kgretzky / evilginx

PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2
MIT License
1.06k stars 260 forks source link

"Deceptive site ahead" Without even using the fake #69

Open Prussian82 opened 6 years ago

Prussian82 commented 6 years ago

I have noticed that google somehow detects proxifed requests, i have installed evilginx, generated url, for google visited it 1 time in browser to see if it works, then after i woke up about 10 hours later, i got the message

"Deceptive site ahead

Firefox blocked this page because it may trick you into doing something dangerous like installing software or revealing personal information like passwords or credit cards."

And site with vps ip appeared in blacklists. Is there any way i can proxify requests from evilginx to google with a dummy domain, so that google will see the request made from that domain and not the actual where evilginx is set up ?

tgalyean commented 5 years ago

For what its worth Google is probably using the X-Forwarded-For header to detect proxied requests. When you go through a proxy, the IP address of each proxy is appended to the header. By the time it reaches the destination web server it will look something like this (or possibly in reverse):

192.168.1.23, 192.168.1.1, 1.1.1.1

You might be able to get around this by using proxy_set_header to explicitly state what the X-Forwarded-For header should be.

https://www.nginx.com/resources/wiki/start/topics/examples/forwarded/ https://en.wikipedia.org/wiki/X-Forwarded-For

DB2121 commented 2 years ago

Evilginx is dead. Doesn’t work effectively anymore sadly CE6DB9DA-0DC6-479A-8975-7CE086E591CC

gfctam commented 1 year ago

I'm facing the same issue in here. Is there any workrounds ? Appreciate that

SandeepSrinivasan commented 9 months ago

https://transparencyreport.google.com/safe-browsing/search?url=sandy.lol

Check your website here

If it's found a malicious by this site, you can report the issue and it will resolved asap