Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B45209E243545AACA2438FE4EF267B2A319B60FDDB9A4740C17517D0A5D6BCCE81BC20 |
|
CONTENT
ssdeep
|
192:WehYRPVLfaEI5LMsNpgaIho7700vNybQ3OJbQk2e/94+IEbQMRz7+nBunWAi5k:BCdLaoykho7EEGoeO+IEPJ7+n0nWAiG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bb31017fec874919 |
|
VISUAL
aHash
|
0f0f0f9f9f9f1fff |
|
VISUAL
dHash
|
9b9adb3e337378db |
|
VISUAL
wHash
|
0f0f0f8f89090f6f |
|
VISUAL
colorHash
|
06000000007 |
|
VISUAL
cropResistant
|
9b9adb3e337378db,0ae0c0d890936b84,99aa69e98b359b68,0000003232300810,cb8d65a5a3d3cd1b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.