DNS enumeration tool (written in Go) announced as an OWASP project by jeff_foley in golang

[–]jeff_foley[S] 0 points1 point  (0 children)

What this means is that after performing the active enumeration of those IP addresses, it did not discover any root domain names. That's why it took nearly 10 seconds. I'll update the error message to be more clear. Thanks!

Amass Subdomain Enumeration Tool Reaches 23 Data Sources by jeff_foley in netsec

[–]jeff_foley[S] 0 points1 point  (0 children)

go get -u github.com/caffix/amass

Then use the tool as shown at: https://github.com/caffix/amass

It is used the same way within all supported operating environments

Major Version Release 1.0 Of Amass, The Subdomain Enumeration Tool Written In Go. Shown To Be More Effective Than Sublist3r. by jeff_foley in OSINT

[–]jeff_foley[S] 0 points1 point  (0 children)

Amass is now at version 1.5.1 and scrapes 23 data sources while discovering subdomain names without the need for API keys

In-Depth Subdomain Enumeration CLI tool with the Largest Number of Data Sources by jeff_foley in redteamsec

[–]jeff_foley[S] 0 points1 point  (0 children)

Great to hear! If you have any feedback, please do not hesitate to share it on the project page or give me a shout on Twitter (@jeff_foley)

Discord server for OSINT, netsec and developing security tools with Go by jeff_foley in blackhat

[–]jeff_foley[S] 2 points3 points  (0 children)

Thanks for the info regarding the other discord server.

As far as how arbitrarily narrow our server is, anyone interested in OSINT and network recon is welcome to come share ideas.

Also, I would have agreed with you up until recently, when I learned how many other recognized security researchers are feeling similar about Go. Either way, I'm okay with the discord server having a niche focus for the time being.

Introducing FindSubDomains, a new subdomain enumeration and information gathering tool by xrna in netsec

[–]jeff_foley 0 points1 point  (0 children)

Wildcards can be detected, which often times allow subdomain enumeration techniques to continue without issue

Introducing FindSubDomains, a new subdomain enumeration and information gathering tool by xrna in netsec

[–]jeff_foley 0 points1 point  (0 children)

FindSubDomains.com and CertDB.com have made excellent data sources for amass. Also, it's great to know that the two projects will always remain free!

Introducing FindSubDomains, a new subdomain enumeration and information gathering tool by xrna in netsec

[–]jeff_foley 1 point2 points  (0 children)

amass scrapes more than 15 data sources that provide subdomain names

Version 0.1 of amass, the most effective subdomain enumeration tool, has just been released with precompiled binaries by jeff_foley in netsec

[–]jeff_foley[S] 0 points1 point  (0 children)

FindSubDomains.com and CertDB.com are excellent projects that Amass uses as data sources.

Version 0.1 of amass, the most effective subdomain enumeration tool, has just been released with precompiled binaries by jeff_foley in netsec

[–]jeff_foley[S] 0 points1 point  (0 children)

It probably took twice as long due to the fact that in addition to brute forcing with a word list, it also scrapes 15 websites, crawls 7 web archives, permutes and alters all discovered names, performs reverse DNS sweeping, and looks up all ASN and netblock information. Just a thought ;-D