Kubagki, an offensive security tools developer and creator of Evil Jinx, presented on the topic of bypassing modern anti-phishing (anti-‘ishing’) protections, focusing on reverse proxy phishing.
The session covered technical methods for evading phishing detection tools, updates in Evil Jinx Pro, and recent advances in phishing tactics.
Key discussion points included three layers of evasion (stealth, deception, obfuscation), countermeasures by security tools, and specific bypass techniques for Google Chrome Safe Browsing and Canary tokens.
The talk concluded with a summary of best practices for phishing campaign operators and a brief mention of the evolving phishing landscape.
Action Items
(No explicit action items or due dates were specified in the transcript.)
Introduction & Background
Kubagki introduced himself as an ex-game hacker, now an offensive security tools developer focused on phishing tools, notably Evil Jinx and its Pro version.
Evil Jinx Pro has now been officially released after previous delays.
He manages the Break The Threat Discord community and developed a custom shop engine to handle Evil Jinx Pro licensing, verifying each community member manually (1,700 verified to date).
Reverse Proxy Phishing Detection: Overview & Layers of Evasion
The focus was on reverse proxy phishing detection, not email phishing detection.
Outlined three evasion layers ("Three Layers of Deception"):
Stealth: Prevent public exposure of phishing hostnames, mainly through wildcard TLS certificates to obfuscate subdomain usage.
Deception: Prevent automated scanners from analyzing phishing page content; often addressed with bot protection tools.
Obfuscation: As a last resort, disguise phishing pages so that they look legitimate and evade detection if exposed.
Stealth: Hiding Phishing Hostnames
TLS certificates for phishing sites are publicly logged (e.g., crt.sh), exposing subdomains.
Wildcard TLS certificates help obscure specific phishing hostnames, requiring attackers to brute force subdomains to discover them.
Once a phishing URL is sent to a target, secrecy is lost.
Deception: Preventing Automated Analysis
Automated scanners and bots analyze phishing URLs and page content.
Tools like Cloudflare Turnstile and Evil Jinx Pro's 'Bodgard' script block bots by analyzing browser telemetry and only serving phishing content to humans.
Most bots do not execute JavaScript, so content appears benign to them.
Bodgard, as implemented in Evil Jinx Pro, outperformed Cloudflare Turnstile in some bypass scenarios (e.g., Microsoft Defender for Endpoint).
Obfuscation: Disguising Phishing Content
Detection tools (e.g., Google Chrome Safe Browsing, browser extensions like Push Security) scan HTML, JavaScript, URLs, and cookie names.
Chrome Safe Browsing matches phishing pages by comparing domains, URL paths, and query parameters.
Evil Jinx Pro now supports dynamic URL rewriting in its "fishlet" logic, breaking pattern matching by altering path/parameter structures.
Some legitimate sites (e.g., Google) require partial parameter preservation due to reliance on specific JavaScript logic.
Canary Tokens:
Used to detect phishing by embedding tripwire URLs (background images, JS calls, etc.) in legitimate authentication flows.
Exposure often relies on HTTP referrer headers leaking the phishing URL.
Evil Jinx injects Referrer-Policy: no-referrer headers to prevent this leakage; this method became consistently effective after a Chromium bug was fixed recently.
Browser in the Browser (BitB) & Iframe Protections
BitB attacks use simulated browser UI within a site, embedding the real phishing content in an iframe to steal credentials.