kgretzky / evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.22k stars 1.87k forks source link

Evilginx 3.3 - gophish integration - no reporting #1042

Open matejsmycka opened 2 months ago

matejsmycka commented 2 months ago

Issue: Evilnginx is not reporting user actions (ReportEmailOpened...) to gophish.

I followed https://breakdev.org/evilginx-3-3-go-phish/, and performed setup. Integration of both is working based on config gophish test. Everything works as expected, however there is no reporting to the gophish instance.

Upon closer inspection, evilginx never access these functions. Because there are no session parameters such as rid^1 or o=track^2 that are expected. In other words, evilginx doesnt even call gophish API.

It is either a bug, or there is some undocumented setting that prevents this.

Thank you, for your work.

matejsmycka commented 2 months ago

I figured it out. You have to use {{.URL}} parameter in the email template.

Otherwise correct GET args will not be there. So dont hardcode url links into email template.

This should be in documentation.

kpomeroy1979 commented 2 months ago

Use EvilGoPhish which is a perfect marriage of evilginx3 and gophish although the lure "redirect_url" functionality is broken, resulting in loops after users authenticate and go through MFA using a ms365 phishlet. Other then that, its great.

fin3ss3g0d commented 2 months ago

I would honestly take a look at the project in depth before making these kinds of misinformed statements, you are spreading misinformation to other people who might be reading this and may have a use case for the project. TCM Security even created a course on it. Just saying. You sound very biased for somebody who is unfamiliar with the project. Jordan Wright, the author of Gophish, did not contribute any code to Kuba's integration and wasn't involved at all. Therefore, it is not an "official" integration like you are claiming. Also, EvilGophish created this integration 2+ years before Kuba's implementation and has had that much more time to improve upon it.

matejsmycka commented 2 months ago

Yes, I wrote it misleadingly, so I deleted the comments.

What I meant to say, evilnginx supports integration with gophish.

fin3ss3g0d commented 1 week ago

Use EvilGoPhish which is a perfect marriage of evilginx3 and gophish although the lure "redirect_url" functionality is broken, resulting in loops after users authenticate and go through MFA using a ms365 phishlet. Other then that, its great.

Don't forget to mention redirect_url not working with o365 phishlet in EvilGophish is due to broken Evilginx code. The redirect code is taken directly from Evilginx, so Evilginx is also impacted by the issue.

malikbens commented 1 week ago

I figured it out. You have to use {{.URL}} parameter in the email template.

Otherwise correct GET args will not be there. So dont hardcode url links into email template.

This should be in documentation.

I have the same problem but even if i use {{.URL}}, openned emails are never tracked .... i don't know if i am missing something. When i investigate the email i see the html tag "" whith a correct lure "https://domain/lure?l=afafoafeobeio" but no tracking in gophish

malikbens commented 1 week ago

Also if i manualy go the img src (wich is a evilginx lure ) its redirecting to the login page setup in the phishlets, evilginx logged it as a new user landing ... i donct rly know if its intented to work like this or my installtion is not good

matejsmycka commented 1 week ago

yeah, i dont remeber now, but I had to modify source code to get it working.

matejsmycka commented 1 week ago

You literally have to be good with golang and fix a lot of stuff yourself.

Source code is half-baked, messy and PRs are not accepted….