Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A602D82392C93332064B42B3FA2793DDE7254458EB261A85B1BE420D36C89D8CF3B7D5 |
|
CONTENT
ssdeep
|
96:TGrXYA6JkVpI/WgTV5ZAHXwrJA7Jg9vZMu/OLqY4y75/wxFZbH9PSpm3fnWs1nzX:SDYALVpIegTV54CC8J/OeyEtMeW8CG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c3b8ccc62c93cb65 |
|
VISUAL
aHash
|
7c7c7c28207c3c30 |
|
VISUAL
dHash
|
e9c0c94947c1c941 |
|
VISUAL
wHash
|
7c7c7c38307c7c30 |
|
VISUAL
colorHash
|
38017000000 |
|
VISUAL
cropResistant
|
e9c0c94947c1c941 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.