Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12F535494E09055B7021303C0E7F3D759A26992C0DF530CFA93AD0277DBAAE9EB64F646 |
|
CONTENT
ssdeep
|
1536:Tn5IIB5f09K7MlN4U4/kjldBiQ4quzkDPHeMsX55:Ts3l+Q4ug |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cf31726099c7c3c5 |
|
VISUAL
aHash
|
6000383838303038 |
|
VISUAL
dHash
|
dc62627172606660 |
|
VISUAL
wHash
|
ff30383c3c78383c |
|
VISUAL
colorHash
|
38002000c00 |
|
VISUAL
cropResistant
|
dc62627172606660 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.