Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C281243A2080655F0AD3A3E67B21A759B39292428A170F1120F9C7AD5FE1D0FCD6619A |
|
CONTENT
ssdeep
|
96:T8pgl2qkmUmAwKYIdVv9gmIS+VI/554S4JL:gulD/K79gmI7IR54nJL |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
99c561b29dcc3636 |
|
VISUAL
aHash
|
3b60129e1f85c108 |
|
VISUAL
dHash
|
53c5263239290bd2 |
|
VISUAL
wHash
|
3b61869e9f8fc10a |
|
VISUAL
colorHash
|
39601010000 |
|
VISUAL
cropResistant
|
53c5263239290bd2 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.