kgretzky / evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.23k stars 1.87k forks source link

"session cookie not found" on localhost 127.0.0.1 with patemeter -developer #1005

Open danpaxino opened 5 months ago

danpaxino commented 5 months ago

Hi Kuba ! Thanks for amazing tool!

I tested evilginx on several websites on windows 10 and kali linux on localhost 127.0.0.1 with patemeter -developer One of them is https://webmail.clix.pt/login.php

config always like: : config domain localhost : config ipv4 127.0.0.1 : phishlets hostname clix localhost : phishlets enable clix : lures create clix : lures get-url 0

Evilginx working fine, but it can not find cookie in response(

Evilginx output: evilginx_log.txt

Telerik fiddler proxy request: request.txt

Telerik fiddler proxy response: response.txt

clix.yaml clix.yaml.txt