Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D011E1D050C41EBE4003B511CF91E9392FA3C6E67D5A3D00CAD8FA9D2D6BAA4C6864B9 |
|
CONTENT
ssdeep
|
24:hpfSTRwHwiYvbluTvN6Mxf3AzTENRk2NTNN6DiuS:CaHED2NxxfPw2lwS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8eb170378fc896c9 |
|
VISUAL
aHash
|
3f3f3f3f3f1c1838 |
|
VISUAL
dHash
|
fcfcf1f17174f161 |
|
VISUAL
wHash
|
1f1f1f1f1d1c1838 |
|
VISUAL
colorHash
|
07e00000000 |
|
VISUAL
cropResistant
|
f8fce3e3e1e8e1e3,63190cac1e1be3b7,877bf0a489cac4cd,ff7eebbf1f1fd98f,ccb4999ba326373a,c7c946072717190d |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain