Bypassing two step verification using session tokens via reverse proxy phishing 🌐

2 days ago
48

Reminder Hacking into networks or systems that you don't own without permission is illegal. This was performed on my own equipment

🔒 Evilginx: The Cyber Phantom 👻

Evilginx, a notorious phishing tool, made waves in the cybersecurity world when it first emerged, targeting unsuspecting users through advanced "man-in-the-middle" attacks. Initially developed for Linux, it quickly gained notoriety for its ability to bypass two-factor authentication (2FA), a feature meant to be a safety net against cyberattacks.

By acting as an intermediary between the victim and legitimate websites, Evilginx captures sensitive information like usernames, passwords, and even 2FA tokens, all without triggering suspicion. Cybercriminals use it to impersonate popular platforms like Google, Facebook, and Instagram, making it a nightmare for both users and security experts.

Evilginx shows how sophisticated cyberattacks have become – and why we must always stay vigilant online. 💻🔐

#Cybersecurity #Phishing #Evilginx #Linux #Hackers #StaySafe #2FA #OnlineSecurity

Follow the creator of the tool on Twitter/X
@mrgretzky

EDUCATIONAL PURPOSES ONLY!!!

Loading comments...