Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13F025216620531170F5B056E3EA783EFB615A098F32A17D925ECC11FA6C1AC0CD7EE9A |
|
CONTENT
ssdeep
|
192:PbkbA6vPhfN2+7KxlemPYvUcoUNQEp6WNdSn:e5l25yU2Nbp62Qn |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c6f1cd391b2d3292 |
|
VISUAL
aHash
|
7c7c34303c343034 |
|
VISUAL
dHash
|
c1c1456169656065 |
|
VISUAL
wHash
|
7cf47c343c3c303c |
|
VISUAL
colorHash
|
38006000040 |
|
VISUAL
cropResistant
|
c1c1456169656065 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.