Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A5726685F5394F7A02FDB3E4E52823C562CB87338AC65FE092ED75954B18E99978320C |
|
CONTENT
ssdeep
|
192:W6TZn+GHAVJGICZlCPsihD+4OBofbdUQikVSDaundbpj:iGgVTCLO0FBqdUCSDdndbpj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
90916b6b2e2e9e9c |
|
VISUAL
aHash
|
017e7e464e004040 |
|
VISUAL
dHash
|
09d8b49c9cd89080 |
|
VISUAL
wHash
|
817e7e5e7e00607c |
|
VISUAL
colorHash
|
30200011040 |
|
VISUAL
cropResistant
|
09d8b49c9cd89080 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.
Pages with identical visual appearance (based on perceptual hash)