Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12EA2FDB3171887BA85A1E788DBBAF85D33A98683B0F990CCCF575AC64C159F78074D60 |
|
CONTENT
ssdeep
|
384:plUcdUXfuahYJ/+0WozelaKJsOzlUcdUXfuahYJ/+0WozelaKw:plUcd0x2Q0iRJsOzlUcd0x2Q0iRw |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9111e6e42ceaea6e |
|
VISUAL
aHash
|
1f0e0c0f027fffff |
|
VISUAL
dHash
|
fcfaf9fbfefc0968 |
|
VISUAL
wHash
|
1f040405023fffff |
|
VISUAL
colorHash
|
060c0003000 |
|
VISUAL
cropResistant
|
fcfaf9fbfefc0968,fffdff7b7f7fffff,45058141298c83a5,349b0b0b1f4fcb9e,333a3939180f0706,8d81a6868f9c3262 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.