Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CDA12E225084ED23D5C790E9D5E5E32F20D6D346DB574A0092FC93ED6AC9EE4CE84AE8 |
|
CONTENT
ssdeep
|
48:lgvqdZRehdDReT+kAvZRe8ktReETRoMB3fCP9XLQHX2r05HFLJO9tVZTyS:Eqdqh+d8/ENvCPJQ40nw0S |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3094c4c66e6e6b3 |
|
VISUAL
aHash
|
0000e7e7e7e7e7e7 |
|
VISUAL
dHash
|
0c580c4d4d4d4d4d |
|
VISUAL
wHash
|
0000c3e7c3e7e7e7 |
|
VISUAL
colorHash
|
07000030080 |
|
VISUAL
cropResistant
|
0c580c4d4d4d4d4d,418024b2b2300851,01000432b2320c10,01000432b2320c10,01000432b2320c10 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.
Pages with identical visual appearance (based on perceptual hash)