In this chapter, we learnt about credential harvesting. We also saw how phishing campaigns can be developed and run to capture usernames and passwords from an insecure login page.
In Chapter 7, Advanced Network Attacks, we will learn about the man in the middle framework.