Пікірлер
@hehefer
@hehefer Ай бұрын
Salam nice video, what u think about biitbiting BITB with drainer
@gammerboy9122
@gammerboy9122 Ай бұрын
Fantastic sir but wanna know more about seg bypass in office with evilginx can u make a video please
@cowbe0x004
@cowbe0x004 2 ай бұрын
So if you have custom company branding set up, it doesn't show up in the popup, but I notice the branding background does get requested. Do you happen to know why?
@NumbersStain
@NumbersStain 3 ай бұрын
am not able to setup. it keeps getting ssl error
@Winter-vn3xf
@Winter-vn3xf 3 ай бұрын
bro thanks for this tuts, appreciate, please can you add phishlets that also work with office godaddy
@WilliamHunt-is7pj
@WilliamHunt-is7pj 3 ай бұрын
hey have you gotten the office godaddy phishlets, i was able to code it but it wont login in when it redirected to office godaddy login page
@AnonymousSky-kg5hv
@AnonymousSky-kg5hv 3 ай бұрын
How can i apply another background other than ETech IT? I must commend this is a good educational video. I will like to get some explanation how to implement a new background and how to detect browser/os, user agent of client in real time.
@streamkeeper4462
@streamkeeper4462 3 ай бұрын
Wael Quick question. there is a new updated evilgophish course , have you seen it?
@6ix9yn
@6ix9yn 3 ай бұрын
I'm a very big fan.. You really make everything look simple with the way you break down..
@nicholasanderson4788
@nicholasanderson4788 3 ай бұрын
Apache is a reverse proxy, can you use nginx for the same purpose
@waelmas
@waelmas 3 ай бұрын
Yes it is. In fact the advanced version I am working on is a from-scratch implementation of a reverse proxy written in Go. For nginx you just have to use the equivalent of search and replace (aka substitutions in apache) and follow the same concept.
@SeanWitterman
@SeanWitterman 4 ай бұрын
I am interested, how do I get more details
@waelmas
@waelmas 3 ай бұрын
I'll be publishing some initial posts/demos/descriptions very soon! In the meantime feel free to reach out on LinkedIn or Twitter.
@cruzalex9662
@cruzalex9662 4 ай бұрын
please i want to know if it also evades secret token security
@waelmas
@waelmas 3 ай бұрын
That is a very tough topic on its own and mainly related to Evilginx and reverse proxy phishing itself rather than Frameless-BITB. As far as I know Evilginx Pro will solve this by capturing the shadow token from a browser that runs behind the scenes then use it in the proxied page.
@cruzalex9662
@cruzalex9662 3 ай бұрын
@@waelmas it's alright but atleast is there a way we can work on it to use all office accounts rather than just enterprise accounts...please let me know if its available else i'll be glad to join work on it
@user-hq3zk2jo8r
@user-hq3zk2jo8r 4 ай бұрын
What if the user uses a mac?
@waelmas
@waelmas 4 ай бұрын
In the repo I have config files for Chrome on both Windows and Mac. Based on the POC code provided you can also customize it further for any other browser/OS you would like. In an ideal scenario you would want to detect the User Agent and load the proper config file that matches the browser/OS combo used by the client in real time.
@AnonymousSky-kg5hv
@AnonymousSky-kg5hv 3 ай бұрын
@@waelmas How can i detect browser/OS, user agent and load a proper config to match browser/OS used by client in real time?
@user-km7lg1ny3x
@user-km7lg1ny3x 4 ай бұрын
Hello. There’s a new security update by google chrome
@waelmas
@waelmas 4 ай бұрын
Hey, are you referring to a feature that is still experimental in regards to device-bound tokens? If so that is something that might or might not affect reverse-proxy phishing in general, but we are yet to see how strong it is and if it has any pitfalls that allows to bypass it. Or are you referring to something else?
@ywueeee
@ywueeee 4 ай бұрын
does this work with google? have you checked Evilginx 3.3? any new videos planned?
@waelmas
@waelmas 4 ай бұрын
Hey, the concepts of Frameless-BITB works with any site. With Google tho the challenge is to get reverse proxy phishing working regardless of the use of Frameless-BITB. Google is known to have the lead for now in terms of protecting against reverse-proxy phishing, but I know there are still ways to bypass those security measures (Evilginx Pro announced and seems to be one solution). As for Evilginx 3.3, I have seen it but did not get a chance to try it out. In theory Frameless-BITB should work with that version too as it mainly differs in terms of integrations with GoPhish which should not directly affect what happens once the user has already reached the lure URL. Regarding next videos, I have a few ideas but will need to find some time to prepare something of good quality!
@Computersecurityobserver
@Computersecurityobserver 5 ай бұрын
anytime i set my url lure and test it out in a browser. the next page it goes to says this"Microsoft accountAccount We're unable to complete your request invalid_request: The provided value for the input parameter 'redirect_uri' is not valid. The expected value is a URI which matches a redirect URI registered for this client application." so what exactly is going on??
@waelmas
@waelmas 4 ай бұрын
It sounds like an issue with your Evilginx/phishlet setup instead of BITB. Make sure everything works without Frameless-BITB first to see if Evilginx is working as expected.
@lool7922
@lool7922 5 ай бұрын
Love it, but when I sign in, it won't take me to the next step to enter the password? any idea ?
@waelmas
@waelmas 4 ай бұрын
It sounds like an issue with your Evilginx/phishlet setup instead of BITB. Try setting it up with without Frameless-BITB to see if everything works before you add this concept to the mix.
@seanshirley9582
@seanshirley9582 Ай бұрын
i ran into this same exact issue. any updates?
@greyhat1173
@greyhat1173 5 ай бұрын
comand nano ~/.evilginx/config.json , send file in blank
@waelmas
@waelmas 5 ай бұрын
You need to have started Evilginx at least once before you try changing the config. Also try running this step with sudo.
@greyhat1173
@greyhat1173 5 ай бұрын
@@waelmas u have google yaml config for test this POC ?
@granvillaustine8327
@granvillaustine8327 5 ай бұрын
Hell yeah, bring that tool on steroids
@HAMETE
@HAMETE 6 ай бұрын
Love it. Just great. I will prove it to show to my colleagues to be aware of this kind of phishing. Thanks!
@user-km7lg1ny3x
@user-km7lg1ny3x 6 ай бұрын
Hello. Thanks so so much for this beautiful tutorials. I got everything working but I am unable to use js inject for the email parameters. When I configure the js inject in my phishlet, it keeps using the same email for all generated lures with email attached. Help
@waelmas
@waelmas 5 ай бұрын
Are you talking about Evilginx behaving like this only when Frameless-BITB is added? Please try to get it working without Frameless-BITB first.
@user-of2bl1gg2e
@user-of2bl1gg2e 6 ай бұрын
if u were running this live would you still change domain nameservers to point to vps or would you manage it on the registrar panel
@waelmas
@waelmas 5 ай бұрын
I usually keep the nameservers at the domain registrar and simply add DNS records for all subdomains that my phishlet will use. All such subdomains plus the root domain should point to the IP of the instance running the setup. (Also SSL certs should be generated for the naked domain as well as a wildcard subdomain). There are many ways to approach this, but I found this approach to be the path of least resistance, and less chances of scanners fingerprinting my servers during the generation of SSL certs.
@TonyAsh-rp6fp
@TonyAsh-rp6fp 6 ай бұрын
all good bro . the reminal font and color are horrible. cannt see clearly. white on black or green on black should do .
@waelmas
@waelmas 6 ай бұрын
Thanks for the feedback! Will keep it in mind next time!
@greyhat1173
@greyhat1173 6 ай бұрын
This found for Google ?
@glitchdigger
@glitchdigger 6 ай бұрын
@Wael Masri, hey man could I message you online? I'd like to contribute / collaborate with some expansions to this methodology and pick your brain! I got you some coffees too! -- glitchdigger
@waelmas
@waelmas 6 ай бұрын
Of course! DM me on LinkedIn or Twitter!
@user-is4sl1oc5m
@user-is4sl1oc5m 6 ай бұрын
Nice tutorial, I have just subscribed to your channel 😊. Can you explain how we can change the background incase we want to pentest with a different background template.
@waelmas
@waelmas 6 ай бұрын
Thank you! You will need to replace the content under pages/primary/ (which you eventually copy to /var/www/primary/ during the setup). There you can fully replace the HTML/CSS but you will need to have somewhere in your HTML the login button, and you need to have the relevant JS code tied to it in script.js The only catch is that if your page has a lot of extra JS logic you will need to replace anything that listens to DOM events to listen to the custom event you see in the script.js file. Might make another video on that topic in the future but hope this puts you in the right direction.
@user-is4sl1oc5m
@user-is4sl1oc5m 6 ай бұрын
@@waelmasthanks
@khalilhamdi8463
@khalilhamdi8463 6 ай бұрын
Nice explanation ...
@streamkeeper4462
@streamkeeper4462 7 ай бұрын
If anyone is thinking of buying new courses: for Learning phishlet coding Buy K Gretzky's advanced mastery course. And learning how to do large scale attacks with evilginx3.2 Buy SimplerHacking's Evilginx3 Pro Masterclass. both are goldddd for the $
@streamkeeper4462
@streamkeeper4462 7 ай бұрын
Dang man this is crazyy good!! Wael you are the GOAT for teaching us this
@waelmas
@waelmas 6 ай бұрын
🙏
@kingsleyokon4844
@kingsleyokon4844 7 ай бұрын
Thanks for the tutorial. Can you please make a video of how you deploy it on a life server and how you modify and instruct evilginx2 to fetch and use wildcard SSL.
@waelmas
@waelmas 6 ай бұрын
Hey, I plan to make some automation and maybe a tutorial on that in the near future. For the time being you might wanna take a look at the details I shared here where I explain how I currently handle certs: github.com/waelmas/frameless-bitb/issues/6
@KistrinRobert
@KistrinRobert 7 ай бұрын
Very very very nice bro! Thanks!
@nddcs
@nddcs 7 ай бұрын
Awesome.keep it up. Can u give more techniques on how to bypass browser anti phishing filters like chrome safe browsing.
@waelmas
@waelmas 7 ай бұрын
Thank you! Will be working on some more code and tutorials over the coming months, but for now you might wanna take a look at this: www.jackphilipbutton.com/post/how-to-protect-evilginx-using-cloudflare-and-html-obfuscation
@girl4632
@girl4632 7 ай бұрын
Wht you use for sending email? Is simple python script with self hosted postfix enough? Or one needs gophish to send secure email,here I am not talking gophish for its managing interface but for mail delivery and if any leaks in header. So for email which is better custom python script vs gophish.
@girl4632
@girl4632 7 ай бұрын
But still not got how without it was made possible, trying to understand.
@waelmas
@waelmas 7 ай бұрын
The core approach that makes it work is that I "push" the HTML body and inject my own HTML elements that are responsible for the BITB components and the landing page behind it along with the CSS tricks for positioning. Typically, you would place an HTML element inside another to create the effect of something living inside something else. But this will not work as pages like Microsoft intentionally rely on attributes attached to their elements that would "break" if you manipulate them. So the whole trick is to place our HTML elements right next to the original HTML, then rely only on CSS tricks to "fake" the effect of one being inside the other. The core CSS attributes that do the trick are: width height top left transform z-index
@girl4632
@girl4632 7 ай бұрын
@@waelmas could you please explain both approach of the html. And how the above one will break and another one won't. I read the source code,and understood that a html code that was in Apache config file was fed along with Microsoft html. And that was placed just at start of body. I have two doubt,hope you will solve and reply. 1)I found only injected div and win-scroll div present when document reached to browser where were other <div> other than .win-scroll that were present in actual Microsoft html document. 2) First you said injecting html will break the code, but isn't what you doing too is injecting the html,you too are injecting 3 <div> tags before Microsoft actual content. a)Won't this break b) Haven't Microsoft already have any security measure to detect this change using javascript.
@girl4632
@girl4632 7 ай бұрын
@@waelmas Thanks a lot for reply. Your channel is so underrated inspite of having pure gem mine, recent three videos must have potential to gain too much views.
@waelmas
@waelmas 7 ай бұрын
The legacy BITB can be simply tested using an (with Evilginx you'd have to put it in a redirector). What happens for example with Microsoft is that you will get a redirect and that will end up on the original Micorosft login page, basically breaking the whole thing. (Search "framebusters" for more details on that). Injecting HTML inside the divs used by microsoft, or moving those inside our own div breaks the flow in most cases. Injecting HTML in the body while keeping all attributes the same does not affect anything as it's simply sitting on the side. I don't think it's that easy for Microsoft to check such changes as even simple browser extensions actually inject their HTML inside the page body in a similar manner, and they use ShadowDOM. So this approach could be "seen" the same as most legit browser extensions.
@girl4632
@girl4632 7 ай бұрын
@@waelmas Thanks a lot. You are genius and creative I want to use my own theory too but I can't. Could I get the references so that instead of being depended on someone else creativity I could have my own.
@girl4632
@girl4632 7 ай бұрын
If you are the first one with bringing all these tricks and using the curious brain. Than bro you are seriously awesome. By the way thanks for the info.
@waelmas
@waelmas 7 ай бұрын
As far as I know, this is the first BITB without the usage of s, which allows us to bypass framebusters. But the original concept of the BITB was introduced by mrd0x a few years ago: mrd0x.com/browser-in-the-browser-phishing-attack/
@girl4632
@girl4632 7 ай бұрын
@@waelmas Not in this way. I already know about mrdox. At last I want to say how you got so much creativity. Thanks a lot for sharing.
@r12w4n7
@r12w4n7 7 ай бұрын
Thanks Bro You're Awesome :)
@KistrinRobert
@KistrinRobert 9 ай бұрын
Very nice!!! Evilginx3.0 + BITB details?
@Richard_Wallace
@Richard_Wallace 9 ай бұрын
Good things are worth waiting for ;)
@waelmas
@waelmas 9 ай бұрын
I’m preparing something huge. It’ll take some time but will be worth it! Stay tuned 🤞
@waelmas
@waelmas 7 ай бұрын
Just published a full tutorial and source code: kzbin.info/www/bejne/oqatm6umetyJfqs
@girl4632
@girl4632 7 ай бұрын
​@@waelmasCould I get your guidance,is there any telegram I'd of yours.
@ywueeee
@ywueeee 4 ай бұрын
@@waelmas author of evilginx forked gophish and made something that's compatible with it, have you tried it, what do you use to send the emails?
@Richard_Wallace
@Richard_Wallace 9 ай бұрын
Great Presentation!! Can you please provide more details on how to combine evilginx3 phishlets with a Browser In The Browser (BITB) Attack?
@waelmas
@waelmas 9 ай бұрын
Thank you! Will share more details soon!
@waelmas
@waelmas 7 ай бұрын
Just published a video and source code on how to set it up: kzbin.info/www/bejne/oqatm6umetyJfqs
@user-rf2sb2mv6p
@user-rf2sb2mv6p Жыл бұрын
How do the get ssl certificate
@karkantas
@karkantas Жыл бұрын
I think it would be nice if you make a video about evilginx phishlets and how to create them. I can only find a few and phishlets are dynamic and in need of constant updates.
@waelmas
@waelmas Жыл бұрын
I'm not an expert with phishlets (at least didn't dive too deep yet), but the legacy ones seemed to work just fine even without modifications (the O3652 if I recall correctly). Will try to take a deeper dive and try a few ideas I have in mind once I get a chance and hopefully create a video regarding my findings.
@karkantas
@karkantas Жыл бұрын
Can you share the phishlet or are you using any of the legacy ones?