Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T196C131F16081667B068BB2D2B761FB1A63928782D6070A0872F8D34F9FE5F44CC13692 |
|
CONTENT
ssdeep
|
96:Trqj1xbapu8flAC4CICYCgCYHmPs4IVV+DnMfBfvjgt3l/D:Q1xbaM8YCT0BcNlr |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c8eb4477b03bc42b |
|
VISUAL
aHash
|
40b879ff0c00007e |
|
VISUAL
dHash
|
9273f399ead253a4 |
|
VISUAL
wHash
|
c2b9fbff0e00007e |
|
VISUAL
colorHash
|
31601010000 |
|
VISUAL
cropResistant
|
9273f399ead253a4 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.