Proof of concept used for phishing multi-factor authentication on O365.
This is a proof of concept. It is not a click-and-pwn tool. You will need to read the code
There are 3 components to this PoC:
For an overview of how the PoC code is organized see: MFA Slipstream - Phishing MFA PoC Walkthrough
For a demo of the attack please see this blogpost: Phishing Your Way Past Multi-Factor Authentication
Or just the video here:
Here is an overview of how these pieces fit together:
It can be run on Windows or Linux (have successfully used it on both)
git clone https://github.com/decidedlygray/mfa_slipstream_poc.git pip install selenium cd mfa_slipstream_poc # If on Windows, you'll need to figure out a different way to self-sign a cert. Otherwise # LetsEncrypt is always your friend. This may need to be a real cert for production openssl req -new -x509 -keyout mfa_slipstream.pem -out mfa_slipstream.pem -days 365 -nodes
Download and put into your PATH: https://github.com/mozilla/geckodriver/releases Why Firefox? I originally started with Chrome, but it was buggy and kept freezing up on me.
Again, this is not a proper tool, but a PoC, so setup is a tiny bit messy.
Line 47 of mfa_slipstream.py needs to be set to something that will redirect the attacker to the target's login page:
Line 48 of mfa_slipstream.py should be set to the target's email domain (e.g. for [email protected]):
portal.widgetscorp.co in both files should be updated with the domain pointing to your attack box
You should review and understand both files, update them to suite your target. Wherever you see 'widgetscorp.co' replace it with your target's domain.
You will see 2 URL patters in these files of things you need to update: