OWASP - OWASP Amass: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Updated via script) Tag: Replaced |
(Updated via script) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
=Description= | =Description= | ||
<br> | <br> | ||
The OWASP Amass tool is designed to help developers and security professionals enumerate and discover subdomains. It can be used for conducting reconnaissance during security assessments and can be integrated into automated workflows. Amass uses publicly available data sources to enumerate subdomains and perform DNS lookups. It can identify wildcard DNS records, perform brute force discovery, and resolve IP addresses to domain names. | The OWASP Amass tool is designed to help developers and security professionals enumerate and discover subdomains. It can be used for conducting reconnaissance during security assessments and can be integrated into automated workflows. Amass uses publicly available data sources to enumerate subdomains and perform DNS lookups. It can identify wildcard DNS records, perform brute force discovery, and resolve IP addresses to domain names. | ||
<br> | <br> | ||
=More Information= | =More Information= |
Latest revision as of 02:57, 24 April 2024
Description
The OWASP Amass tool is designed to help developers and security professionals enumerate and discover subdomains. It can be used for conducting reconnaissance during security assessments and can be integrated into automated workflows. Amass uses publicly available data sources to enumerate subdomains and perform DNS lookups. It can identify wildcard DNS records, perform brute force discovery, and resolve IP addresses to domain names.