Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17FF1A503B2197324068B052EBD6282D9EB3A5404E72A078572F9417DB7D40DACA3FEDE |
|
CONTENT
ssdeep
|
96:TIX+1XdILhvZPRxLY2uxqU/b0dP6rU1gFJ+nkitAqhqrjEnEyNdoui5mhd3Myk:O+d45xLYzI56e5kitrhqsEy0uLhd3rk |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ed9216060713cfed |
|
VISUAL
aHash
|
34c3c3c3c3c3c3c3 |
|
VISUAL
dHash
|
c40b030b2323030b |
|
VISUAL
wHash
|
34c3c3c3e3c3c3c3 |
|
VISUAL
colorHash
|
30007000000 |
|
VISUAL
cropResistant
|
c40b030b2323030b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.