Awesome Open Source
Awesome Open Source

MFA Slipstream

Proof of concept used for phishing multi-factor authentication on O365.

This is a proof of concept. It is not a click-and-pwn tool. You will need to read the code

The JavaScript files included are not the entire phishing pages. The phishing page should be a cloned page of your target's login page / Microsoft / whatever MFA service you are targeting. It is up to you to create a good clone (hint: wget), to host them (nginx works great), then to integrate the required JavaScript. The files have notes on where to drop in the code on the clones.


There are 3 components to this PoC:

  • - This tool sits running on the attacker's machine. It handles collecting username and password data, it facilitates the transition from the username and password to the collection of MFA tokens, as well as handles collecting the MFA tokens themselves.
  • collect_userpass.js - This only contains 1 JavaScript function that sends a request back to your attacker box to do the initial login in real-time.
  • collect_mfa.js - This contains 2 pieces of JavaScript. Part 1 handles sending the MFA code back to your attacker machine, part 2 parses information from the url set by collect_userpass.js (part 2 appears in the cloned page second, though it is actually executed first during the attack).

For an overview of how the PoC code is organized see: MFA Slipstream - Phishing MFA PoC Walkthrough

For a demo of the attack please see this blogpost: Phishing Your Way Past Multi-Factor Authentication

Or just the video here:

MFA Slipstream Demo Video

Here is an overview of how these pieces fit together:

attack diagram overview

Attacker Component Setup -

It can be run on Windows or Linux (have successfully used it on both)


git clone
pip install selenium
cd mfa_slipstream_poc
# If on Windows, you'll need to figure out a different way to self-sign a cert. Otherwise
# LetsEncrypt is always your friend. This may need to be a real cert for production
openssl req -new -x509 -keyout mfa_slipstream.pem -out mfa_slipstream.pem -days 365 -nodes

Additional Requirement - Firefox WebDriver

Download and put into your PATH: Why Firefox? I originally started with Chrome, but it was buggy and kept freezing up on me.

Additional Configuration

Again, this is not a proper tool, but a PoC, so setup is a tiny bit messy.

Line 47 of needs to be set to something that will redirect the attacker to the target's login page:


Line 48 of should be set to the target's email domain (e.g. for [email protected]):


Phishing / Victim Components - JavaScript Files

Instances of in both files should be updated with the domain pointing to your attack box

You should review and understand both files, update them to suite your target. Wherever you see '' replace it with your target's domain.

You will see 2 URL patters in these files of things you need to update:

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Python (1,139,776
Security Tools (1,678
Penetration Testing (803
Poc (590
Phishing (364
Mfa (155
Related Projects