Cyber Research Wiki

OWASP Amass

OWASP Amass is a framework for mapping internet-exposed assets and attack surfaces using OSINT and optional active reconnaissance, correlating results into a unified asset graph for analysis and tracking.

Overview

OWASP Amass is an OWASP project for external asset discovery and attack surface mapping. It combines open-source intelligence collection with reconnaissance methods to enumerate internet-facing artifacts—such as domains, subdomains, IP addresses, netblocks, and autonomous systems—and to model the relationships among them. The system is widely used to build an organization’s external footprint and to support subsequent security assessment and monitoring activities.

What It Is

Amass is a modular discovery framework that aggregates heterogeneous data sources—commercial and community—alongside optional active DNS techniques to produce a consolidated view of an organization’s external presence. It emphasizes subdomain and DNS-centric enumeration while enriching results with infrastructure context (e.g., netblocks and ASNs). The framework includes components for scoping (domains, IP ranges, ASNs), discovery, correlation, persistence, visualization, and longitudinal tracking so that findings can be analyzed as a coherent asset graph and compared across assessments.

How It Works

Operation is governed by YAML-based configuration that defines targets, operational boundaries, DNS resolvers, and credentials for external intelligence sources. During discovery, Amass queries configured repositories and services—such as certificate transparency logs, WHOIS, passive DNS, and search and security APIs—and can optionally apply active techniques like DNS probing within the declared scope. Collected artifacts are resolved and correlated into a unified model that links names, DNS records, IP addresses, netblocks, and ASNs. Results are persisted to a local store or to external graph/relational backends, enabling dashboards, relationship exploration, and change tracking between runs.

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

high