The document discusses credential harvesting using man-in-the-middle attacks via social engineering. It proposes a system to help train internet users about cyber threats like phishing attacks. The system includes cloned social networking sites with two-factor authentication templates to simulate phishing attacks. This allows users to experience how attackers can bypass security mechanisms to steal credentials even when two-factor authentication is used, if the user is not aware of security best practices. Survey results show many users are unfamiliar with cybersecurity terms and concepts like phishing. The proposed system aims to educate users through interactive simulations of phishing techniques.