How To: Evilginx + BITB | Browser In The Browser without iframes in 2024
Table of Contents
Introduction
This tutorial explores a cutting-edge phishing technique using Evilginx combined with the Browser In The Browser (BITB) method, which does not rely on iframes. As cybersecurity threats evolve, it’s crucial for ethical hackers and cybersecurity enthusiasts to stay informed about new tactics. This guide provides a step-by-step approach to setting up and understanding this technique.
Step 1: Understand the Legacy BITB Limitations
Before diving into the new setup, it’s essential to grasp why traditional BITB methods are no longer effective.
- Traditional BITB uses iframes that many websites, like Microsoft, have protective measures against.
- Frame-busting scripts can prevent iframes from being displayed, rendering this method ineffective.
Step 2: Setting Up Evilginx
Evilginx is a man-in-the-middle tool designed for phishing attacks that can capture login credentials. Here’s how to set it up:
-
Clone the GitHub Repository
- Navigate to the GitHub repository: Evilginx + BITB.
- Use the following command to clone the repo:
git clone https://github.com/waelmas/frameless-bitb.git
-
Install Dependencies
- Ensure you have Go installed on your system.
- Navigate to the cloned directory and run:
go mod tidy
-
Configure Evilginx
- Create a configuration file based on the provided templates in the repo.
- Modify the settings to match your phishing requirements (e.g., the domain and credentials you want to capture).
-
Start Evilginx
- Run Evilginx using the following command:
sudo ./evilginx
- Monitor the console for any messages indicating that Evilginx is running successfully.
- Run Evilginx using the following command:
Step 3: Implement the New BITB Technique
This step involves leveraging the new BITB method that bypasses frame-busting techniques.
-
Develop Your BITB Implementation
- Create a simulated browser environment that mimics a legitimate login page.
- Use JavaScript to enhance the user experience, making it indistinguishable from the original.
-
Test Your Setup
- Open your web browser and navigate to the Evilginx URL you configured.
- Ensure that the BITB is functioning correctly by simulating a login attempt and checking if the credentials are captured.
Step 4: Understand How This Technique Works
It’s crucial to comprehend the mechanics behind this phishing technique:
- The BITB approach creates a browser-like interface that does not use iframes, thus avoiding detection by modern security measures.
- By simulating a legitimate environment, users are more likely to enter their credentials, thinking they are accessing a secure site.
Conclusion
The Evilginx combined with the new BITB method represents a significant evolution in phishing techniques. By understanding the limitations of traditional methods and setting up the new approach, cybersecurity professionals can better prepare against these sophisticated attacks.
Key Takeaways
- Traditional BITB methods are becoming obsolete due to enhanced protective measures.
- Setting up Evilginx requires cloning a GitHub repository and configuring it correctly.
- The new BITB technique effectively simulates a browser environment, making phishing attempts more convincing.
Next Steps
Consider exploring additional resources on phishing techniques and participating in cybersecurity forums to share insights and stay updated on the latest trends. Always remember to use this knowledge ethically and responsibly.