Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T121A110B0D0A6AE3712D78355FD72AB5FB2848784D7460B1033F453E85ACAE6DEE80964 |
|
CONTENT
ssdeep
|
96:T7Lw7Jl3pDp1TaXMp0WAtUQWTWwxAMndm8B/EgZdhfH619MgK1:kdl3hkF78B/RZdhfH29MgK1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ce45405bb66f66d0 |
|
VISUAL
aHash
|
0070f0ffff00f0f7 |
|
VISUAL
dHash
|
e5d4c566ad5555a5 |
|
VISUAL
wHash
|
007070bfff00f0f7 |
|
VISUAL
colorHash
|
06203008000 |
|
VISUAL
cropResistant
|
808080c2c2c08080,e4d46766955555a5,a8a89ea96dc18287,e58465e4e494d5e5,139388d8384ccc1f,987fb3a0c5c5b901,733b26342426211f,7153133577535b53 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.