The amass tool searches Internet data sources, performs brute force subdomain enumeration, searches web archives, and uses machine learning to generate additional subdomain name guesses. DNS name resolution is performed across many public servers so the authoritative server will see the traffic coming from different locations.
A precompiled version is available for each release.
If your operating environment supports Snap, you can click here to install, or perform the following from the command-line:
$ sudo snap install amass
If you would prefer to build your own binary from the latest version of the source code, make sure you have a correctly configured Go >= 1.10 environment. More information about how to achieve this can be found on the golang website. Then, take the following steps:
- Download amass:
$ go get -u github.com/caffix/amass
At this point, the amass binary should be in $GOPATH/bin.
- Several wordlists can be found in the following directory:
$ ls $GOPATH/src/github.com/caffix/amass/wordlists/
The most basic use of the tool, which includes reverse DNS lookups and name alterations:
$ amass example.com
Get amass to provide summary information:
$ amass -v example.com
www.example.com
ns.example.com
...
13242 names discovered - search: 211, dns: 4709, archive: 126, brute: 169, alt: 8027
Have amass provide the source that discovered the subdomain name:
$ amass -vv example.com
[Google] www.example.com
[VirusTotal] ns.example.com
...
Have amass print IP addresses with the discovered names:
$ amass -ip example.com
Have amass write the results to a text file:
$ amass -ip -o example.txt example.com
Have amass perform brute force subdomain enumeration as well:
$ amass -brute example.com
By default, amass performs recursive brute forcing on new subdomains; this can be disabled:
$ amass -brute -norecursive example.com
Change the wordlist used during the brute forcing phase of the enumeration:
$ amass -brute -w wordlist.txt example.com
Throttle the rate of DNS queries by number per minute:
$ amass -freq 120 example.com
The maximum rate supported is one DNS query every 5 milliseconds.
Allow amass to include additional domains in the search using reverse whois information:
$ amass -whois example.com
You can have amass list all the domains discovered with reverse whois before performing the enumeration:
$ amass -whois -l example.com
Add some additional domains to the search:
$ amass example1.com example2.com example3.com
In the above example, the domains example2.com and example3.com are simply appended to the list potentially provided by the reverse whois information.
All these options can be used together:
$ amass -vv -ip -whois -brute -norecursive -w words.txt -freq 240 -o out.txt ex1.com ex2.com
Be sure that the target domain is the last parameter provided to amass, then followed by any extra domains.
If you are using the amass package within your own Go code, be sure to properly seed the default pseudo-random number generator:
import(
"fmt"
"math/rand"
"time"
"github.com/caffix/amass/amass"
)
func main() {
output := make(chan *amass.AmassRequest)
go func() {
result := <-output
fmt.Println(result.Name)
}()
// Seed the default pseudo-random number generator
rand.Seed(time.Now().UTC().UnixNano())
// Setup the amass configuration
config := amass.CustomConfig(&amass.AmassConfig{
Domains: []string{"example.com"},
Output: output,
})
// Begin the enumeration process
amass.StartAmass(config)
}
- Setup a new local transform within Maltego:
- Configure the local transform to properly execute the go program:
- Go into the Transform Manager, and disable the debug info option:
NOTE: Still under development
Author: Jeff Foley / @jeff_foley
Company: ClaritySec, Inc. / @claritysecinc