Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T154822F306441EA3306D792C6AB32EB9FB7C183C5DA530B4956FC939C8FDAC59CE22116 |
|
CONTENT
ssdeep
|
384:6mGuA47ndiMRJYaBBs0FqnaBcv2Zw91DI4px/p0Xzhdaupd:6qfRJYaBBsiw91EDDHtv |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
eced1332463b136c |
|
VISUAL
aHash
|
00fbfbfbf300003c |
|
VISUAL
dHash
|
9616362727866a61 |
|
VISUAL
wHash
|
00fbfbfbf700003c |
|
VISUAL
colorHash
|
0b0000001c0 |
|
VISUAL
cropResistant
|
2a029e9e8c14109c,7a747c74d9dbd8da,23aa4a590d9c9a9a,92b2b2b2494b4949,9616362727866a61 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
Pages with identical visual appearance (based on perceptual hash)