Before initial access in any Red Team, Pentest, or cybersecurity exploration operation, reconnaissance (or recon) is mission-critical. That's where tools like AMASS become invaluable.
⚔️ AMASS: Your OSINT & Recon Weapon
Amass is a powerful, modular open-source tool by OWASP for network mapping and external asset discovery.
✅ Key Recon Capabilities:
Passive Recon
Gathers data without touching target systems. Uses public sources (Censys, Shodan, VirusTotal, etc). Safe & stealthy.
Active Recon
Resolves DNS, scans networks, reaches out to discover additional assets. Faster and more aggressive.
Subdomain Enumeration
Finds hidden subdomains, often used in attacks (e.g., admin.dev.target.com
)
Brute Forcing
Uses wordlists to find undiscovered subdomains
ASN/IP/WHOIS Mapping
Maps the IP space belonging to a company
Graph View (viz)
Visualize the relationships between assets

Common Amass Commands
0. Help and Usage Information
amass -h
amass --help
1. Basic Usage
amass enum -d <target_domain>
2. File Input
- This command reads a list of domains from a file and discovers subdomains for each one.
amass enum -df domains.txt
3. Output to File
- This command saves the discovered subdomains in a specified output file. This gives the Amass tool the ability for post-test analysis.
amass enum -d <target_domain> -o results.txt
amass enum -d example.com -o results.csv
amass enum -d example.com -o results.json
4. Brute Force Subdomain Enumeration
- Use brute forcing to discover subdomains with a wordlist.
amass enum -d <target_domain> -brute -w <wordlist>
amass enum -d example.com -brute -w wordlist.txt
5. DNS Resolution
- Resolve discovered subdomains to their respective IP addresses.
amass resolve -d <target_domain>
6. Verbose Output
- This command enables verbose output for detailed information about the enumeration process.
amass enum -d <target_domain> -v
7. Data Sources
- Specify data sources to use during enumeration.
amass enum -d <target_domain> -src
8. Rate Limit
.Limits the number of requests per second during enumeration.
amass enum -d example.com -rl 100
9.Timeout Configuration
.Sets a timeout for requests to avoid hanging.
amass enum -d example.com -timeout 10
10.Data Sources
.Specifies data sources to use during enumeration.
amass enum -d example.com -src
11.Passive Mode AND Active Mode
Conducts active enumeration by querying DNS and other services AND also passive enumeration without making direct requests.
amass enum -passive -d example.com
amass enum -active -d example.com
12.DNS Resolution
Resolves discovered subdomains to their corresponding IP addresses.
amass resolve -d example.com
13.Silent Mode
Suppresses output to display only errors.
amass enum -d example.com -silent
14.Verbose Output
Enables verbose output for detailed information about the discovery process.
amass enum -d example.com -v
The Bottom Line
Amass isn't just about finding subdomains; it's a complete recon powerhouse that can seriously level up your bug bounty and penetration testing game. By mastering these commands and understanding its different modes, you'll uncover a much broader range of digital assets, dramatically increasing your chances of finding those critical vulnerabilities.