Amass Command List
Amass Command Guide
Amass is the industry standard for subdomain enumeration and attack surface mapping. It uses active and passive techniques to discover DNS subdomains and map network infrastructures.
Top 10 Useful Commands
1. Basic Enum
amass enum -d example.com
Explanation: Performs standard enumeration using active and passive data sources.
2. Passive Only (Fast)
amass enum -passive -d example.com
Explanation: Only queries passive data sources (WHOIS, ASN, Certificate Transparency). Very fast and stealthy (no direct traffic to target).
3. Active Mode
amass enum -active -d example.com
Explanation: Enables active scanning methods like attempting to resolve the found names against the target's nameservers.
4. IP Resolution
amass enum -ip -d example.com
Explanation: Shows the IP addresses associated with discovered subdomains (-ip).
5. Brute Force
amass enum -brute -d example.com
Explanation: Enables brute-forcing subdomains using a built-in wordlist.
6. Custom Wordlist
amass enum -brute -w /path/to/wordlist.txt -d example.com
Explanation: Uses a custom wordlist (-w) for brute-forcing.
7. Visualization (D3.js)
amass viz -d3 -d example.com
Explanation: Generates an HTML visualization of the network graph.
8. Track Changes
amass track -d example.com
Explanation: Compares the current scan against previous scans to show what changed (new subdomains added/removed).
9. Whois Info
amass intel -d example.com -whois
Explanation: Performs reverse, whois, and other intelligence gathering operations.
10. Output to File
amass enum -d example.com -o results.txt
Explanation: Saves the findings to a text file.
The Most Powerful Command
amass enum -active -brute -w /usr/share/wordlists/subdomains.txt -d example.com -ip -src
Explanation: Combines active scanning, brute forcing with a custom list, IP resolution, and shows the data source (-src) for each finding.