DEV Community

Cover image for Afrog explained for bug bounty hunters
Grzegorz Piechnik
Grzegorz Piechnik

Posted on

1

Afrog explained for bug bounty hunters

When working as a pentester or bug hunter it is normal to want to automate some of our work. This includes scanning network ports, checking the technologies in use, but also running potential exploits and vulnerability scanners. Today we will look at one tool that can help us automate our flow. We are talking about afrog.

Afrog in action

We will skip all the configuration or installation steps because they are too simple to discuss. Instead, let's get straight to how the tool works. It supports user-defined PoCs and includes several built-in types such as CVE, CNVD, default passwords, information disclosure, fingerprint identification, unauthorized access, arbitrary file reading and command execution.

I took my old blog as the target of the attack. It is set up on wordpress and hasn't been updated for several weeks. We can run the tool with one defined target via a command:

afrog -t https://example.com
Enter fullscreen mode Exit fullscreen mode

The appearance of the tool's operation in the console:

figaro@pop-os ~/D/t/afrog (main)> go run /home/figaro/Desktop/tmp/afrog/cmd/afrog/main.go -t https://example.pl
[INF] The reverse connection platform is not configured, which may affect the validation of certain RCE PoCs
[INF] go to `/home/figaro/.config/afrog/afrog-config.yaml` to configure the reverse connection platform

|   A F R O G   >   2.5.1   -   0.2.05

001 05-25 23:22:45 wordpress-login INFO https://example.pl/wp-login.php
002 05-25 23:22:51 CVE-2017-5487 MEDIUM https://example.pl/wp-json/wp/v2/users/
100% (894/894), 4m0s⏎                                                              
Enter fullscreen mode Exit fullscreen mode

As you can see, we found one potential CVE at the medium level.

The tool, when finished, generates a report in the reports directory with a summary and analysis of detected PoCs. This is useful for further analysis and exploitation.

afroge bug bounty

Conclusion

The afrog tool is similiar to nuclei in its simplicity. Compared to it, it has ~8 times less stars on github (1.6k) which is still not bad and shows strong support for the tool. 984 commits and the last update (as of May 25, 2023) was 18 hours ago. Like nuclei, PoCs are defined in yaml format. The tool should be kept up to date, as it is worth watching and has a wide PoC base.

Sources

https://github.com/zan8in/afrog/tree/main

Image of AssemblyAI tool

Transforming Interviews into Publishable Stories with AssemblyAI

Insightview is a modern web application that streamlines the interview workflow for journalists. By leveraging AssemblyAI's LeMUR and Universal-2 technology, it transforms raw interview recordings into structured, actionable content, dramatically reducing the time from recording to publication.

Key Features:
πŸŽ₯ Audio/video file upload with real-time preview
πŸ—£οΈ Advanced transcription with speaker identification
⭐ Automatic highlight extraction of key moments
✍️ AI-powered article draft generation
πŸ“€ Export interview's subtitles in VTT format

Read full post

Top comments (0)

AWS Security LIVE!

Tune in for AWS Security LIVE!

Join AWS Security LIVE! for expert insights and actionable tips to protect your organization and keep security teams prepared.

Learn More

πŸ‘‹ Kindness is contagious

Dive into an ocean of knowledge with this thought-provoking post, revered deeply within the supportive DEV Community. Developers of all levels are welcome to join and enhance our collective intelligence.

Saying a simple "thank you" can brighten someone's day. Share your gratitude in the comments below!

On DEV, sharing ideas eases our path and fortifies our community connections. Found this helpful? Sending a quick thanks to the author can be profoundly valued.

Okay