Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FD01F40840A00C9B4311E3746BC5B1283C9AC5A64F233F0817F5E7BE35ABF55C7C0186 |
|
CONTENT
ssdeep
|
12:hRwMy7FU6dknzxQM/GBW3oJDEJD9kDVgo3fa9KNMSUaKC0SuX:hR/CYzx/YNEN9uuWfaIUaCSuX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
99195d4c4c666677 |
|
VISUAL
aHash
|
00ffe7ffffffffff |
|
VISUAL
dHash
|
30324d2a30080000 |
|
VISUAL
wHash
|
003f273f3c3c0c0c |
|
VISUAL
colorHash
|
07000000038 |
|
VISUAL
cropResistant
|
323a4d3204000000,0100203232320810 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
Pages with identical visual appearance (based on perceptual hash)