TIDoS Framework is a comprehensive web application audit framework with some serious perks.
The main highlights of this framework is:
- Basic first release (but huge).
- Has 4 main phases, subdivided into 13 sub-phases containing total of 73 modules.
- Reconnaissance Phase has 26 modules of its own (including active, passive and information disclosure modules).
- Scanning & Enumeration Phase has got 12 modules (including port scans, WAF analysis, etc)
- Vulnerability Analysis Phase has 32 modules (including most common vulnerabilites in action.
- Exploitation Phase has only 1 exploit.
(thats in alpha phase)
- All four phases each have a auto-awesome module which automates every module for you.
- You just need the domain, and leave everything is to this tool.
- TIDoS has full verbose out support, so you'll know whats going on.
- User friendly interaction environment.
(no real shits)
Note:
For more info on various modules please refer to the wiki.
- Clone the repository locally and navigate there:
git clone https://github.com/theinfecteddrake/tidos-framework.git
cd tidos-framework
- Install the dependencies:
chmod +x install
./install
Thats it! Now you are good to go! Now lets run the tool:
tidos
TIDoS is made to be comprehensive. Its highly flexible framework where you just have to select and use modules.
As the framework opens up, enter the website name eg. http://www.example.com
and let TIDoS lead you. Thats it! Its as easy as that.
Recommended:
- Follow the order of the tool (Run in a schematic way).
Reconnaissance ⮚ Scanning & Enumeration ⮚ Vulnerability Analysis
TIDoS Framework presently supports the following:
-
Reconnaissance + OSINT
-
Passive Reconnaissance:
- Ping/Nping Enumeration
- WhoIS Lookup
- GeoIP Lookup
- DNS Config. Lookup
- Subdomains Lookup
- Reverse DNS Lookup
- Reverse IP Lookup
- Web Links Gatherer
- Google Search (manual search)
- Google Dorking (multiple modules)
automated
-
Active Reconnaissance
- HPing3 enumeration
(under dev)
- CMS Detection
(185+ CMSs supported)
- Advanced Traceroute
IMPROVED
- Grab HTTP Headers
- Detect Server
IMPROVED
- Examine SSL Certificate
robots.txt
andsitemap.xml
Checker- Subnets Enumeration
- Find Shared DNS Hosts
- Operaing System Fingerprint
- HPing3 enumeration
-
Information Disclosure
- Credit Cards Disclosure in Plaintext
- Email Harvester
- Fatal Errors Enumeration
Includes Full Path Disclosure checks
- Internal IP Disclosure
- Phone Number Havester
- Social Security Number Harvester
-
-
Scanning & Enumeration
- Remote Server WAF Analysis
- Port Scanning
Ingenious Modules
- Simple Port Scanner
via Socket Connections
- TCP SYN Scan
- TCP Connect Scan
- XMAS Flag Scan
- Fin Flag Scan
- Service Detector
- Simple Port Scanner
- Interactive Scanning with NMap
16 modules
- Crawlers
- Depth 1
- Depth 2
IMPROVED
-
Vulnerability Analysis
Web-Bugs & Server Misconfigurations
- Insecure CORS
iCORS
- Same-Site Scripting
- Zone Transfer
DNS Server based
- Clickjacking
Framable Response
- Security on Cookies
HTTPOnly/Secure Flags
- Cloudflare Misconfiguration Check
+ Getting Real IP
- HTTP High Transport Security Usage
- Spoofable Email
(Missing SPF and DMARC Records)
- Security Headers Analysis
- Cross-Site Tracing
(Port Based)
- Network Security Misconfig.
(Telnet Enabled)
Serious Web Vulnerabilities
- File Intrusions
- Local File Intrusion (LFI)
- Remote File Inclusion (RFI)
- OS Command Execution
Linux & Windows (RCE)
- Path Traversal (Sensitive Paths)
- Cross-Site Request Forgery
- SQL Injection
- Cookie Value Based
- Referer Value Based
- User-Agent Value Based
- Host Header Injection
- Bash Command Injection
Shellshock
- Cross-Site Scripting
beta
- Cookie Value Based
- Referer Value Based
- User-Agent Value Based
- CRLF Injection and HTTP Response Splitting
Auxillaries
- Protocol Credential Bruteforce
3 more under dev.
- FTP Bruteforce
- SSH Bruteforce
- POP 2/3 Bruteforce
- SQL Bruteforce
- String & Payload Encoder
- URL Encode
- Base64 Encode
- HTML Encode
- Plain ASCII Encode
- Hex Encode
- Octal Encode
- Binary Encode
- GZip Encode
- Insecure CORS
-
Exploitation
purely developmental
- ShellShock
This version of TIDoS is purely developmental beta
. There are bugs in resolving the [99] Back
at various end-points. Also TIDoS needs to develop more on logging all info displayed on the screen (help needed)
.
This project is one of the best frameworks I have ever built and I would really like your constructive criticism, suggestions and help in converting this project into the best web penetration testing framework ever built and it will be ;)
.
Thank you
✎ @tID (Team CodeSploit)