Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T131D1FB70A86CFA33039B93D3A3B29B1BB2D0C351EA471B164AF8439C5ECBD56DE45601 |
|
CONTENT
ssdeep
|
96:RqYksWS/Xfr2wGoU6xPbHlcc6nxY0KPJMyHHCWnFC6voCR3FCM:RqNZS9T4rnxsP6yHhnF7voM3Fp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3ce99cc6431c9cc |
|
VISUAL
aHash
|
ffe7ffe7ffffe7e7 |
|
VISUAL
dHash
|
322a2a4d2a1a4c4c |
|
VISUAL
wHash
|
1b031b031b1b2303 |
|
VISUAL
colorHash
|
07000000006 |
|
VISUAL
cropResistant
|
322a2a4d2a1a4c4c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
Pages with identical visual appearance (based on perceptual hash)