Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T132D11F209264B917D2D764B8E7A2DF1B2144C286D24B677462B4435EE9CDEE1CF306FC |
|
CONTENT
ssdeep
|
96:Tu4F8Oo6ZJOV7JEB7Yfh6EbVeiSqQwg6WIjMr07:fCOo6uViB7Yfh6EbVei9tW4o07 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
899c362299dd66cd |
|
VISUAL
aHash
|
0e1d3d1b5b67efef |
|
VISUAL
dHash
|
10112a32b2cc0410 |
|
VISUAL
wHash
|
0e0d191b1b4367ef |
|
VISUAL
colorHash
|
00038000000 |
|
VISUAL
cropResistant
|
10112a32b2cc0410 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.