Showing posts with the label sniff https password

Ramayana: Lessons for Network Security

Ramayana an epic battle between good and evil teaches us various lessons about life, but does Ramayana have any lessons for network security.   I have made a small attempt at emulating Ramayana to the cyber scenario to find out.          Our story begins from the eve of the day Ram was to be made proprietor of company Ayodhya. On that eve, Manthara an internal employee of the company Ayodhya,social engineersthe mind of  Kaikeyi the wife of  Dasaratha into jealousy which makes her to invoke theambigious agreementDasaratha  made with her a long time ago. According to the agreement, Rama should be exiled from the company of Ayodhya for fourteen years and her son Bharata should be made the proprietor of the company. Dasaratha accedes to the demands of Kaikeyi and Rama agrees to his father’s decrees and leaves the company. Lakshmana and Sita follow him.  Meanwhile Bharata who is on a visit to his relative knows about the events in the company, returns and performsforensics and finds about …

evilginx2 v2.2 releases: MITM attack framework that allow to bypass 2-factor authentication

evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection.
This tool is a successor to Evilginx, released in 2017, which used a custom version of nginx HTTP server to provide man-in-the-middle functionality to act as a proxy between a browser and phished website. The present version is fully written in GO as a standalone application, which implements its own HTTP and DNS server, making it extremely easy to set up and use.

I am very much aware that Evilginx can be used for nefarious purposes. This work is merely a demonstration of what adept attackers can do. It is the defender’s responsibility to take such attacks into consideration and find ways to protect their users against this type of phishing attacks. Evilginx should be used only in legitimate penetration testing assignments with written permission from to-be-phished parties.

Changelog v2.2
Added opti…