Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F211E1C050C41E7E40036121CF91D9392FE3C5A77D563D00CAD8FA9C2D6BAE0C5864B9 |
|
CONTENT
ssdeep
|
24:hpfSTRwHwiYvbluHN6Mxf3AzTENRk2NTNN6DiuS:CaHEDaNxxfPw2lwS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8eb170378fc896c9 |
|
VISUAL
aHash
|
3f3f3f3f3f1c1838 |
|
VISUAL
dHash
|
fcfcf1f17174f161 |
|
VISUAL
wHash
|
1f1f1f1f1d1c1838 |
|
VISUAL
colorHash
|
07e00000000 |
|
VISUAL
cropResistant
|
f8fce3e3e1e8e1e3,63190cac1e1be3b7,877bf0a489cac4cd,ff7eebbf1f1fd98f,ccb4999ba326373a,c7c946072717190d |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain