AiTM attacks don't steal passwords; they copy the result of a real login. You need to watch what happens after the user logs ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible resultsSome results have been hidden because they may be inaccessible to you
Show inaccessible results