π Course Contents Lists :
π Thank You
β³ 1 min | π¦ 75 MB
β³ 1 min | π¦ 75 MB
π Introduction
A bit of background on phishing, its history, and what reverse proxy phishing is all about.
π Intro β³ 1 min | π¦ 45.5 MB
π Evolution of Phishing β³ 3 mins | π¦ 151 MB
π MFA & Web Security β³ 3 mins | π¦ 150 MB
π Stealing The Token β³ 5 mins | π¦ 261 MB
π Setup
Here we will set up our testing environment.
π Intro β³ 1 min | π¦ 39.8 MB
π₯ Preparing The Environment β³ 14 mins | π¦ 204 MB
π§ͺ Training Lab β³ 5 mins | π¦ 122 MB
π£ Getting Started
Learn how to create your first phishlet and use Evilginx to phish yourself for the first time!
π Intro β³ 5 mins | π¦ 86.9 MB
π Preview
βοΈ Creating a Phishlet β³ 22 mins | π¦ 247 MB
π― Catching Phish β³ 25 mins | π¦ 397 MB
π¨ Personalizing Lures β³ 12 mins | π¦ 176 MB
π§ Advanced Phishing
Learn about more advanced features of Evilginx and how to fully customize your phishing campaigns.
π Intro β³ 1 min | π¦ 21.1 MB
π Replacing Content β³ 11 mins | π¦ 127 MB
π Forcing POST Parameters β³ 13 mins | π¦ 168 MB
π Handling JSON & LocalStorage β³ 21 mins | π¦ 293 MB
π₯ JavaScript Injection β³ 19 mins | π¦ 304 MB
π Landing Page Redirectors β³ 12 mins | π¦ 225 MB
π― Mass Lure Targeting β³ 8 mins | π¦ 148 MB
π΅οΈ Proxying The Reverse Proxy β³ 5 mins | π¦ 66.7 MB
π« Blacklist Management β³ 8 mins | π¦ 111 MB
π Security Hardening
Learn how websites can protect their users from reverse proxy phishing. We will explore ways of bypassing such protections and also how to implement our own.
π Intro β³ 1 min | π¦ 62.2 MB
π Location Validation β³ 17 mins | π¦ 215 MB
π Secret Token Validation β³ 21 mins | π¦ 381 MB
π Remote Deployment
Learn how to deploy Evilginx to a remote server and properly set it up for use in your phishing engagements.
π Intro β³ 1 min | π¦ 27.3 MB
π₯ Set Up Your Server β³ 15 mins | π¦ 216 MB
π Domain Setup β³ 6 mins | π¦ 97.2 MB
π Deploy Evilginx β³ 15 mins | π¦ 286 MB
π‘ Remote Phishing β³ 7 mins | π¦ 128 MB
β»οΈ Persistence β³ 4 mins | π¦ 45 MB
π¦ Deep Sea Phishing
Here I will demonstrate the process of how I approach the creation of phishlets for different websites and how I attempt to circumvent the implemented client-side protections.
π Intro β³ 2 mins | π¦ 78.5 MB
π‘ Okta: Defeating Protections β³ 30 mins | π¦ 534 MB
π Okta: Session Tokens β³ 14 mins | π¦ 312 MB
π Okta: Phishlet Templates β³ 10 mins | π¦ 185 MB
π§ Microsoft 365 Personal - Creating a Phishlet β³ 29 mins | π¦ 549 MB
π§Ή Microsoft 365 Personal - Cleaning Up β³ 14 mins | π¦ 286 MB
βοΈ Microsoft 365 Enterprise - Adding Compatibility β³ 9 mins | π¦ 189 MB
drcrypter or drcrypter_ru