This Amass tutorial explains how cybersecurity professionals use OWASP Amass to perform subdomain enumeration and attack surface discovery during reconnaissance. Amass is a powerful cybersecurity reconnaissance tool used by ethical hackers, penetration testers, and bug bounty hunters to discover hidden domains, assets, and infrastructure belonging to a target organization.
In this Amass tutorial, security researchers learn how Amass collects information from DNS records, certificate transparency logs, search engines, APIs, and internet intelligence sources to map the external infrastructure of a company.
For example, when running:
amass enum -d example.com
Amass may reveal hidden systems such as:
api.example.com
dev.example.com
vpn.example.com
admin.example.com
These discovered assets are then analyzed for vulnerabilities. Because reconnaissance is the first stage of penetration testing and ethical hacking, learning via this Amass tutorial is an essential skill for cybersecurity professionals.
Table of Contents
What is OWASP Amass?
In this Amass tutorial, we first need to understand what Amass actually does.
OWASP Amass is an open-source reconnaissance tool used for subdomain enumeration and attack surface mapping. It helps cybersecurity professionals discover external infrastructure associated with a target domain.
OWASP Amass official project:
https://owasp.org/www-project-amass/
The Amass tool is widely used in:
- Ethical hacking
- Bug bounty programs
- Red team operations
- penetration testing
- threat intelligence
- cybersecurity reconnaissance
When security professionals go through this Amass tutorial, they are essentially learning how to discover hidden internet assets belonging to an organization.
These assets may include:
- subdomains
- DNS records
- related domains
- cloud infrastructure
- external services
Because organizations often have large and complex infrastructures, discovering all exposed systems manually would be impossible. This is where the Amass reconnaissance tool becomes extremely powerful.
Why Subdomain Enumeration Matters
Subdomain enumeration is a fundamental step in cybersecurity reconnaissance.
Large organizations rarely operate a single domain. Instead they operate hundreds or thousands of subdomains.
Example:
example.com
Possible infrastructure may be discovered using an Amass :
dev.example.com
api.example.com
mail.example.com
vpn.example.com
portal.example.com
admin.example.com
Many of these systems may:
- run outdated software
- expose internal services
- contain development environments
- reveal hidden infrastructure
This is why Amass reconnaissance is a critical step in penetration testing.
Simple Explanation for Beginners
Imagine a company website is like a large shopping mall.
The main domain:
example.com
is the main entrance.
But the mall may have many hidden doors:
- staff entrance
- delivery entrance
- emergency exit
- service hallway
This Amass tutorial teaches ethical hackers how to find every door belonging to the building.
Once all doors are discovered, they can be tested for security weaknesses.
How Amass Works Internally ?
During an Amass tutorial, cybersecurity professionals learn that Amass uses multiple reconnaissance techniques.
Passive Reconnaissance
Passive reconnaissance collects information without directly interacting with the target server.
Sources include:
- certificate transparency logs
- public DNS records
- search engines
- security intelligence APIs
One of the most important sources is:
OWASP Amass project.
Certificate logs often reveal subdomains created during SSL certificate issuance.
Active Reconnaissance
Active reconnaissance involves direct interaction with DNS infrastructure.
This includes:
- DNS brute forcing
- DNS resolution
- zone transfer attempts
Example:
admin.example.com
test.example.com
dev.example.com
This Amass tutorial teaches how to perform both passive and active reconnaissance safely.
Graph-Based Asset Mapping
One powerful feature of Amass is its graph database engine.
Amass builds relationships between assets:
example.com
|
├ api.example.com
├ dev.example.com
└ portal.example.com
This helps ethical hackers understand:
- infrastructure relationships
- domain ownership
- attack paths
How Attackers Use Amass ?
Understanding the attacker mindset is critical in cybersecurity training.
Professional attackers do not randomly attack systems.
Instead they follow a structured workflow.
Phase 1: Reconnaissance
The first step is information gathering.
Attackers use an Amass tutorial workflow to map the entire infrastructure of a target.
Example command:
amass enum -d target.com
This reveals hidden systems.
Phase 2: Identify Interesting Targets
Hackers look for keywords indicating sensitive systems.
Common examples:
admin
internal
dev
vpn
test
staging
portal
backup
These systems often have weaker security.
Example discovered domain:
dev.company.com
Development servers frequently expose vulnerabilities.
Phase 3: Vulnerability Discovery
Once subdomains are discovered using Amass reconnaissance, attackers run additional tools such as:
- Nmap
- FFUF
- Gobuster
- Burp Suite
Example workflow used by bug bounty hunters:
Amass → Nmap → Directory Bruteforce → Exploitation
SecurityElites Hands-On Lab – Amass Tutorial Using Kali Linux for Beginners
In this Amass tutorial lab, we will learn how to use OWASP Amass step by step to discover hidden subdomains of a website.
This lab is designed so even a beginner who has never used cybersecurity tools before can follow it.
Think of this Amass tutorial as a treasure hunt game.
The goal is simple:
We want to find all the hidden doors of a website.
In cybersecurity, these hidden doors are called:
subdomains
Example:
example.com
Hidden doors might be:
dev.example.com
api.example.com
admin.example.com
portal.example.com
The Amass tool helps ethical hackers discover these hidden systems automatically.
This is why learning this Amass tutorial is one of the first skills in ethical hacking and bug bounty reconnaissance.
Lab Environment Setup
Before starting this Amass tutorial, we need a small lab environment.
You need:
• Kali Linux
• Internet connection
• Terminal access
Kali Linux already contains many cybersecurity tools used by ethical hackers.
One of them is Amass reconnaissance tool.
Step 1 — Open Kali Linux Terminal
First, open the Terminal.
In Kali Linux you can open terminal by clicking:
Applications → Terminal
Or press:
CTRL + ALT + T
The terminal is where we type commands for this Amass tutorial lab.
Think of the terminal like a command center where you talk to the computer.
Step 2 — Check if Amass is Installed
Before starting the Amass tutorial, we need to check if the Amass tool is already installed.
Type this command:
amass
If Amass is installed, you will see a help screen showing different options.
If you see something like:
command not found
that means Amass is not installed yet.
Step 3 — Install Amass (If Needed)
To install Amass, type:
sudo apt update
Press Enter.
Then install Amass:
sudo apt install amass
The system will download and install the Amass reconnaissance tool.
After installation, run:
amass
Now the Amass tutorial lab environment is ready.
Step 4 — Understanding the Basic Amass Command
In this Amass tutorial, the most important command is:
amass enum -d domain.com
Let’s understand this.
amass
This calls the Amass tool.
enum
This means enumeration, which means discovering things.
-d
This means domain.
So the full command means:
“Use Amass to discover subdomains of a domain.”
Step 5 — Run Your First Amass Scan
Now we will run our first scan in this Amass tutorial lab.
Type this command:
amass enum -d tesla.com
Press Enter.
Now Amass will begin searching the internet for subdomains of tesla.com.
After some time you may see results like:
api.tesla.com
energy.tesla.com
shop.tesla.com
auth.tesla.com
These are subdomains discovered during Amass reconnaissance.
Each one is a separate system owned by the company.
Step 6 — Passive Recon Mode
In this Amass tutorial, we can run Amass in passive mode.
Passive mode means:
We only collect public information from the internet.
This is safer and quieter.
Run:
amass enum -passive -d tesla.com
Now Amass will collect data from:
• certificate transparency logs
• search engines
• security databases
• DNS datasets
This type of reconnaissance is called:
Step 7 — Active Recon Mode
Active reconnaissance means we actively ask DNS servers for information.
Run this command:
amass enum -active -d tesla.com
In this Amass tutorial, active mode tries to discover more hidden systems.
It performs things like:
• DNS probing
• infrastructure discovery
• deeper enumeration
Active reconnaissance may discover additional subdomains.
Step 8 — Brute Force Subdomains
In this Amass tutorial, we can also try guessing subdomains.
This is called subdomain brute forcing.
Run:
amass enum -brute -d tesla.com
Now Amass will try common names like:
admin.tesla.com
dev.tesla.com
vpn.tesla.com
portal.tesla.com
Many companies accidentally leave these systems exposed.
Step 9 — Save the Results
During a real Amass reconnaissance campaign, ethical hackers always save results.
Run:
amass enum -d tesla.com -o results.txt
Now all discovered subdomains will be saved inside:
results.txt
Saving reconnaissance data helps penetration testers analyze results later.
Step 10 — Discover Where Data Came From
One powerful feature in this Amass tutorial is discovering data sources.
Run:
amass enum -src -d tesla.com
Now Amass will show where it found each subdomain.
Example:
api.tesla.com (crtsh)
energy.tesla.com (dns)
shop.tesla.com (certspotter)
This helps ethical hackers understand how the information was discovered.
Step 11 — Discover Related Domains
Another useful command in this Amass tutorial is intel mode.
Run:
amass intel -d tesla.com
This command discovers related domains owned by the same company.
Example:
teslamotors.com
teslaenergy.com
This helps map the entire digital infrastructure of an organization.
Step 12 — What Happens After Amass Recon?
After completing this Amass tutorial lab, ethical hackers now have a list of discovered assets.
Next steps usually include:
- Port scanning using Nmap
- Directory discovery using FFUF or Gobuster
- Web vulnerability testing using Burp Suite
This process is called:
Recon → Enumeration → Exploitation
And Amass reconnaissance is the first step in this process.
If you are new to cybersecurity, remember this simple idea:
Hackers do not start by attacking.
They start by collecting information.
This Amass tutorial teaches how to collect that information safely and legally.
Frequently Asked Questions – Amass Tutorial using Kali Linux
What is Amass in cybersecurity?
Amass is a reconnaissance tool used for discovering subdomains and internet infrastructure of a target organization. In this Amass tutorial, we learned that Amass gathers information from DNS records, certificate logs, search engines, and public intelligence sources. Ethical hackers use Amass during reconnaissance to understand what systems belong to a company before testing them for vulnerabilities.
Why do ethical hackers use Amass?
Ethical hackers use Amass because organizations often have many hidden subdomains and services. During an Amass tutorial, we learn that discovering these hidden assets helps penetration testers find systems that may be vulnerable or poorly secured. Amass reconnaissance helps map the full attack surface of an organization.
Is Amass legal to use?
Yes, Amass is legal when used for learning cybersecurity, ethical hacking training, or authorized penetration testing. This Amass tutorial demonstrates how the tool works in a lab environment. However, scanning systems without permission may violate cybersecurity laws, so always test only on systems you own or have permission to assess.
Can beginners learn Amass easily?
Yes. The Amass tutorial is beginner friendly because the basic command is very simple:
amass enum -d domain.com
Even students new to cybersecurity can quickly understand how Amass discovers subdomains and hidden infrastructure.
Why do hackers look for subdomains?
Subdomains often host development servers, APIs, staging environments, and internal portals. During an Amass tutorial, we learn that these systems may have weaker security than the main website. Discovering these systems gives ethical hackers new locations to test for vulnerabilities.
Does Amass work on Kali Linux?
Yes. Amass is included in most Kali Linux installations and is widely used by penetration testers. This Amass tutorial lab used Kali Linux because it already contains many tools used in ethical hacking and cybersecurity reconnaissance.
What should I learn after this Amass tutorial?
After finishing this Amass tutorial, beginners should learn other reconnaissance and penetration testing tools such as:
• Nmap network scanning
• FFUF web fuzzing
• Gobuster directory enumeration
• Burp Suite web security testing
These tools combine with Amass to create a complete ethical hacking workflow.
Conclusion – Key Takeways
This Amass tutorial is one of the most important lessons in cybersecurity reconnaissance.
Before attacking any system, ethical hackers must understand the attack surface.
Amass helps discover:
- hidden domains
- infrastructure relationships
- external assets
This information becomes the foundation of penetration testing and bug bounty research.
Mastering this Amass tutorial workflow will significantly improve your reconnaissance capabilities and help you discover vulnerabilities faster.






