Skip to content

isanval/evilginx-aio

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

Evilginx3 All-In-One script

This script is intended to use in Kali Linux (rolling version), it will install Evilginx3 with these public phishlets repositories automatically:

The script will set up two phishing sites:

  • MS365
  • Github

Quick run

Install Kali Linux and make it available with some public IP

Create 2 DNS entries pointing the public IP address from the server:

ns-<mysubdomain>.myown.tools.   A     <PUBLIC_IP_ADDRESS>
<mysubdomain>.myown.tools.      NS    ns-<mysubdomain>.myown.tools.

Be sure that ports UDP/53 and TCP/443 are accessible through the <PUBLIC_IP_ADDRESS> in Kali Linux and run:

domain="mysubdomain.myown.tools" bash <(wget -q -O- "https://raw.githubusercontent.com/isanval/evilginx-aio/main/evilginx-aio.sh")

BE PATIENT DURING THE FIRST RUN AS IT WILL NEED TO UPGRADE THE FULL OS

This is a sample output for the first run until Evilginx3 starts:

First Evilginx3 run

Once Evilginx3 is started and ready, you can check the phishing URLs with these commands:

lures
lures get-url <id>

Get phishing URLs

After that, you can access the two phishing URLs you got from lures get-url <id> commands.

In case you need your own sauce, you can check the Evilginx3 official documentation.

Requirements

There are really few requirements to have the phishing sites up and running:

  • Kali Linux OS up and running
  • Standard user with SUDO/root privileges
  • Public IP address (or NAT configured)
  • Public accessible TCP/UDP
  • DNS domain or subdomain available
  • evilginx-aio.sh script

Kali Linux

https://www.kali.org/get-kali/#kali-platforms

No needed description here, just install in your preferred lab/cloud a fresh Kali Linux :-)

Standard user with SUDO/root privileges

In case you don't know what I'm talking about, here you can check the details.

Public IP

Evilginx3 will run its own DNS/HTTPS servers and it will request valid SSL/TLS certificates through Let's Encrypt service so the Kali Linux server will need Internet access and also a public IP address (or a NATed one).

Public accessible TCP/UDP ports

Evilginx3 will run its own DNS and HTTPS servers so at least we need these ports publicly accessible from Internet:

  • Port 53 UDP
  • Port 443 TCP

You can rename the current file by clicking the file name in the navigation bar or by clicking the Rename button in the file explorer.

DNS domain/subdomain

Evilginx will use its own subdomain for all phishing simulation attacks. So you will need your own domain and set up a subdomain with its own NS entry pointing to public IP from Kali Linux.

For example, in BIND9 you can create this two entries in your domain zone configuration:

ns-<mysubdomain>.myown.tools.   A     <PUBLIC_IP_ADDRESS>
<mysubdomain>.myown.tools.      NS    ns-<mysubdomain>.myown.tools.

About

Evilginx3 All-In-One script

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages