[PR #1134] request / response interception with request / response header capture (new direction attribute in intercept and auth_tokens:http) #171

Open
opened 2026-02-26 02:31:29 +03:00 by kerem · 0 comments
Owner

📋 Pull Request Information

Original PR: https://github.com/kgretzky/evilginx2/pull/1134
Author: @callightmn
Created: 10/24/2024
Status: 🔄 Open

Base: masterHead: master


📝 Commits (3)

  • b242e22 fixed: request interception and http token capture
  • 8c5dc25 fixed: capture token in request
  • 82b09ac feature: ability to intercept response and capture response header

📊 Changes

2 files changed (+62 additions, -25 deletions)

View changed files

📝 core/http_proxy.go (+28 -5)
📝 core/phishlet.go (+34 -20)

📄 Description

Update (23/08/25): the PR adds

  • [fix] request interception
  • [fix] request header capture
  • [feature] response interception
  • [feature] response header capture

Hello there,

This PR contains two quick fixes regarding request interception and HTTP token capture.

Request interception:

Likely a regression introduced by github.com/kgretzky/evilginx2@e3bef9433c, as the value of req.Host does not contain the phishing hostname anymore at the new location but holds the legitimate one. As a result, the comparison fails and the request is not intercepted.

HTTP token capture:

The header is indeed captured in the request (e,g,. Authorization header). I just added the check on the domain and path specified in the phishlet (v.domain and v.path).


🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.

## 📋 Pull Request Information **Original PR:** https://github.com/kgretzky/evilginx2/pull/1134 **Author:** [@callightmn](https://github.com/callightmn) **Created:** 10/24/2024 **Status:** 🔄 Open **Base:** `master` ← **Head:** `master` --- ### 📝 Commits (3) - [`b242e22`](https://github.com/kgretzky/evilginx2/commit/b242e22b8b2753d2f56eac63fe0a03f674804f7d) fixed: request interception and http token capture - [`8c5dc25`](https://github.com/kgretzky/evilginx2/commit/8c5dc253b443c9275bf7bc3c25fe6f93d83817be) fixed: capture token in request - [`82b09ac`](https://github.com/kgretzky/evilginx2/commit/82b09ac24abb1d2fbb4e09e2797600e834c12ac1) feature: ability to intercept response and capture response header ### 📊 Changes **2 files changed** (+62 additions, -25 deletions) <details> <summary>View changed files</summary> 📝 `core/http_proxy.go` (+28 -5) 📝 `core/phishlet.go` (+34 -20) </details> ### 📄 Description **Update** (23/08/25): the PR adds - [fix] request interception - [fix] request header capture - [feature] response interception - [feature] response header capture --- Hello there, This PR contains two quick fixes regarding request interception and HTTP token capture. **Request interception:** Likely a regression introduced by https://github.com/kgretzky/evilginx2/commit/e3bef9433c3cc95d3e523533e498c834506739f0, as the value of `req.Host` does not contain the phishing hostname anymore at the new location but holds the legitimate one. As a result, the comparison fails and the request is not intercepted. **HTTP token capture:** The header is indeed captured in the request (e,g,. `Authorization` header). I just added the check on the domain and path specified in the phishlet (`v.domain` and `v.path`). --- <sub>🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.</sub>
Sign in to join this conversation.
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/evilginx2-kgretzky#171
No description provided.