Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   414

Evilginx: The Ultimate Solution for Reverse Proxy, Session Hijacking, and 2FA Bypass

by imperator111 - 09 January, 2025 - 10:31 AM
This post is by a banned member (imperator111) - Unhide
2
Posts
1
Threads
1 Year of service
#1
(This post was last modified: 09 January, 2025 - 12:41 PM by imperator111.)
Evilginx Phishlets and Proxy Services for Sale – High-Value Targets Available. Video Demo – See It in Action To verify the authenticity and functionality of our service, we have provided a video demonstration showcasing:
  1. The deployment of Evilginx with one of our premium Phishlets.
  2. Step-by-step interception of session cookies and bypassing 2FA.
  3. Real-time access to a test account using the captured session data.
[Video: https://vimeo.com/1045260526?ts=0&share=copy]

[Video: https://vimeo.com/1045261825?share=copy]
 Available Packages and Pricing: 
  • Filestack: $1,000
  • Hey: $1,000
  • Kolabnow: $1,000
  • Mailfence: $1,500
  • Mailo: $1,000
  • Migadu: $1,000
  • Nubo.Coop: $1,000
  • Seeweb.it: $1,000
  • Siquando-Forum.de: $1,000
  • Gmail: $5,000
  • Amazon: $1,000
  • Facebook: $1,000
  • Airbnb: $1,000
  • Office 365 (Microsoft Services Only): $1,000
  • Outlook: $1,000
  • Telegram: $2,000
We can create Phishlets for any site you want, not just the ones we currently offer.
For more information, please contact us on Telegram:

CONTACT: https://t.me/@imp3ratorrr


 
What’s Included?
  • Fully functional Evilginx Phishlets for the listed services.
  • Configurations designed to intercept session cookies, bypass 2FA, and hijack accounts.
  • Custom modifications available upon request for specific use cases.
Why Choose Our Service?
  • Reliability: Pre-tested and verified Phishlets.
  • Customization: Tailored configurations to suit your needs.
  • Support: Guidance on setup and deployment to ensure smooth operation.
  • Exclusive Access: Services targeting high-value platforms with premium results.

⚠️ Disclaimer: Ensure all tools and services are used ethically and within legal boundaries. Misuse for illegal purposes is strictly prohibited and punishable by law.
Let me know if you want further refinements or additional content!

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
What is a Reverse Proxy? A reverse proxy is a type of server that sits between clients (e.g., users accessing a website) and the backend servers (e.g., the actual website's server). Instead of clients directly interacting with the backend server, they connect to the reverse proxy, which forwards their requests and then relays responses back to them.
Key Functions of a Reverse Proxy:
  1. Traffic Distribution: Distributes incoming traffic among multiple backend servers to ensure optimal performance and availability.
  2. Load Balancing: Prevents overload on a single server by spreading requests.
  3. Security Enhancement: Hides the backend server’s IP address, providing an additional layer of protection.
  4. SSL Termination: Manages SSL encryption and decryption to reduce the backend server’s load.
  5. Caching: Speeds up content delivery by caching frequently accessed content.

What is Evilginx? Evilginx is an advanced reverse proxy tool designed for penetration testing and red team activities. It is particularly useful in testing web application security, especially in areas like authentication and session management.
Evilginx is primarily used to perform phishing attacks in a controlled environment. It allows attackers (or testers) to proxy traffic between a victim and a legitimate website, intercepting authentication tokens, session cookies, and other sensitive information.
Key Features:
  1. Phishlets: Modular YAML configuration files that define how Evilginx proxies and interacts with specific websites.
  2. Session Hijacking: Captures session tokens (cookies) to bypass login credentials and gain access to accounts.
  3. Two-Factor Authentication (2FA) Bypass: Intercepts valid tokens to circumvent 2FA mechanisms like SMS codes or authenticator apps.
  4. JavaScript Injection: Dynamically injects scripts into proxied pages to modify or capture additional data.
  5. Evilpuppet Integration: Automates interactions with the website to bypass captchas or perform other actions.

What Can You Obtain with Evilginx? 1. Cookies (Session Hijacking)Evilginx captures the victim's session cookies when they log in through the proxy.
  • What is a session cookie?
    • A session cookie is a piece of data that identifies the user to a website after they log in. It eliminates the need for repeated authentication for subsequent requests.
  • Why is it valuable?
    • If you have a victim's session cookie, you can impersonate them without knowing their password or 2FA code.
2. Bypass Credentials (Phishing)
  • How it works:
    • The victim is tricked into entering their username and password on a page served by Evilginx. The tool forwards these credentials to the real website and captures them in transit.
  • Impact:
    • An attacker can log in to the victim's account even without their session cookie.
3. Two-Factor Authentication (2FA) Bypass
  • Why 2FA is not foolproof:
    • Even if the victim has 2FA enabled (e.g., SMS or authenticator app codes), Evilginx can capture the session token after the victim completes the 2FA process.
    • Since session cookies represent a logged-in state, the attacker does not need the 2FA code anymore.
4. Behavioral Insights (Traffic Analysis)Evilginx can intercept additional data during the victim's interaction with the proxied website, such as:
  • User behavior (e.g., mouse movements, form submissions).
  • Browser and device information.

How Does Evilginx Work? 
  1. Setup:
    • Evilginx is deployed on a server with a domain configured to act as a reverse proxy.
    • A Phishlet is set up for the target website (e.g., "example.com").
  2. Victim Interaction:
    • The victim receives a phishing link (e.g., "fake-login.example.com") crafted to look like the real website.
    • They enter their credentials and, if required, complete 2FA.
  3. Session Interception:
    • Evilginx forwards the victim's login data to the legitimate website, allowing them to log in as usual.
    • Simultaneously, Evilginx captures the session cookie and any other relevant authentication tokens.
  4. Access Granted:
    • Using the captured cookie, the attacker gains full access to the victim's account without needing a password or 2FA code.
Payment and Guarantee Terms All sales are made on a guarantor basis. The project will be tested on the client's server before any payment is made. Once testing is successfully completed and the client is satisfied, the payment will be processed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
We can create Phishlets for any site you want, not just the ones we currently offer.
For more information, please contact us on Telegram:
 
CONTACT: https://t.me/@imp3ratorrr

This is a bump
This post is by a banned member (imperator111) - Unhide
2
Posts
1
Threads
1 Year of service
#2
[Video: https://vimeo.com/1045261825]

[Video: https://vimeo.com/1045260526]

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)