Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12C4294327241B67719DB53EA662AC39FB7D5D2C8CA5309411BFCC34C9BD6C488A32693 |
|
CONTENT
ssdeep
|
384:CYcSHBpLGmSl8rXpXf1rN+qNDsq8brig3kA9h:Nnhpul8rXpXf1B9NDj8bpksh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c3e39c9c98929c9e |
|
VISUAL
aHash
|
ff60746000107c30 |
|
VISUAL
dHash
|
f0cfccc4c2f2c0c0 |
|
VISUAL
wHash
|
ff707c7000787e70 |
|
VISUAL
colorHash
|
38249008040 |
|
VISUAL
cropResistant
|
f8f8f8f0f8f8f0f8,f0cfccc4c2f2c0c0 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.