Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.23k
stars
1.87k
forks
source link
"session cookie not found" on localhost 127.0.0.1 with patemeter -developer #1005
I tested evilginx on several websites on windows 10 and kali linux on localhost 127.0.0.1 with patemeter -developer
One of them is https://webmail.clix.pt/login.php
Hi Kuba ! Thanks for amazing tool!
I tested evilginx on several websites on windows 10 and kali linux on localhost 127.0.0.1 with patemeter -developer One of them is https://webmail.clix.pt/login.php
config always like: : config domain localhost : config ipv4 127.0.0.1 : phishlets hostname clix localhost : phishlets enable clix : lures create clix : lures get-url 0
Evilginx working fine, but it can not find cookie in response(
Evilginx output: evilginx_log.txt
Telerik fiddler proxy request: request.txt
Telerik fiddler proxy response: response.txt
clix.yaml clix.yaml.txt