Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T144919930C084AD7B51D792E097A4AB1B22C2C282DE0717654BF0539E9FDAE85DF5DAB0 |
|
CONTENT
ssdeep
|
96:R5EiyJXbPQJRGc5KPlKQlKJlKCxSGc5KSlK9lKElK/xeund4ir:RmbYJRGc5KPlKQlKJlKCxSGc5KSlK9lA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9da732d24d1d923a |
|
VISUAL
aHash
|
ffff1f1a18180000 |
|
VISUAL
dHash
|
fc5f73b2b2b13cb8 |
|
VISUAL
wHash
|
ffffff3a18180000 |
|
VISUAL
colorHash
|
03e08000000 |
|
VISUAL
cropResistant
|
7cfd5f71b2b2b2b1,71b2b2b3b13c30c8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.
Pages with identical visual appearance (based on perceptual hash)