kgretzky / evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.62k stars 1.92k forks source link

Domain unauthorized issue #709

Closed SuperbSonik closed 2 years ago

SuperbSonik commented 2 years ago

Dear kgretzky,

I know this might be a little unrelated to evilginx2 but I am posting hoping maybe other users who has overcame this can give me a solution to my problem. *I built the mitm website is for my assignment, not for phishing public purpose.

I have been setting everything correctly according to the tutorial however I am hard stucked at one place which is as shown below.. image

and I checked my webpage it shows this: image and while I inspect the page: image

I am really not sure how to solve this and the root cause of this..

My Freenom DNS A record: image

My Freenom Glue Record: image

I am quite sure it was my problem, I might be setting DNS wrongly..

Sorry for the inconvenience caused, I thank the community in advance for provide any comments on my issues. Have a great day ahead, amazing people.

MelroyB commented 2 years ago

Check #702 , an other webserver is running

SuperbSonik commented 2 years ago

Check #702 , an other webserver is running

Thanks a lot, mate! Will definitely look into this issue!

SuperbSonik commented 2 years ago

Check #702 , an other webserver is running

I have already stop the apache2 service as shown in issue #702 . however, it still same: image

after shutdown apache2 server, i perform nmap scan on local machine: image

as shown, the port is closed. however, if i manually open it via ufw with allow http or 80, it shows the same issue on EvilGinx too . My host file in /etc as shown below:

image

Truly appreciate if any guidance is provided.

WilKGoodangel commented 2 years ago

did you find a solution?

jayhill365 commented 2 years ago

https://1jayhill.medium.com/evilginx2-x-gophish-to-hunt-for-2fa-mfa-passwords-cookies-using-aws-godaddy-f03e9154732b follow my tut it might help

SuperbSonik commented 2 years ago

did you find a solution?

yea, you may just follow jayhill article from the comment below, thanks.

SuperbSonik commented 2 years ago

https://1jayhill.medium.com/evilginx2-x-gophish-to-hunt-for-2fa-mfa-passwords-cookies-using-aws-godaddy-f03e9154732b follow my tut it might help

Thank you buddy for your generosity!