01 项目地址
https://github.com/zan8in/afrog
02 项目介绍
afrog 是一款快速、稳定的高性能漏洞扫描器。支持用户自定义PoC,内置CVE、CNVD、默认密码、信息泄露、指纹识别、越权访问、任意文件读取、命令执行等多种类型。通过afrog,网络安全专业人员可以快速验证和修复漏洞,这有助于增强他们的安全防御能力。
使用方法
C:Users>afrog.exe -h
afrog
Usage:
afrog.exe [flags]
Flags:
TARGET:
-t, -target string[] target URLs/hosts to scan (comma separated)
-T, -target-file string list of target URLs/hosts to scan (one per line)
POCS:
-P, -poc-file string PoC file or directory to scan
-ap, -append-poc string[] append PoC file or directory to scan (comma separated)
-pd, -poc-detail string show a afrog-pocs detail
-pl, -poc-list show afrog-pocs list
-ep, -exclude-pocs string[] pocs to exclude from the scan (comma-separated)
-epf, -exclude-pocs-file string list of pocs to exclude from scan (file)
OUTPUT:
-o, -output string write to the HTML file, including all vulnerability results
-j, -json string write to the JSON file, but it will not include the request and response content
-ja, -json-all string write to the JSON file, including all vulnerability results
-doh, -disable-output-html disable the automatic generation of HTML reports (higher priority than the -o command)
FILTER:
-s, -search string search PoC by keyword , eg: -s tomcat,phpinfo
-S, -severity string pocs to run based on severity. support: info, low, medium, high, critical, unknown
RATE-LIMIT:
-rl, -rate-limit int maximum number of requests to send per second (default 150)
-c, -concurrency int maximum number of afrog-pocs to be executed in parallel (default 25)
-smart intelligent adjustment of concurrency based on changes in the total number of assets being scanned
-rrl, -reverse-rate-limit int reverse poc maximum number of requests to send per second (default 50)
-rc, -reverse-concurrency int reverse poc maximum number of afrog-pocs to be executed in parallel (default 20)
OPTIMIZATION:
-retries int number of times to retry a failed request (default 1)
-timeout int time to wait in seconds before timeout (default 10)
-mt enable the monitor-target feature during scanning
-mhe int max errors for a host before skipping from scan (default 3)
-mrbs int max of http response body size (default 2)
-silent only results only
-pedm This monitor tracks and records the execution time of each POC to identify the POC with the longest execution time.
-vsb Once a vulnerability is detected, the scanning program will immediately halt the scan and report the identified vulnerability.
-cookie string custom global cookie, only applicable to http(s) protocol, eg: -cookie 'JSESSION=xxx;'
UPDATE:
-un, -update update afrog engine to the latest released version
-duc, -disable-update-check disable automatic afrog-pocs update check
PROXY:
-proxy string list of http/socks5 proxy to use (comma separated or file input)
VERSION:
-v, -version afrog version
注:工具仅供安全研究与学习之用,若将工具做其他用途,由使用者承担全部法律及连带责任,作者及发布者不承担任何法律及连带责任。
原文始发于微信公众号(GSDK安全团队):漏洞扫描工具 - Afrog
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论