# Modlishka **Repository Path**: switchchow/Modlishka ## Basic Information - **Project Name**: Modlishka - **Description**: Modlishka. Reverse Proxy. Phishing NG. - **Primary Language**: Go - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-03-19 - **Last Updated**: 2020-12-19 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # ..Modlishka.. Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level. It was realeased with an aim to: - help penetration testers to carry out an effective phishing campaign and reinforce the fact that **serious** threat can arise from phishing. - higlight current 2FA weaknesses, so adequate security solutions can be created and implemented soon. - raise community awareness about modern phishing techniques and strategies. - support other open source projects that require a universal reverse proxy. Enjoy :-) Features -------- Some of the most important 'Modlishka' features : - Support for majority of 2FA authentication schemes (by design). - No website templates (just point Modlishka to the target domain - in most cases, it will be handled automatically). - Full control of "cross" origin TLS traffic flow from your victims browsers (through custom new techniques). - Flexible and easily configurable phishing scenarios through configuration options. - Pattern based JavaScript payload injection. - Striping website from all encryption and security headers (back to 90's MITM style). - User credential harvesting (with context based on URL parameter passed identifiers). - Can be extended with your ideas through plugins. - Stateless design. Can be scaled up easily for an arbitrary number of users - ex. through a DNS load balancer. - Web panel with a summary of collected credentials and user session impersonation (beta POC). - Backdoor free ;-) ... - Written in Go. Action ------ _"A picture is worth a thousand words":_ Modlishka in action against an example standard 2FA (SMS) enabled authentication scheme: [![Watch the video](https://i.vimeocdn.com/video/749353683.jpg)](https://vimeo.com/308709275) [https://vimeo.com/308709275](https://vimeo.com/308709275) Note: google.com was chosen here just as a proof of concept. Installation ------------ Latest source code version can be fetched from [here](https://github.com/drk1wi/modlishka/zipball/master) (zip) or [here](https://github.com/drk1wi/modlishka/tarball/master) (tar). Fetch the code with _'go get'_ : $ go get -u github.com/drk1wi/Modlishka Compile the binary and you are ready to go: $ cd $GOPATH/src/github.com/drk1wi/Modlishka/ $ make ![alt text](https://raw.githubusercontent.com/drk1wi/assets/master/7d0426a133a85a46a76a424574bf5a2acf99815e.png) # ./dist/proxy -h Usage of ./dist/proxy: -cert string base64 encoded TLS certificate -certKey string base64 encoded TLS certificate key -certPool string base64 encoded Certification Authority certificate -config string JSON configuration file. Convenient instead of using command line switches. -credParams string Credential regexp collector with matching groups. Example: base64(username_regex),base64(password_regex) -debug Print debug information -disableSecurity Disable security features like anti-SSRF. Disable at your own risk. -jsRules string Comma separated list of URL patterns and JS base64 encoded payloads that will be injected. -listeningAddress string Listening address (default "127.0.0.1") -listeningPort string Listening port (default "443") -log string Local file to which fetched requests will be written (appended) -phishing string Phishing domain to create - Ex.: target.co -plugins string Comma seperated list of enabled plugin names (default "all") -postOnly Log only HTTP POST requests -target string Main target to proxy - Ex.: https://target.com -targetRules string Comma separated list of 'string' patterns and their replacements. -targetRes string Comma separated list of target subdomains that need to pass through the proxy -terminateTriggers string Comma separated list of URLs from target's origin which will trigger session termination -terminateUrl string URL to redirect the client after session termination triggers -tls Enable TLS (default false) -trackingCookie string Name of the HTTP cookie used to track the victim (default "id") -trackingParam string Name of the HTTP parameter used to track the victim (default "id") Usage ----- * Check out the [wiki](https://github.com/drk1wi/Modlishka/wiki) page for a more detailed overview of the tool usage. * [FAQ](https://github.com/drk1wi/Modlishka/wiki/FAQ) (Frequently Asked Questions) * [Blog post](https://blog.duszynski.eu/phishing-ng-bypassing-2fa-with-modlishka/) Contact ------- contact@modlishka.io License ------- Modlishka was made by Piotr DuszyƄski ([@drk1wi](https://twitter.com/drk1wi)). You can find the license [here](https://github.com/drk1wi/Modlishka/blob/master/LICENSE). Credits ------- Thanks for helping with the code go to Giuseppe Trotta ([@Giutro](https://twitter.com/giutro)) Disclaimer ---------- This tool is made only for educational purposes and can be only used in legitimate penetration tests. Author does not take any responsibility for any actions taken by its users.