Credential Harvesting Lab Setup
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] The supplied content is a fully actionable offensive playbook for phishing-based credential harvesting combined with network-level MITM techniques. Technically correct and operational (commands and code will work), it carries high risk: plaintext credential logging in webroot, instructions to bypass platform/HTTPS protections, and explicit ARP/DNS spoofing setup. While framed for authorized labs, the lack of enforced safeguards, secure handling of captured data, and strong ethical controls makes this document inappropriate for unrestricted distribution. If retained for legitimate training, it must be restricted to isolated, auditable environments, replace direct attack commands with simulations or inert examples, and add strong safeguards (encrypted logging, least privilege, authorization verification, retention policies, and explicit warnings that block copy-paste execution). LLM verification: This artifact is a clear, actionable playbook for phishing and active network interception (ARP/DNS spoofing) that captures credentials to a local plaintext file. It is high-risk operational content: while it can be used for authorized security testing, the guide lacks mandatory safeguards, containment, and secure handling of captured secrets and thus can readily enable real-world credential theft and network compromise. Treat the instructions as dangerous; do not execute them outside isolated,