Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D721F31040039DBB6193A2D84BDECE1926D2C752EB173A42D6E43B6E2ED6D08CF3B554 |
|
CONTENT
ssdeep
|
12:hFTMwrTIV3xKXWRaj+8eE/KXSsQIHs3r3txrlnKXSsIfeoJD9SIqts3r31MtWhr3:hWE0sGqjKlHK3t99KofpN9yK3SGFNoKj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9da732d24d1db232 |
|
VISUAL
aHash
|
ffff1f1a18180000 |
|
VISUAL
dHash
|
fc5f7fb2b2b13cb8 |
|
VISUAL
wHash
|
ffffff3a18180000 |
|
VISUAL
colorHash
|
03e08000000 |
|
VISUAL
cropResistant
|
7cfd5f7db2b2b2b1,7db2b2b3b13c30c8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.
Pages with identical visual appearance (based on perceptual hash)