Offensive Security Tool: Arjun
Reading Time: 3 Minutes
Offensive Security Tool: Arjun
When you are in a Red Team or a Pentester and working on a web application, before you start injection-based attacks you need URLs with Parameters. Without Parameters, you cannot inject, so you got to find an injection point to start attacking with different types such as XSS, SQLi, LFI, etc. Arjun, does this for you. Once you find a URL with a parameter after performing some spidering, you then can use this tool and it will check and find for you the parameters, that can be injected.
What’s Arjun?
Arjun by s0md3v can find query parameters for URL endpoints. If you don’t get what that means, it’s okay, read along. Web applications use parameters (or queries) to accept user input, consider the following example:
http://api.example.com/v1/userinfo?id=751634589
This URL seems to load user information for a specific user id, but what if there is a parameter named admin that, when set to True, makes the endpoint provide more information about the user? This is what Arjun does, it finds valid HTTP parameters with a huge default dictionary of 10,985 parameter names.
The best part? It takes less than 10 seconds to go through this huge list while making just 20-30 requests to the target. Here’s how.
See Also: Complete Offensive Security and Ethical Hacking Course
Why Arjun?
- Supports GET/POST/POST-JSON/POST-XML requests
- Automatically handles rate limits and timeouts
- Export results to: Burp Suite, text or JSON file
- Import targets from: Burp Suite, text file or a raw request file
- Can passively extract parameters from JS or 3 external sources
Installing Arjun
You can install arjun with pip as following:
pip3 install arjun
or, by downloading this repository and running
python3 setup.py install
See Also: Recon Tool: Dorks collections list
How to use Arjun?
A detailed usage guide is available on Usage section of the Wiki.
Direct links to some basic options are given below:
Optionally, you can use the –help argument to explore Arjun on your own.
See Also: Write up: Find hidden and encrypted secrets from any website