Asi performing-initial-access-with-evilginx3

Perform authorized initial access using EvilGinx3 adversary-in-the-middle phishing framework to capture session tokens and bypass multi-factor authentication during red team engagements.

install
source · Clone the upstream repo
git clone https://github.com/plurigrid/asi
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/plurigrid/asi "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/asi/skills/performing-initial-access-with-evilginx3" ~/.claude/skills/plurigrid-asi-performing-initial-access-with-evilginx3 && rm -rf "$T"
manifest: plugins/asi/skills/performing-initial-access-with-evilginx3/SKILL.md
source content

Performing Initial Access with EvilGinx3

Overview

EvilGinx3 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, enabling bypass of multi-factor authentication (MFA). Unlike traditional credential phishing that only captures usernames and passwords, EvilGinx3 operates as a transparent reverse proxy between the victim and the legitimate authentication service, intercepting the full authentication flow including MFA tokens and session cookies. This makes it the primary tool for red teams demonstrating the risk of adversary-in-the-middle (AiTM) attacks against organizations relying solely on MFA for protection.

When to Use

  • When conducting security assessments that involve performing initial access with evilginx3
  • When following incident response procedures for related security events
  • When performing scheduled security testing or auditing activities
  • When validating security controls through hands-on testing

Prerequisites

  • Familiarity with red teaming concepts and tools
  • Access to a test or lab environment for safe execution
  • Python 3.8+ with required dependencies installed
  • Appropriate authorization for any testing activities

Objectives

  • Deploy EvilGinx3 with custom phishlets targeting authorized scope
  • Configure DNS and SSL certificates for the phishing domain
  • Capture session tokens that bypass MFA protections
  • Import stolen session cookies into a browser to hijack authenticated sessions
  • Integrate with GoPhish or custom delivery mechanisms for phishing email campaigns
  • Document the complete attack chain from phishing email to authenticated access

MITRE ATT&CK Mapping

  • T1566.002 - Phishing: Spearphishing Link
  • T1557 - Adversary-in-the-Middle
  • T1539 - Steal Web Session Cookie
  • T1078 - Valid Accounts
  • T1556 - Modify Authentication Process
  • T1550.004 - Use Alternate Authentication Material: Web Session Cookie

Workflow

Phase 1: Infrastructure Setup

  1. Register a convincing lookalike domain (e.g., using homoglyphs or typosquatting)
  2. Provision a VPS and point the domain's DNS A record to the server IP
  3. Install EvilGinx3:
    git clone https://github.com/kgretzky/evilginx2.git
    cd evilginx2
    make
    sudo ./bin/evilginx -p ./phishlets
    
  4. Configure the domain and IP in EvilGinx3:
    config domain example-phish.com
    config ipv4 <server-ip>
    
  5. EvilGinx3 automatically provisions Let's Encrypt certificates for configured hostnames

Phase 2: Phishlet Configuration

  1. Select or create a phishlet for the target service (e.g., Microsoft 365, Google Workspace):
    phishlets hostname o365 login.example-phish.com
    phishlets enable o365
    
  2. Verify phishlet is active and SSL certificate is issued:
    phishlets
    
  3. Create a lure URL for the phishing campaign:
    lures create o365
    lures get-url 0
    
  4. Optionally configure a redirect URL for post-capture:
    lures edit 0 redirect_url https://legitimate-site.com
    

Phase 3: Phishing Delivery

  1. Craft a pretext email with the lure URL embedded
  2. Use GoPhish or manual SMTP for email delivery:
    # Integration with EvilGoPhish for combined campaigns
    # Provides GoPhish email tracking + EvilGinx3 credential capture
    
  3. Implement URL masking or shortening if needed for link obfuscation
  4. Deploy landing page with appropriate social engineering pretext

Phase 4: Session Hijacking

  1. Monitor EvilGinx3 for captured sessions:
    sessions
    sessions <session-id>
    
  2. Extract captured session cookies from the session:
    # Session output includes:
    # - Username and password
    # - Session cookies (authentication tokens)
    # - Custom captured parameters
    
  3. Import session cookies into a browser using a cookie editor extension:
    • Export cookies in JSON format
    • Use Cookie-Editor or EditThisCookie browser extension
    • Navigate to the target service to validate session hijack
  4. Establish persistent access by creating application passwords or OAuth tokens

Phase 5: Post-Access Activities

  1. Enumerate mailbox contents, contacts, and shared drives
  2. Identify additional targets for lateral phishing
  3. Check for access to connected cloud applications (SharePoint, Teams, OneDrive)
  4. Document all captured credentials and access achieved

Tools and Resources

ToolPurposePlatform
EvilGinx3AiTM phishing frameworkLinux
GoPhishPhishing campaign managementCross-platform
EvilGoPhishCombined EvilGinx3 + GoPhish integrationLinux
Cookie-EditorBrowser cookie import/exportBrowser Extension
ModlishkaAlternative AiTM proxy frameworkLinux
MuraenaAlternative AiTM phishing proxyLinux

Phishlet Targets

Target ServicePhishletCaptured Data
Microsoft 365o365Session cookies, credentials
Google WorkspacegoogleSession cookies, credentials
OktaoktaSession tokens, credentials
GitHubgithubSession cookies, credentials
AWS ConsoleawsSession tokens, credentials

Detection Indicators

IndicatorDetection Method
Newly registered lookalike domainsDomain monitoring and certificate transparency logs
SSL certificates for suspicious domainsCT log monitoring (crt.sh, Censys)
Unusual login locations after phishingSIEM correlation of authentication events
Session cookie replay from different IPConditional access policy alerts
AiTM proxy headers in trafficNetwork inspection for proxy artifacts

Validation Criteria

  • EvilGinx3 deployed with valid SSL certificates
  • Phishlet configured and enabled for target service
  • Lure URL generated and accessible
  • Test credentials captured successfully through phishing flow
  • Session cookies captured and validated for MFA bypass
  • Session hijack demonstrated in browser with stolen cookies
  • Post-authentication access to target service confirmed
  • Evidence documented with screenshots and session logs