Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
I am using a domain on namecheap and a digitalocean droplet. I set everything up to he best i can follow docs. When i create a lure and get url I goto the url and it says 'site cant be reached' when running evilginx i get no errors at startup and evilginx is running on 53,443. Aslo the domain is pointing correctly to the vps IP address.
I am using the example phishlet
i config domain and ipv4 correctly
i enable example and create a lure and get url
the url is academy.mydomain.xyz
when i follow the lure url i get the site cant be reached error.
DO NOT ASK FOR PHISHLETS.
DO NOT ASK FOR HELP CREATING PHISHLETS.
DO NOT ASK TO FIX PHISHLETS.
DO NOT ADVERTISE OR TRY TO SELL PHISHLETS.
EXPECT A BAN OTHERWISE. THANK YOU!
REPORT ONLY BUGS OR FEATURE SUGGESTIONS.
I am using a domain on namecheap and a digitalocean droplet. I set everything up to he best i can follow docs. When i create a lure and get url I goto the url and it says 'site cant be reached' when running evilginx i get no errors at startup and evilginx is running on 53,443. Aslo the domain is pointing correctly to the vps IP address.
I am using the example phishlet i config domain and ipv4 correctly i enable example and create a lure and get url the url is academy.mydomain.xyz when i follow the lure url i get the site cant be reached error.
here is dig reponse
I thought id add the dig response as it may help diagnose I have also used get-hosts and added the response to my /etc/hosts file
There seems to be nothing wrong such as other issues here.
what might be my problem