Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
I have a phishlets, but the tool captures only 2 keys of 17 keys, why? any help please
here is the keys
['bev','jitney_client_session_updated_at','_csrf_token','jitney_client_session_id','jitney_client_session_created_at','_user_attributes','cereal_exp','_pt','_aat','abb_fa2','alfc','alfces','jlp3','rdu','rclmd','roles','_airbed_session_id']
I have a phishlets, but the tool captures only 2 keys of 17 keys, why? any help please
here is the keys ['bev','jitney_client_session_updated_at','_csrf_token','jitney_client_session_id','jitney_client_session_created_at','_user_attributes','cereal_exp','_pt','_aat','abb_fa2','alfc','alfces','jlp3','rdu','rclmd','roles','_airbed_session_id']