Phishing is yet the most used and popular technique day-to-day which has brought compromises from single user accounts to large companies.

While looking for suggestions , the most common recommendation given nowadays is to use the two-factor-authentication layer to defend from various phishing methods.

But how secure is 2FA itself?

In this blog post we’ll look on how 2FA can be bypassed in an usual phishing situation and how to set-up Evilginx2

Required Stuff

  • a custom domain that you control
  • a VPS (Virtual Private Server)
  • Evilginx2

What is 2FA?

Two-factor authentication or 2FA, is an electronic authentication method in which a computer user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something only the user knows), possession (something only the user has), and inherence (something only the user is).

Evilginx (Man in the middle attacking framework)

By reading the short explaination about two-factor-authentication above, you would assume that the mechanisms used look secure and would make it almost impossible for a hacker to break through.

However, bypassing this layer is possible by using Evilginx2, a Man in the Middle attack framework which is able to act as a reverse proxy and help the attacker get through verification steps.



Note : in this part I am not going to cover setting up the VPS and domain but simply setting up the tool in a linux environiment and using it over a quick and short demo.

Firstly we would want to grab a pre-compiled binary from the official repo :

pi0x73@evilginx2:~$ wget
--2021-01-28 18:58:03--
Resolving (
Connecting to (||:443... connected.
HTTP request sent, awaiting response... 302 Found
evilginx-linux-amd64.tar.gz               100%[====================================================================================>]   8.24M  3.24MB/s    in 2.5s    

2021-01-28 18:58:06 (3.24 MB/s) - ‘evilginx-linux-amd64.tar.gz’ saved [8636795/8636795]


Once the package has been downloaded we can proceed by unpacking and running the installation script.

golang is a required package as well so I’m going to install that too :

pi0x73@evilginx2:~$ sudo apt install golang
Reading package lists... Done
Building dependency tree       
Reading state information... Done
golang is already the newest version (2:1.10~4ubuntu1).
0 upgraded, 0 newly installed, 0 to remove and 9 not upgraded.
pi0x73@evilginx2:~$ tar -xf evilginx-linux-amd64.tar.gz
pi0x73@evilginx2:~$ cd evilginx/
pi0x73@evilginx2:~/evilginx$ ls
evilginx  phishlets  templates
pi0x73@evilginx2:~/evilginx$ sudo bash

After that we can simply fire it up by running sudo evilginx2 anywhere on the terminal :



Before firing up a phishing page Evilginx requires some additional setup such as setting our custom domain , our public ip etc…


These 3 entries appearing in the screen have to be added in the DNS config for our domain as shown in the following screenshot :


The configuration should take somewhere to 15 minutes to apply in the domain. You can confirm the changes by running nslookup yourdomain in another terminal :

└─$ nslookup

Non-authoritative answer:


When it’s all set-up and looking good , you can fire a phishing page to be generated in your domain. (I used twitter)


This URL is supposed to be sent to the target which in this case is myself.


The phishing page looks just like the real one so I am going to treat it as an user who is right about to get compromised. I entered my credentials on it and clicked Login


Right as we notice here, I am still in the fake domain and asked for a 2 Factor Verification to login which is where the 2FA Bypassing comes in play.

What Evilginx does here is acting like a middle-man between the user target and twitter. This means that the user first enters the credentials on the fake page, then Evilginx shows up and grabs the information to validate it on twitter login. Right after that twitter accepts the credentials and asks for a 2FA code. The tool once again sends these instructions to the target and does the same.


We can see the grabbed information above and you’d be thinking that there is no 2FA code in there.

2FA codes are usually one-time usage and it would still be useless to grab and try to reuse it if the target user has already used it to authenticate.

Instead of grabbing the pin code, Evilginx grabs an authenticated session cookie after the user has completed the login process and this way all of the security checks are already completed.


I can import the above cookie in any browser using any simple cookie editor :


After reloading , the browser automatically makes use of the cookie and logs the attacker in with no more security checks to pass.


And thats it. I have just pwned myself while bypassing 2FA.


Two factor authentication is still a very good protection layer for usual accounts. The conclusions we can take out of this can be that no matter if you have added 2 or 3 more security checks to your accounts, if you are careless on where you click or where you put information then you’ll still get hacked.

DISCLAIMER : This blog is just an educative walkthrough to show what an attacker can do and how red-teamers can use Evilginx to get through secured accounts on authorised environiments. Attacking someone else with no mutual consent is illegal and may put you in risk.

Leave a comment