amass-enum
Verified for current stable LTS
Amass Enum Command: Brute Force Subdomains
An engineer would use the 'amass enum -brute -d {{domain_name}}' command during a penetration test to discover and enumerate subdomains of a target domain by performing a brute-force attack with a wordlist. Exact CLI syntax to brute_force_subdomains using Amass Enum.
When to use this: An engineer would use the 'amass enum -brute -d {{domain_name}}' command during a penetration test to discover and enumerate subdomains of a target domain by performing a brute-force attack with a wordlist.
Command Syntax
amass enum -brute -d <domain_name> amass enum -brute -d <domain_name> Command Breakdown
-brute- Command Option
- Tool-specific option used by this command invocation.
-d- Command Option
- Tool-specific option used by this command invocation.
FAQ
Purpose: Exact syntax to brute_force_subdomains using Amass Enum.
Test path: Replace placeholders and run destructive commands in a disposable workspace first.
Flag behavior: Tool version, platform, and shell can change behavior.
Improve This Command
Suggest a correction, safer default, or version-specific note for this entry.
Related Operations
Amass Enum Command: Find Passive Subdomains
amass enum -d <domain_name> Amass Enum Command: Save Terminal Output And Detailed Output amass enum -o <output_file> -dir <path/to/directory> -d <domain_name> Amass Enum Command: Find Active Subdomains With Verification amass enum -active -d <domain_name> -p <80,443,8080> Amass Enum Command: Brute Force Subdomain Search amass enum -brute -d <domain_name> Amass Enum Command: Save Results To File amass enum -o <output_file> -d <domain_name>