Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B6C366F7C315C37623F7A2C591A19BB930D71215CC4A8BE13BED43198BB2EC66C26529 |
|
CONTENT
ssdeep
|
384:RcI+wP3qrJ8LbOJafBk/N5eLV4w/3gvcg6ZD:mqPc1N5oV4QQvt6N |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cccc333399cccc99 |
|
VISUAL
aHash
|
0018181818000000 |
|
VISUAL
dHash
|
043232b232240000 |
|
VISUAL
wHash
|
243c3c3c3c243030 |
|
VISUAL
colorHash
|
38000200088 |
|
VISUAL
cropResistant
|
043232b232240000 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain