0% found this document useful (0 votes)
52 views2 pages

Evilginx Phishlet Developer Masterclass (2025) - Simpler Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views2 pages

Evilginx Phishlet Developer Masterclass (2025) - Simpler Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

(Transcrito por TurboScribe.ai. Actualizar a Ilimitado para eliminar este mensaje.

When analyzing any target website, the Network tab in Chrome Developer Tools is a
valuable resource. We'll be using this when filtering and parsing the required
data. This specific tab provides detailed information about the requests and
responses exchanged between the browser and the server, which is super crucial for
understanding the website's login process and identifying the data that needs to be
captured.

The Network tab displays key parameters such as name, path, URL, method, status,
domain, type, cookies, set cookies, size, and priority. These elements are all
critical for crafting effective scripts as they help you understand how data is
flowing between the client and server. In the context of this course, these details
enable you to accurately replicate the target website's behavior.

We'll be going into much more detail on each of these parameters in the following
lessons so you can understand what they all mean. When locating for cookie data,
the Cookies tab in Chrome Developer Tools displays detailed information about all
cookies used by the web application. including the name, value, domain, path,
expiration, size, and more.

First navigate to the Network tab, then click Application. When a user logs in,
cookies such as Session ID might be set by the server. When inspecting these
cookies in the Application tab, you can capture the necessary tokens and session
details to replicate the user's session.

This technique is for maintaining access to the victim's account without needing to
re-authenticate. Another common way to find cookie values is to just use the cookie
editor extension and then export the cookies in JSON format. But this is another
way to do it.

When working with Chrome Developer Tools, it's important to configure the interface
in a way that makes it easy to filter information in your workflow. This is how I
like to set mine up for maximum efficiency. First on the left panel, I enable
specific columns that provide the most relevant information for network analysis
and debugging tasks.

These include name, path, URL, method, status, domain, type, cookies, set cookies,
size, and priority. If you aren't using Chrome, make sure your setup looks
something like this. Finding all necessary cookie and token values is critical to
successfully bypassing credential security and multi-factor authentication.

You need to make sure you capture every essential cookie and token without missing
any. Cookies and tokens play a crucial role in maintaining authenticated sessions,
allowing you to bypass security measures like MFA. Missing even one critical cookie
or token can prevent your fishlet from properly authenticating or maintaining the
session, rendering your phishing attempt ineffective.

To ensure nothing is missed, combine live observations in the network tab, use
tools like the storage ACE browser extension to analyze session data, and leverage
the hierarchical view within the application tab. By doing so, you minimize the
risk of overlooking any necessary cookies or tokens and maintain full control of
the authentication process. It's important to mention that not all cookies are
equally important.

As a developer, you need to focus on capturing cookies that manage session states
like a CRSF token or something similar. This ensures that attackers can maintain
the victim session after capturing their credentials. Missing even a single
essential cookie can prevent your fishlet from successfully authenticating and
maintaining the session, rendering the engagement attempt ineffective.

By combining the live observation in the network tab, the analysis of storage, and
the hierarchical view in the application tab, you minimize the chances of
overlooking any necessary cookies or tokens. I find that over time you will learn
automatically what to include or not. It just then becomes about iteration and
practice.

(Transcrito por TurboScribe.ai. Actualizar a Ilimitado para eliminar este mensaje.)

You might also like