I know there are many Blogs and Youtube Videos out there covering the same Topic as i am covering on this page.
Nevertheless i decided to write my own Hands on About it.
You are going to ask yourself now - why?
Because i had Nothing to do and wanted to learn some new stuff.
This Blog is a Part of the Whole "AiTM" Series.
But first - let me take a Selfie - what is AiTM?
AiTM (Adversary-in-the-Middle) is a sophisticated cyberattack where a malicious actor intercepts communication between two parties, often between a user and a legitimate service. In AiTM attacks, adversaries typically place themselves between the victim and an authentication service (like a login page) to capture sensitive information such as login credentials or session tokens.

Unlike traditional Man-in-the-Middle (MitM) attacks, AiTM often targets multi-factor authentication (MFA), using phishing techniques to deceive users and steal authentication tokens, which allow attackers to bypass even MFA protections. This type of attack is increasingly being used to compromise high-value targets and gain unauthorized access to systems or accounts.