Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C061755050042C072E22B18CB907CECAC3994A59CF46EF5876EDA06A5CE5E11CD77AB9 |
|
CONTENT
ssdeep
|
48:PzVOrBOeuSbOgwfOy5FhOfctaOoOjvUGRNFf9CPiP5rfW+suHaPqa:PxiOSb5+HFs10j7oIhej7H |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3d9cc66d8d83298 |
|
VISUAL
aHash
|
ff19ffffe7e7ffe7 |
|
VISUAL
dHash
|
0c3158324c4d320c |
|
VISUAL
wHash
|
ff3c3c3c3c240000 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
0c3158324c4d320c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.