Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12212BB71225975F71887B3C56B21AF99B6D88B40D6430B01A6FF834E5F9DD00CD29B1E |
|
CONTENT
ssdeep
|
96:f4kcY3vqWkusjkjT103X15E1wN1Bc1a51y3193Q1m61aci21+uQPJruS2+Q6WS1T:Qkzujouql2+jIiaglqH0n |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c9f8261c0f63f8f0 |
|
VISUAL
aHash
|
183cf87818182070 |
|
VISUAL
dHash
|
71f09050f0b0c8c0 |
|
VISUAL
wHash
|
187efefc18183878 |
|
VISUAL
colorHash
|
31000010006 |
|
VISUAL
cropResistant
|
71f09050f0b0c8c0 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.