Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B091A9716081AA7B01E383D1AB33239B73E54285EE031B0467F5C3CB9F9AE1ADC62565 |
|
CONTENT
ssdeep
|
48:TXkREXpkGJJPld4SkdWxOdzuOZCHBSWY8z2FLRhyI6gERCoB1dHgTTAU:TjxJJP3xkdDtupt/KFVR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e94f090d474d4f1b |
|
VISUAL
aHash
|
00fdfbfcffc343db |
|
VISUAL
dHash
|
e303836495969596 |
|
VISUAL
wHash
|
00f0f9f0ff4301db |
|
VISUAL
colorHash
|
06403048000 |
|
VISUAL
cropResistant
|
c2c2e26a6ae2c2c2,039363a497979796,f3c3c293c3232323,58d8f2a6a63e3c3d,616c5e3e7e7c7861 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Pages with identical visual appearance (based on perceptual hash)