz -d <target_domain> -o amass_graph.dot Creates a graph representation of the network structure.amass netblocks -asn <ASN_number> Lists IP ranges owned by the ASN.4. Vulnerability Scanning Integration
amass enum -d <target_domain> | nikto -h -Runs Nikto scan on all discovered subdomains for vulnerabilities.amass enum -d <target_domain> -ip | awk '{print $NF}' | nmap -iL -Uses Nmap to scan IPs resolved from subdomains.