Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AEC19217A36433301E970254AA2217FADB2DC898B3125FBEB6AE035E738140BC57B791 |
|
CONTENT
ssdeep
|
96:TadARsRTU5ny/25WAVgHuwCAAy3Vry3T4GkGFfTCr/0cRGGvfIteCpuz:GdQI4rX9yFryceC/RFrz |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b093cfc69292cc6d |
|
VISUAL
aHash
|
c7c7c7c7c7c7c7cf |
|
VISUAL
dHash
|
9c9e969c9cb6969e |
|
VISUAL
wHash
|
4743c3c7c3c3c3c3 |
|
VISUAL
colorHash
|
07200038000 |
|
VISUAL
cropResistant
|
9c9e969c9cb6969e |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.