Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10651730EC240B50206C302F1797503DEE36744686B134B4D2EFAE25CAFDA669CE671EE |
|
CONTENT
ssdeep
|
48:TE63KgD6BYo1s9241xEqGatiA540kMixMcnwvOtLPhhVRSEtc/m:TegGk2uEXavriVwvOtrLVRp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8f1b9a3374333439 |
|
VISUAL
aHash
|
083d393333333333 |
|
VISUAL
dHash
|
69e16367676667e7 |
|
VISUAL
wHash
|
193d3b2333333333 |
|
VISUAL
colorHash
|
380000001c0 |
|
VISUAL
cropResistant
|
69e16367676667e7 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.