Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1EF919930C184AD6B51D792E093E4AB1B22C2C292DE07176507F0539E5FDAE85DF5DAB0 |
|
CONTENT
ssdeep
|
96:R5EiyJXbPQJRM5KPlKQlKJlKCxSM5KSlK9lKElK/xedQnd4ir:RmbYJRM5KPlKQlKJlKCxSM5KSlK9lKEG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9da732d24d1d923a |
|
VISUAL
aHash
|
ffff1f1a18180000 |
|
VISUAL
dHash
|
fc5f73b2b2b13cb8 |
|
VISUAL
wHash
|
ffffff3a18180000 |
|
VISUAL
colorHash
|
03e08000000 |
|
VISUAL
cropResistant
|
7cfd5f71b2b2b2b1,71b2b2b3b13c30c8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain