Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D0A12D30511D983B269386E972B4AF0BB68EC645C943194892F0D3DD4FCEF1CCF46695 |
|
CONTENT
ssdeep
|
48:CsCvx3AIvxca9MEItgnltD8Rmr5EU4cqlN/ppBGR7L3/3A+Pj17hF+PlgP21HPLF:0ryoxnLDFEMUJw3JIc+Y7M8umRqWHg4u |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ea99a6968dc89a27 |
|
VISUAL
aHash
|
ffe7e1f8b9e1e0e1 |
|
VISUAL
dHash
|
234f0b336b4d4d45 |
|
VISUAL
wHash
|
ffe1a1b8b8e0e0e0 |
|
VISUAL
colorHash
|
06600040001 |
|
VISUAL
cropResistant
|
234f0b336b4d4d45,3160e0e0c0e0e0f0,b121948461e6ee48,22265e94928a5b5b,0f4e312121491307 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Pages with identical visual appearance (based on perceptual hash)