Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17A2201F0858155BB12D393F6D6356F2AF3D4C6C6CE9BCA4463FD83894FC9C829826198 |
|
CONTENT
ssdeep
|
192:JJXWAeIU2D2OqEmHtEbM2NAt6dfdyRu8+nKD:JJG11EqEbTmAfwRu8+nKD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ee4d13194d45564f |
|
VISUAL
aHash
|
00fff3f1f3ff60ff |
|
VISUAL
dHash
|
c01b25a7639dcbc9 |
|
VISUAL
wHash
|
00fbf0f0f1cf6071 |
|
VISUAL
colorHash
|
06203010000 |
|
VISUAL
cropResistant
|
8282a2a2a2828282,1b25a623279dcbc9,00d0c0c02b908264,0f6ddd2b090d0507,9b3b4d37331b8dcc |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.