Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B4C1ABF06195EAB702E3B3C296A5BF5B37D08349CA564B0652FEC3A90FEDD04EC26415 |
|
CONTENT
ssdeep
|
96:gDTRtjXOlvbmLIXP5XW7YbULy2mqoFyxvcZSjc:mTRtjwvbFkMbuy2mqoF+0ZSjc |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
857dea00a97aab55 |
|
VISUAL
aHash
|
0160aa2b2a0200ff |
|
VISUAL
dHash
|
53d25a5adaca00ff |
|
VISUAL
wHash
|
99e8eaab2a2a00ff |
|
VISUAL
colorHash
|
30001200002 |
|
VISUAL
cropResistant
|
ececfcdbfeececf3,53d25a5adaca00ff |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.