AiTM attacks don't steal passwords; they copy the result of a real login. You need to watch what happens after the user logs ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible resultsResults that may be inaccessible to you are currently showing.
Hide inaccessible results