Here is some light on what the framework is all about:
(purely developmental)
more under development
Auto-Awesome
module which automates every module for you.(no shits)
NOTE:
Presently, for installing globally, you will need to default your Python version to 2.x. However, the work of migration from Python2 to Python3 is already underway.
git clone https://github.com/0xinfection/tidos-framework.git
cd tidos-framework
chmod +x install
./install
Thats it! Now you are good to go! Now lets run the tool:
tidos
TIDoS needs some libraries to run, which can be installed via aptitude
or yum
Package Managers.
sudo apt-get install libncurses5 libxml2 nmap tcpdump libexiv2-dev build-essential python-pip python-xmpp
Now after these dependencies are finished installing, we need to install the remaining Python Package dependencies, hence run:
pip2 install -r requirements.txt
Thats it. You now have TIDoS at your service. Fire it up using:
python2 tidos.py
You can build it from Dockerfile :
git clone https://github.com/0xinfection/tidos-framework.git
cd tidos-framework/docker
docker build -r tidos .
To run TIDoS :
docker run --interactive --tty --rm tidos bash
tidos
TIDoS is built to be a comprehensive, flexible and versatile framework where you just have to select and use modules.
So to get started, you need to set your own API KEYS
for various OSINT & Scanning and Enumeration purposes. To do so, open up API_KEYS.py
under files/
directory and set your own keys and access tokens for SHODAN
, CENSYS
, FULL CONTACT
, GOOGLE
and WHATCMS
.
GOOD NEWS:
The latest release of TIDoS includes all API KEYS and ACCESS TOKENS for
SHODAN
,CENSYS
,FULL CONTACT
,WHATCMS
by default. I found these tokens on various repositories on GitHub itself. You can now use all the modules which use the API KEYS. :)
Finally, as the framework opens up, enter the website name eg. http://www.example.com
and let TIDoS lead you. Thats it! Its as easy as that.
Recommended:
- Follow the order of the tool (Run in a schematic way).
Reconnaissance ➣ Scanning & Enumeration ➣ Vulnerability Analysis
To update this tool, use tidos_updater.py
module under tools/
folder.
TIDoS Framework presently supports the following: and more modules are under active development
Reconnaissance + OSINT
Via external APi
Domain info gathering
Pinpoint physical location
DNSDump
Indexed ones
Host Instances
Hosts on same server
Class Based
IP Instances
Indexed ones
Manual search
Automated
Email WhoIs
Find Backups
Pwned Email Accounts
Emails Only
Social Networks
Domain Based
Employees & Company
Domain Profiles
FULL CONTACT
Domain Based
Bad IPs
Advanced
(185+ CMSs supported)
IMPROVED
IMPROVED
robots.txt
and sitemap.xml
CheckerLive Capture
via OPTIONS
IMPROVED
Absolute
File Based
PROFIND & SEARCH
via Bruteforce
Regex Based
Name Server Based
User-Agent Based
via Bruteforce
shells, etc.
.bak, .db, etc.
.pac, etc.
index, index1, etc.
.htaccess, .apache, etc
.log, .changelog, etc
If Plaintext
IMPROVED
Includes Full Path Disclosure
Signature Based
Signature Based
US Ones
Scanning & Enumeration
Generic
54 WAFs
Ingenious Modules
via Socket Connections
Highly reliable
Highly Reliable
Reliable Only in LANs
Reliable Only in LANs
Absolute
Absolute
IMPROVED
via Open Ports
16 preloaded modules
Using CENSYS Database
Indexed Uri Crawler
Single Page Crawler
Web Link Crawler
Vulnerability Analysis
Web-Bugs & Server Misconfigurations
Absolute
Sub-domain based
DNS Server based
X-FRAME-OPTIONS
Header ChecksHTTPOnly
FlagSecure
Flag on CookiesFor Breaches
SPF
RecordsDMARC
RecordsWeb Socket Based
X-Forwarded-For
Header InjectionLive Capture
HTTP TRACE Method
via Cookie Injection
TELNET
Enabled via Port 23
Serious Web Vulnerabilities
Param based
IMPROVED
- Parameter BasedLinux & Windows (RCE)
(Sensitive Paths)
Absolute
IMPROVED
Crafted Payloads
IMPROVED
Parameter Based
Parameter Based
ShellShock
Apache RCE
Parameter Based
IMPROVED
Manual
Open Redirect
Windows + Linux RCE
HTTP Response Splitting
Manual
50+ Services
Manual
Automated
Other
PlainText Protocol Default Credential Bruteforce
Auxillary Modules
MD5, SHA1, SHA256, SHA512
7 Categories
Metadata Extraction
ShodanLabs HoneyScore
Exploitation purely developmental
net_info.py
- Displays information about your network. Located under tools/
.tidos_updater.py
- Updates the framework to the latest release via signature matching. Located under tools/
.Lets see some screenshots of TIDoS in real world pentesting action:
v1.7 [latest release] [#stable]
These are some modules which I have thought of adding:
To be released with v2
As per the issues being raised
TIDoS is provided as a offensive web application audit framework. It has built-in modules which can reveal potential misconfigurations and vulnerabilties in web applications which could possibly be exploited maliciously.
THEREFORE, THE AUTHOR AND NEITHER THE CONTRIBUTORS ARE NOT EXCLUSIVELY RESPONSIBLE FOR ANY MISUSE OR DAMAGE DUE TO THIS TOOLKIT.
This project is a very fresh and new project which just simply springed off my mind, and is presently under active development so you may want to put it on a watch, since it is updated frequently.
TIDoS is an in progress work far from perfection and I admit that there may be bugs out there which may cause many modules not to work properly and just bug out. However, being the only single author and maintainer behind this framework, it is my humble request to all users of this framework to hand me the list of modules via raising a new issue which simply do not work and bug out, and I would be more than happy to fix them as we jointly make our journey to realising TIDoS as the greatest web penetration testing framework ever built.
TEMPORARY UPDATE:
Please avoid doing any pull requests temporarily as work for v2 of this framework is already underway and in active development.
Got more suggestions or new ideas? Raise up an issue or hit me up via DM on twitter.
Copyright © Infected Drake