How to use the command "amass intel" (with examples)

How to use the command "amass intel" (with examples)

The “amass intel” command is a powerful tool in the Amass tool suite used for collecting open source intelligence on an organization. It allows users to find root domains, Autonomous System Numbers (ASNs), and other valuable information related to a target organization or IP address range. This article will provide examples of various use cases for the “amass intel” command.

Use case 1: Find root domains in an IP address range

Code:

amass intel -addr 192.168.0.1-254

Motivation: By searching for root domains in a specific IP address range, you can discover additional domains that may be associated with a target organization. This can help to expand your knowledge of their online presence and potential attack vectors.

Explanation: The “-addr” flag specifies the IP address range to search for root domains. In this example, we are searching for root domains in the IP address range from 192.168.0.1 to 192.168.0.254.

Example output:

example.com
subdomain.example.com
test.example.com

Use case 2: Use active recon methods

Code:

amass intel -active -addr 192.168.0.1-254

Motivation: Active reconnaissance methods allow you to gather more accurate and up-to-date information about a target organization. By using active recon methods with the “amass intel” command, you can perform active DNS enumeration and improve the quality of your intelligence.

Explanation: The “-active” flag enables active reconnaissance methods. In conjunction with the “-addr” flag, the command will perform active DNS enumeration in the specified IP address range.

Example output:

example.com
subdomain.example.com
test.example.com

Code:

amass intel -whois -d domain_name

Motivation: When targeting a specific domain, it can be valuable to find additional root domains that may be related to it. By utilizing the “amass intel” command with the “-whois” flag, you can discover these associated root domains.

Explanation: The “-whois” flag enables conducting a WHOIS lookup on the specified domain name ("-d" flag). This allows the command to gather additional information about the domain and find other related root domains.

Example output:

example.com
subdomain.example.com
test.example.com

Use case 4: Find ASNs belonging to an organization

Code:

amass intel -org organization_name

Motivation: Autonomous System Numbers (ASNs) are valuable pieces of information when assessing an organization’s internet infrastructure. By using the “amass intel” command with the “-org” flag, you can discover the ASNs belonging to a specific organization.

Explanation: The “-org” flag specifies the name of the target organization. The command will then search for ASNs associated with that organization.

Example output:

AS1234
AS5678
AS9012

Use case 5: Find root domains belonging to a given ASN

Code:

amass intel -asn asn

Motivation: If you have identified a specific Autonomous System Number (ASN) that is of interest, you can use the “amass intel” command with the “-asn” flag to find root domains associated with that ASN. This can help you understand the organization’s online presence and possible attack vectors.

Explanation: The “-asn” flag specifies the target Autonomous System Number. The command will search for root domains belonging to the specified ASN.

Example output:

example.com
subdomain.example.com
test.example.com

Use case 6: Save results to a text file

Code:

amass intel -o output_file -whois -d domain_name

Motivation: Saving the results of the “amass intel” command to a text file allows for further analysis and offline reviewing. By using the “-o” flag to specify an output file, you can easily store the gathered intelligence for later use.

Explanation: The “-o” flag specifies the output file where the results will be saved. In this example, we are also using the “-whois” flag and the “-d” flag to specify the target domain name to gather root domains related to it.

Example output: The results of this command will be saved in the specified output file.

Conclusion:

The “amass intel” command is a versatile tool for collecting open source intelligence on organizations. By leveraging its various flags and arguments, you can easily find root domains, ASNs, and other valuable information related to a target. Whether you are performing reconnaissance or conducting security assessments, the “amass intel” command is an essential part of your toolkit.

Related Posts

How to use the command 'vault' (with examples)

How to use the command 'vault' (with examples)

The ‘vault’ command is a command-line interface (CLI) tool that allows users to interact with HashiCorp Vault, a popular secret management tool.

Read More
How to use the command pgmtosbig (with examples)

How to use the command pgmtosbig (with examples)

This article will guide you through the use cases of the command pgmtosbig, which is used to convert a PGM image file to the SBIG CCDOPS format.

Read More
How to use the command vgrep (with examples)

How to use the command vgrep (with examples)

The vgrep command is a user-friendly pager for grep, designed to make searching for patterns in files easier.

Read More