From Zero to Hero: Phishing Campaign. Part 2
See also:
Part 1
Part 3
Chapter 2: Technical Implementation
Architecture
The phishing campaign scheme I'm considering is an example of a MitM attack to capture access credentials and sessions of attacked employees, including two-factor authorization (2FA) confirmation via TOTP codes and push notifications.
Infrastructure components:
* Phishing server.