Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
I'm trying to create a simple phishlet for OKTA, but I noticed that the origin hostname in the request header is still showing the phishing domain not the original domain. After some troubleshooting with the source code I found that it is actually replaced correctly, but I don't know why the POST request still sending with "ORIGIN" as phishing domain not the original one.
I'm trying to create a simple phishlet for OKTA, but I noticed that the origin hostname in the request header is still showing the phishing domain not the original domain. After some troubleshooting with the source code I found that it is actually replaced correctly, but I don't know why the POST request still sending with "ORIGIN" as phishing domain not the original one.