kgretzky / evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.22k stars 1.87k forks source link

WARN: Error dialing target site #1033

Open mrrobata opened 2 months ago

mrrobata commented 2 months ago

Hi there,

version: 3.3.0

I've been trying to set up a phishing awareness training for a bunch of our employees, it all goes well, but for some unknown reason I can't make proxy to work with our MFA solution, once I'm being redirected to MFA page after SAML login, I'm getting

[170] WARN: Error dialing target site: tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config

in evilginx console. Evilginx then sends HTTP/1.1 POST request instead of HTTP/2 and MFA drops session.

I've tried to use the following construction in vendor/github.com/go-resty/resty/v2/client.go

func (c *Client) SetTLSClientConfig(config *tls.Config) *Client {
        transport, err := c.Transport ()
        if err != nil {
                c.log.Errorf("%v", err)
                return c
        }
        config.InsecureSkipVerify = true
        transport.TLSClientConfig = config
        return c
}

But still no luck :(

Any help would be greatly appreciated. Thanks in advance.