Slide 1

Slide 1 text

OWASP AMASS Akitsugu Ito(@springmoon6)

Slide 2

Slide 2 text

No content

Slide 3

Slide 3 text

Requirement Design Develop Testing Implement Operation ① Requirement OWASP Top 10 Project ② Design Development OWASP Cheat Sheet Series OWASP Application Security Verification Standard (ASVS) OWASP Security Shepherd OWASP Security Knowledge Framework ③ Testing OWASP Zed Attack Proxy OWASP Juice Shop OWASP Web Security Testing Guide OWASP Mobile Security Testing Guide ④ Implement Operation OWASP ModSecurity Core Rule Set OWASP APPSensor OWASP CSRFGuard OWASP Dependency Check OWASP Dependency Track

Slide 4

Slide 4 text

Requirement Design Develop Testing Implement Operation ① Requirement OWASP Top 10 Project ② Design Development OWASP Cheat Sheet Series OWASP Application Security Verification Standard (ASVS) OWASP Security Shepherd OWASP Security Knowledge Framework ③ Testing OWASP Zed Attack Proxy OWASP Juice Shop OWASP Web Security Testing Guide OWASP Mobile Security Testing Guide ④ Implement Operation OWASP ModSecurity Core Rule Set OWASP APPSensor OWASP CSRFGuard OWASP Dependency Check OWASP Amass OWASP Dependency Track

Slide 5

Slide 5 text

What is Amass? • In-depth DNS Enumeration, Attack Surface Mapping and External Asset Discovery. • DNS enumeration and network mapping to aid in understanding an organization’s attack surface on the Internet https://owasp.org/www-project-amass/

Slide 6

Slide 6 text

How to install • Docker • Security OS

Slide 7

Slide 7 text

Results

Slide 8

Slide 8 text

Visualization https://github.com/OWASP/Amass/blob/master/doc/user_guide.md