Course 37 Lessons
Learn everything about the latest methods of phishing, using reverse proxying to bypass Multi-Factor Authentication. Learn to think like an attacker, during your red team engagements, and become the master of phishing with Evilginx.
Evilginx Mastery
Course37 Lessons
Learn everything about the latest methods of phishing, using reverse proxying to bypass Multi-Factor Authentication. Learn to think like an attacker, during your red team engagements, and become the master of phishing with Evilginx.
Walkthrough
Check out what the course is about, in the following walkthrough video.
What's new?
The course is constantly receiving new updates!
The latest update added the 50-minute video guide on how to create your own phishlet for MS365.
Frequently asked questions
You’ve got questions. We’ve got answers.
Who is this course for?
What are the requirements for undertaking this course?
For how long can I access the course and the labs after purchase?
What will I learn after completing this course?
Is there any support or private community for students?
Contents
Thank You
1 min75 MB
Introduction
A bit of background on phishing, its history and what reversy proxy phishing is about.
Intro
1 min45.5 MB
Evolution of Phishing
3 mins151 MB
MFA & Web Security
3 mins150 MB
Stealing The Token
5 mins261 MB
Setup
Here we will set up our testing environment.
Intro
1 min39.8 MB
Preparing The Environment
14 mins204 MB
Training Lab
5 mins122 MB
Getting Started
Learn how to create your first phishlet and use Evilginx to phish yourself for the first time!
Intro
5 mins86.9 MB
Preview
Creating a Phishlet
22 mins247 MB
Catching Phish
25 mins397 MB
Personalizing Lures
12 mins176 MB
Advanced Phishing
Learn about more advanced features of Evilginx and how to fully customize your phishing campaigns.
Intro
1 min21.1 MB
Replacing Content
11 mins127 MB
Forcing POST Parameters
13 mins168 MB
Handling JSON & LocalStorage
21 mins293 MB
JavaScript Injection
19 mins304 MB
Landing Page Redirectors
12 mins225 MB
Mass Lure Targeting
8 mins148 MB
Proxying The Reverse Proxy
5 mins66.7 MB
Blacklist Management
8 mins111 MB
Security Hardening
Learn about how websites can protect their users from reverse proxy phishing. We will explore ways of bypassing such protections and also learning how to implement our own.
Intro
1 min62.2 MB
Location Validation
17 mins215 MB
Secret Token Validation
21 mins381 MB
Remote Deployment
Learn how to deploy Evilginx to remote server and properly set it up for use in your phishing engagements.
Intro
1 min27.3 MB
Set Up Your Server
15 mins216 MB
Domain Setup
6 mins97.2 MB
Deploy Evilginx
15 mins286 MB
Remote Phishing
7 mins128 MB
Persistence
4 mins45 MB
Deep Sea Phishing
Here I will demonstrate the process of how I approach the creation of phishlets for different websites and how I attempt to circumvent the implemented client-side protections.
Intro
2 mins78.5 MB
Okta: Defeating Protections
30 mins534 MB
Okta: Session Tokens
14 mins312 MB
Okta: Phishlet Templates
10 mins185 MB
Microsoft 365 Personal - Creating a Phishlet
29 mins549 MB
Microsoft 365 Personal - Cleaning Up
14 mins286 MB
Microsoft 365 Enterprise - Adding Compatibility
9 mins189 MB
Download Link - Click Here