Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18C71D8F4A2AC666E8083C7DC5B67672533AEC1F1F2120285CEDC8FA2B206D81D5631D4 |
|
CONTENT
ssdeep
|
96:Kh1HA66i9si4i+UnW1XW1t42ouAlkJxSpBpR6fQ3/v:KojZNUnWpWFouAC8R6I3X |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b7a31d8937815d89 |
|
VISUAL
aHash
|
7fffffe7ffffff00 |
|
VISUAL
dHash
|
d40c080c0c200020 |
|
VISUAL
wHash
|
00e7e7e7e4fccc00 |
|
VISUAL
colorHash
|
07007000000 |
|
VISUAL
cropResistant
|
c00c080c0c000000,00e0026868022080 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.