Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11E5172B00099AD7B1283DAE167B0A75F72D2C646CE87274157F9C3AC0FC3D96CE1A012 |
|
CONTENT
ssdeep
|
48:TGbNmUWqZEB2/FsXVRRjKwAdg0eqLuas1HrWCMgBfB8+8ALd:TG7XyxUigLlsICMad |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
dddc5c2a2a0b81d7 |
|
VISUAL
aHash
|
00ffff0000000000 |
|
VISUAL
dHash
|
1010909000000090 |
|
VISUAL
wHash
|
98ffffd8000000ff |
|
VISUAL
colorHash
|
00007000000 |
|
VISUAL
cropResistant
|
1010909000000090 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.