kgretzky / evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.26k stars 1.87k forks source link

js_inject will not trigger #904

Open lhost25 opened 1 year ago

lhost25 commented 1 year ago

With version 3.0, JS Injection will not trigger in o365. anyone know a new settings for this? I am having difficulty with this or maybe i am doing something wrong. @kgretzky

js_inject:

DO NOT ASK FOR PHISHLETS.

DO NOT ASK FOR HELP CREATING PHISHLETS.

DO NOT ASK TO FIX PHISHLETS.

DO NOT ADVERTISE OR TRY TO SELL PHISHLETS.

EXPECT A BAN OTHERWISE. THANK YOU!

REPORT ONLY BUGS OR FEATURE SUGGESTIONS.

lhost25 commented 1 year ago

Its working, your the one making a mistake

thanks for your response bro. I am talking about version 3.0. i build and i tried it with o365 but it wont work after opening in browser. it will only show office page and not fill the email.

do you know what i am doing wrong? kindly please share bro.

Thanks.

shareblux commented 1 year ago

Hi, did you find a solution to this yet? im having same issue

lhost25 commented 1 year ago

I said you guys should find me on telegram. I have the fix, i would show you'll samples

bro whatever its should be sharing in public here because of different people that might be encountering same problem. i speak for all people that might be facing the same issues.

Thanks.

shareblux commented 1 year ago

@maxibrainz10

yes please help if you can

An0nUD4Y commented 1 year ago

Checkout the changelog

Fixed: trigger_paths regexp will now match a full string instead of triggering true when just part of it is detected in URL path.

Also if you wanna revert it. Modify line 909 in core/phishlet.go file https://github.com/kgretzky/evilginx2/blob/1ac3d1027106fb49a416c85756f205567d541824/core/phishlet.go#L909

This line : re, err := regexp.Compile("^" + d + "$") with : re, err := regexp.Compile(d)

Working for me.

lhost25 commented 1 year ago

Checkout the changelog

Fixed: trigger_paths regexp will now match a full string instead of triggering true when just part of it is detected in URL path.

Also if you wanna revert it. Modify line 909 in core/phishlet.go file

https://github.com/kgretzky/evilginx2/blob/1ac3d1027106fb49a416c85756f205567d541824/core/phishlet.go#L909

This line : re, err := regexp.Compile("^" + d + "$") with : re, err := regexp.Compile(d)

Working for me.

It work bro and thanks for this.

lastly do you have any idea how i can make this adfs? I tried the settings and it's not working.

lhost25 commented 11 months ago

I would not be sharing the inject script. But this should solve it

js_inject:

  • trigger_domains: ["login.microsoftonline.com"] trigger_paths: ["/common/oauth2/v2.0/authorize*"] script: your script here.

and what is script for?