evilginx: Man-in-the-middle attack framework | phishing credentials & session cookies
Evilginx is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It’s core runs on Nginx HTTP server, which utilizes proxy_pass
and sub_filter
to proxy and modify HTTP content, while intercepting traffic between client and server.
Evilginx – Advanced Phishing With Two-factor Authentication Bypass
https://vimeo.com/212463675
Change log v.1.1
[+] Added iCloud.com support.
[+] Added Live.com support.
[+] Specifying domain name with ‘setup –enable’ is now optional if site was enabled before.
[+] Added ability to specify custom SSL/TLS certificates with –crt and –key arguments.
Custom certificates will be remembered and can be removed with –use_letsencrypt parameter.
[+] Added ‘server_names_hash_bucket_size: 128’ to support long hostnames.
[+] Fixed rare issue, which could be triggered when only visitor’s email was identified at the time
of truncating logs, after parsing, breaking the chain of logged requests, which would miss an
email address on next parse.
[+] Fixed several typos in site config files. (@poweroftrue)
[+] Fixed issue with Nginx proxy bailing out on receiving too big upstream responses.
[+] Fixed issue with Facebook overwriting redirection cookie with ‘deleted’ (@poweroftrue)
[+] Fixed “speedbump” redirection for Google site config that asks user to provide his phone number.
[+] Fixed bug that would raise exception when disabling site configs without them being enabled first.
[+] Nginx access_log directory can now be changed with VAR_LOGS constant in evilginx.py.
[+] Added ‘update.sh’ file which should be executed after every ‘git pull’ to update nginx config files.
[+] Added Dockerfile
Installation
Evilginx provides an installation script install.sh
that takes care of installing the whole package on any Debian wheezy/jessie machine, in fire and forget manner.
Usage
List available site configuration templates:
Enable google phishing site with preregistered phishing domain not-really-google.com
:
Disable facebook phishing site:
Parse
Parse Nginx logs to extract intercepted login credentials and session cookies. Logs, by default, are saved in logs
directory, where evilginx.py
script resides. This can be done automatically after you enable auto-parsing in the Setup phase.
Parse logs only for google site:
Parse logs for all available sites:
Generate URL
Generate phishing URLs that you can use in your Red Team Assessments.
Generate google phishing URL that will redirect victim to rick’roll video on successful login:
Source
https://github.com/kgretzky/evilginx