Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14F3295BB1045A63B11A381E1F7796F2FB1928185CB561604A1F9C379AFD8E09EC637C4 |
|
CONTENT
ssdeep
|
192:/qj8p12ihsaErvC4NJ5gOaKf1nh9mgRnwIemTgj7O0f3tj26FPSi2xjWnxhsU:/q02/PrvC+J5Z5NVRnUfjfr2xSUU |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
99b3262caccacbb1 |
|
VISUAL
aHash
|
0042fcfedfb80000 |
|
VISUAL
dHash
|
578cd870b23294ce |
|
VISUAL
wHash
|
0146fefeff981a00 |
|
VISUAL
colorHash
|
30c00000001 |
|
VISUAL
cropResistant
|
578cd870b23294ce |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.