This tool is used for advanced phishing attacks using reverse proxy. It can also bypass 2FA or 2-factor authorization. Captured tokens will be written in the file token.txt
on successful phish. Attacker can use this tool to phish victim with any website by creating a suitable configuration and using a signed SSL\TLS certificate(victim will see https
connection). Author has already tested it with gmail, outlook & icloud, however no orginal config has been uploaded here for security purposes. This tool is only to be used as a POC to understand advanced phishing and for Red Teaming purposes.
[200 ok]
response to those paths without any body, to avoid any suspicion.SSL/TLS
. Use your own signed certificates. config.py
files. You can just enter part of URL path and tool will automatically match it.cipherginx.py [-h] [-v] [-l {info,debug,error}] [config]
positional arguments:
config select config to run
optional arguments:
-h, --help show this help message and exit
-v, --version show tool version
-l {info,debug,error}, --level {info,debug,error}
logging level
Example:
cipherginx.py myconfig -l debug
or
cipherginx.py -l debug myconfig
In order to use this tool python3
is required.
To install python in windows get it from here.
python cipherginx -h
.sudo
.cert
folder with name server.pem
.config.py
files in config folder.Config files are structured as sub lists inside a list with two/three items, where first item is the path
on which that particular task is to be executed.
Each sublist acts as task. For each replacement you have to add one sublist.
path
can be just some part of the URL where the task is to be executed.
Use '' (blank single quotes)
if you want to apply that replacement on all the URLs.
Basic configuration:
variable | use |
---|---|
hostname |
{target website} |
isSSL |
{http or https} |
server |
{your domain} |
port |
{port to run on} |
Phishing configuration:
list | use |
---|---|
inject_domain |
[domain to be replaced, domain to be replaced with] |
req_headers |
[path, headers in dict format] |
resp_headers |
[path, headers in dict format] |
req_body |
[path, string to be replaced, string to be replaced with] |
resp_body |
[path, string to be replaced, string to be replaced with] |
block_paths |
[paths] |
get_cookie |
[cookie names] |
This tool is merely a POC of what attackers can do. Author is not responsible for any use of this tool in any nefarious activity.
Configs given as an example here are anti script-kiddies.
cipherginx is made by @cipheras and is released under the terms of the
Feel free to submit a bug, add features or issue a pull request.