DEV Community

Cover image for Afrog explained for bug bounty hunters
Grzegorz Piechnik
Grzegorz Piechnik

Posted on

Afrog explained for bug bounty hunters

When working as a pentester or bug hunter it is normal to want to automate some of our work. This includes scanning network ports, checking the technologies in use, but also running potential exploits and vulnerability scanners. Today we will look at one tool that can help us automate our flow. We are talking about afrog.

Afrog in action

We will skip all the configuration or installation steps because they are too simple to discuss. Instead, let's get straight to how the tool works. It supports user-defined PoCs and includes several built-in types such as CVE, CNVD, default passwords, information disclosure, fingerprint identification, unauthorized access, arbitrary file reading and command execution.

I took my old blog as the target of the attack. It is set up on wordpress and hasn't been updated for several weeks. We can run the tool with one defined target via a command:

afrog -t https://example.com
Enter fullscreen mode Exit fullscreen mode

The appearance of the tool's operation in the console:

figaro@pop-os ~/D/t/afrog (main)> go run /home/figaro/Desktop/tmp/afrog/cmd/afrog/main.go -t https://example.pl
[INF] The reverse connection platform is not configured, which may affect the validation of certain RCE PoCs
[INF] go to `/home/figaro/.config/afrog/afrog-config.yaml` to configure the reverse connection platform

|   A F R O G   >   2.5.1   -   0.2.05

001 05-25 23:22:45 wordpress-login INFO https://example.pl/wp-login.php
002 05-25 23:22:51 CVE-2017-5487 MEDIUM https://example.pl/wp-json/wp/v2/users/
100% (894/894), 4m0sāŽ                                                              
Enter fullscreen mode Exit fullscreen mode

As you can see, we found one potential CVE at the medium level.

The tool, when finished, generates a report in the reports directory with a summary and analysis of detected PoCs. This is useful for further analysis and exploitation.

afroge bug bounty

Conclusion

The afrog tool is similiar to nuclei in its simplicity. Compared to it, it has ~8 times less stars on github (1.6k) which is still not bad and shows strong support for the tool. 984 commits and the last update (as of May 25, 2023) was 18 hours ago. Like nuclei, PoCs are defined in yaml format. The tool should be kept up to date, as it is worth watching and has a wide PoC base.

Sources

https://github.com/zan8in/afrog/tree/main

Top comments (0)