Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
i am trying to work on paypal phishlet using evilginx, everything has been confiured and my domain are well pointed.
but each time lures generates a new link for my paypal phishlets and i try to visit the link, the paypal phishlet page comes up for about 3 seconds and then proceeds to a blank page "about:blank"
[imp] [0] [paypal] new visitor has arrived: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36
[inf] [0] [paypal] landing URL: https://www.authpaypalonline-team.com/awZfprRJ
[imp] [1] [paypal] new visitor has arrived: Mozilla/5.0 (iPhone; CPU iPhone OS 16_1_2 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.1 Mobile/15E148 Safari/604.1
[inf] [1] [paypal] landing URL: https://www../awZfprRJ
[imp] [2] [paypal] new visitor has arrived: Mozilla/5.0 (iPhone; CPU iPhone OS 16_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/101.0.4951.58 Mobile/15E148 Safari/604.1
[inf] [2] [paypal] landing URL: https://www./awZfprRJ
:
WARN: Cannot handshake client www.paypal.com EOF
[064] WARN: Cannot handshake client www.paypal.com EOF
[086] WARN: Cannot handshake client www.paypal.com EOF
i am trying to work on paypal phishlet using evilginx, everything has been confiured and my domain are well pointed. but each time lures generates a new link for my paypal phishlets and i try to visit the link, the paypal phishlet page comes up for about 3 seconds and then proceeds to a blank page "about:blank"
any help pls:
lures get-url 4
https://www./awZfprRJ
[imp] [0] [paypal] new visitor has arrived: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 [inf] [0] [paypal] landing URL: https://www.authpaypalonline-team.com/awZfprRJ [imp] [1] [paypal] new visitor has arrived: Mozilla/5.0 (iPhone; CPU iPhone OS 16_1_2 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.1 Mobile/15E148 Safari/604.1 [inf] [1] [paypal] landing URL: https://www../awZfprRJ
[imp] [2] [paypal] new visitor has arrived: Mozilla/5.0 (iPhone; CPU iPhone OS 16_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/101.0.4951.58 Mobile/15E148 Safari/604.1
[inf] [2] [paypal] landing URL: https://www./awZfprRJ
:
WARN: Cannot handshake client www.paypal.com EOF
[064] WARN: Cannot handshake client www.paypal.com EOF
[086] WARN: Cannot handshake client www.paypal.com EOF
: sessions
+-----+-----------+---------------+-----------+---------+----------------+-------------------+ | id | phishlet | username | password | tokens | remote ip | time | +-----+-----------+---------------+-----------+---------+----------------+-------------------+ | 1 | paypal | | | none | 85.255.237.88 | 2023-08-14 17:30 | | 2 | paypal | | | none | 85.255.237.88 | 2023-08-14 18:20 | | 3 | paypal | | | none | 85.255.237.88 | 2023-08-14 18:33 | | 4 | paypal | alagbaka.com | | none | 85.255.237.88 | 2023-08-14 19:18 | | 5 | paypal | | | none | 85.255.234.89 | 2023-08-15 08:43 | | 6 | paypal | | | none | 85.255.234.89 | 2023-08-15 09:09 | | 7 | paypal | | | none | 85.255.234.89 | 2023-08-15 09:40 | | 8 | paypal | | | none | 3.73.116.169 | 2023-08-15 09:42 | | 9 | paypal | | | none | 96.30.193.24 | 2023-08-15 09:43 | +-----+-----------+---------------+-----------+---------+----------------+-------------------+
[war] [paypal] unauthorized request: https://authpaypalonline-team.com/ (Mozilla/5.0 (iPhone; CPU iPhone OS 13_2_3 like Mac OS
any help pls