أداة كشف ثغرات المواقع TIDoS-Framework
TIDoS-Framework عبارة عن منصة اختبار اختراق و تدقيق شاملة ومتعددة لتطبيقات الويب .
إطار TIDoS Framework مرن للغاية حيث عليك فقط اختيار واستخدام الوحدات Modules. تمكنك من فحص المواقع من الثغرات والضعف الامني بها. الى جانب ذلك تساعدك قي جلب المعلومات حول الهدف والاستطلاع وفحص الشبكات و التخمين على الخدمات...
ملاحظة:
بعض خصائص OSINT تحتاج الى مفتاح API الخاص بك مثل خدمة البحث عبر موقع شوادن.تحتاج إلى تعيين الخاصة بك API KEYS للقيام بذلك ، افتح API_KEYS.py الموجودة بالمجلد files/ وتعيين المفاتيح الخاصة بك والوصول إلى الرموز المميزة
ل SHODAN، CENSYSو FULL CONTACT، GOOGLE و WHATCMS. الجمهور API KEYS و ACCESS TOKENS ل SHODAN و WHATCMS
وهذه مميزات المنصة الغنية بالأدوات
أدوات الاستطلاع Reconnaissance + OSINT
Reconnaissance + OSINT
- Passive Reconnaissance:
- Nping Enumeration
Via external APi
- WhoIS Lookup
Domain info gathering
- GeoIP Lookup
Pinpoint physical location
- DNS Configuration Lookup
DNSDump
- Subdomains Lookup
Indexed ones
- Reverse DNS Lookup
Host Instances
- Reverse IP Lookup
Hosts on same server
- Subnets Enumeration
Class Based
- Domain IP History
IP Instances
- Web Links Gatherer
Indexed ones
- Google Search
Manual search
- Google Dorking (multiple modules)
Automated
- Email to Domain Resolver
Email WhoIs
- Wayback Machine Lookups
Find Backups
- Breached Email Check
Pwned Email Accounts
- Enumeration via Google Groups
Emails Only
- Check Alias Availability
Social Networks
- Find PasteBin Posts
Domain Based
- LinkedIn Gathering
Employees & Company
- Google Plus Gathering
Domain Profiles
- Public Contact Info Scraping
FULL CONTACT
- Censys Intel Gathering
Domain Based
- Threat Intelligence Gathering
Bad IPs
- Nping Enumeration
- Active Reconnaissance
- Ping Enumeration
Advanced
- CMS Detection
(185+ CMSs supported)
IMPROVED
- Advanced Traceroute
IMPROVED
robots.txt
andsitemap.xml
Checker- Grab HTTP Headers
Live Capture
- Find HTTP Methods Allowed
via OPTIONS
- Detect Server Type
IMPROVED
- Examine SSL Certificate
Absolute
- Apache Status Disclosure Checks
File Based
- WebDAV HTTP Enumeration
PROFIND & SEARCH
- PHPInfo File Enumeration
via Bruteforce
- Comments Scraper
Regex Based
- Find Shared DNS Hosts
Name Server Based
- Alternate Sites Discovery
User-Agent Based
- Discover Interesting Files
via Bruteforce
- Common Backdoor Locations
shells, etc.
- Common Backup Locations
.bak, .db, etc.
- Common Password Locations
.pgp, .skr, etc.
- Common Proxy Path Configs.
.pac, etc.
- Multiple Index Paths
index, index1, etc.
- Common Dot Files
.htaccess, .apache, etc
- Common Logfile Locations
.log, .changelog, etc
- Common Backdoor Locations
- Ping Enumeration
أدوات جلب المعلومات المسربة
- Information Disclosure
- Credit Cards Disclosure
If Plaintext
- Email Harvester
IMPROVED
- Fatal Errors Enumeration
Includes Full Path Disclosure
- Internal IP Disclosure
Signature Based
- Phone Number Havester
Signature Based
- Social Security Number Harvester
US Ones
أدوات الفحص والحصر أو التعداد
- Scanning & Enumeration
- Remote Server WAF Enumeration
Generic
54 WAFs
- Port Scanning
Ingenious Modules
- Simple Port Scanner
via Socket Connections
- TCP SYN Scan
Highly reliable
- TCP Connect Scan
Highly Reliable
- XMAS Flag Scan
Reliable Only in LANs
- FIN Flag Scan
Reliable Only in LANs
- Port Service Detector
- Simple Port Scanner
- Web Technology Enumeration
Absolute
- Complete SSL Enumeration
Absolute
- Operating System Fingerprinting
IMPROVED
- Banner Grabbing of Services
via Open Ports
- Interactive Scanning with NMap
16 preloaded modules
- Internet Wide Servers Scan
Using CENSYS Database
- Web and Links Crawlers
- Depth 1
Indexed Uri Crawler
- Depth 2
Single Page Crawler
- Depth 3
Web Link Crawler
- Depth 1
- Remote Server WAF Enumeration
أدوات اكتشاف الثغرات والضعف الأمني
- Vulnerability AnalysisWeb-Bugs & Server Misconfigurations
- Insecure CORS
Absolute
- Same-Site Scripting
Sub-domain based
- Zone Transfer
DNS Server based
- Clickjacking
- Frame-Busting Checks
X-FRAME-OPTIONS
Header Checks
- Security on Cookies
HTTPOnly
FlagSecure
Flag on Cookies
- Cloudflare Misconfiguration Check
- DNS Misconfiguration Checks
- Online Database Lookup
For Breaches
- HTTP Strict Transport Security Usage
- HTTPS Enabled but no HSTS
- Domain Based Email Spoofing
- Missing
SPF
Records - Missing
DMARC
Records
- Missing
- Host Header Injection
- Port Based
Web Socket Based
X-Forwarded-For
Header Injection
- Port Based
- Security Headers Analysis
Live Capture
- Cross-Site Tracing
HTTP TRACE Method
- Session Fixation
via Cookie Injection
- Network Security Misconfig.
- Checks for
TELNET
Enabledvia Port 23
- Serious Web Vulnerabilities
- File Inclusions
- Local File Inclusion (LFI)
Param based
- Remote File Inclusion (RFI)
IMPROVED
- Parameter Based
- Pre-loaded Path Based
- Local File Inclusion (LFI)
- OS Command Injection
Linux & Windows (RCE)
- Path Traversal
(Sensitive Paths)
- Cross-Site Request Forgery
Absolute
- SQL Injection
- Error Based Injection
- Cookie Value Based
- Referer Value Based
- User-Agent Value Based
- Auto-gathering
IMPROVED
- Blind Based Injection
Crafted Payloads
- Cookie Value Based
- Referer Value Based
- User-Agent Value Based
- Auto-gathering
IMPROVED
- Error Based Injection
- LDAP Injection
Parameter Based
- HTML Injection
Parameter Based
- Bash Command Injection
ShellShock
- Apache Struts Shock
Apache RCE
- XPATH Injection
Parameter Based
- Cross-Site Scripting
IMPROVED
- Cookie Value Based
- Referer Value Based
- User-Agent Value Based
- Parameter Value Based
Manual
- Unvalidated URL Forwards
Open Redirect
- PHP Code Injection
Windows + Linux RCE
- CRLF Injection
HTTP Response Splitting
- User-Agent Value Based
- Parameter value Based
Manual
- Sub-domain Takeover
50+ Services
- Single Sub-domain
Manual
- All Subdomains
Automated
- Single Sub-domain
أدوات التخمين و تشفير البايلود
- Auxillary Modules
- Hash Generator
MD5, SHA1, SHA256, SHA512
- String & Payload Encoder
7 Categories
- Forensic Image Analysis
Metadata Extraction
- Web HoneyPot Probability
ShodanLabs HoneyScore
- Hash Generator
- Exploitation
purely developmental
- ShellShock
- Other Tools:
net_info.py
- Displays information about your network. Located undertools/
.tidos_updater.py
- Updates the framework to the latest release via signature matching. Located undertools/
.
طريقة التثبيت
يجب تثبيت المستلزمات الموجودة بملف dependencies وملف requirements.txt
- تثبيت مستلزمات ومكتبات على كالي لينكس
sudo apt-get install libncurses5 libxml2 nmap tcpdump libexiv2-dev build-essential python3-pip libmariadbclient18 libmysqlclient-dev tor konsole
git clone https://github.com/theinfecteddrake/tidos-framework.gitcd tidos-frameworkpip install -r requirements.txtpip install beautifulsoupchmod +x install dependencies./dependencies./install
لتشغيلها فقط قم بالدخول لمجلد الاداة ثم كتابة الامر
cd tidos-framework
python tidos.py
tidos_updater طريقة تحديث الأداة
قم بالدخول الى مجلد الأدوات tools/ (من الطرفية)ثم شغل السكريبت tidos_updater.py
cd tools
python tidos_updater.py