Monitoring the impossible - Understanding how 2 Steps emulates user transactions across 2FA/MFA, Citrix & Windows & why Selenium breaks