Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C9424230951CBF3B828392D9B7A637273295D385E74903005AF993BC5FD6D45CC2B2AA |
|
CONTENT
ssdeep
|
192:/FTY8450DNtOq8xlEs5K/E/+pI7IxfA2nHWq7ASGq8M+WrE46VaDl/6jnd5WsQKh:BY8ntOY9e7mfA2nr3+WQtaBijysNYW |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b1191e1ee169e1b6 |
|
VISUAL
aHash
|
0f0f0f4f4f4f0f0f |
|
VISUAL
dHash
|
1a1adadbdbda1a1a |
|
VISUAL
wHash
|
0f0f0f0f0f0f0f0f |
|
VISUAL
colorHash
|
06000030000 |
|
VISUAL
cropResistant
|
1a1adadbdbda1a1a,0000000020901090 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.