-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathconfig.ini
More file actions
128 lines (104 loc) · 3.33 KB
/
config.ini
File metadata and controls
128 lines (104 loc) · 3.33 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
# Copyright 2017 Jeff Foley. All rights reserved.
# Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file.
# The directory that stores the Cayley graph database and other output files
# The default is $HOME/amass
# output_directory =
# The maximum number of concurrent DNS queries that can be performed during the enumeration.
# Increase this value over 100000 as long as your network and resolvers can handle the traffic
maximum_dns_queries = 10000
# Basic settings related to brute forcing
[bruteforce]
enabled = false
#recursive = true
# Number of discoveries made in a subdomain before performing recursive brute forcing
# Default is 0
#minimum_for_recursive = 0
# wordlist_file =
# Would you like to permute resolved names?
#[alterations]
#enabled = true
# minimum_for_word_flip specifies the number of times a word must be seen before
# using it for future word flips and word additions
#minimum_for_word_flip = 2
# edit_distance specifies the number of times a primitive edit operation will be
# performed on a name sample during fuzzy label searching
#edit_distance = 1
#flip_words = true # test-dev.owasp.org -> test-prod.owasp.org
#flip_numbers = true # test1.owasp.org -> test2.owasp.org
#add_words = true # test.owasp.org -> test-dev.owasp.org
#add_numbers = true # test.owasp.org -> test1.owasp.org
#wordlist_file = /usr/share/wordlists/all.txt
#wordlist_file = /usr/share/wordlists/all.txt # multiple lists can be used
# Should only passive data sources be used without DNS resolution?
mode = passive
# Would you like to use more active techniques, such as pulling
# certificates from discovered IP addresses?
# mode = active
# Ports used when pulling certificates
port = 8080
port = 443
# Would you like unresolved names to be included in the output?
#include_unresolvable = true
# Root domain names used in the enumeration
# [domains]
# domain =
# DNS resolvers used globally by the amass package
[resolvers]
resolver = 1.1.1.1 ; Cloudflare
resolver = 8.8.8.8 ; Google
resolver = 64.6.64.6 ; Verisign
resolver = 74.82.42.42 ; Hurricane Electric
resolver = 1.0.0.1 ; Cloudflare Secondary
resolver = 8.8.4.4 ; Google Secondary
resolver = 9.9.9.10 ; Quad9 Secondary
resolver = 64.6.65.6 ; Verisign Secondary
resolver = 77.88.8.1 ; Yandex.DNS Secondary
# Are there any subdomains that are out of scope?
[blacklisted]
# subdomain = assets.spotify.com
# subdomain = 2012.appsecusa.org
# Are there any data sources that should not be utilized?
#[disabled_data_sources]
#data_source = Ask
#data_source = Exalead
#data_source = IPv4Info
# Configure Amass to use a Gremlin Server instead of the in-memory graph
#[gremlin]
#url = ws://localhost:8182
#username =
#password =
# Provide API key information for a data source
#[AlienVault]
#apikey =
#[BinaryEdge]
#apikey =
#[Censys]
#apikey =
#secret =
#[CertDB]
#username =
#password =
#[CIRCL]
#username =
#password =
#[DNSDB]
#apikey =
#[PassiveTotal]
#username =
#apikey =
#[SecurityTrails]
#apikey =
#[Shodan]
#apikey =
# Provide your Twitter App Consumer API key and Consumer API secrety key
#[Twitter]
#apikey =
#secret =
# The apikey must be an API access token created through the Investigate management UI
#[Umbrella]
#apikey =
# URLScan can be used without an API key, but the key allows new submissions to be made
#[URLScan]
#apikey =
#[VirusTotal]
#apikey =