Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A441EFB4B084197F46D247D4BF02773D2BC24AC1D1021D4C42E18A0B9FAEF89CC465EA |
|
CONTENT
ssdeep
|
48:TgiP+OEjmneAIEmRrRDDIrK3l3O1GznoQ:TJP+9yne7pW2z |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e2f68d9b58093366 |
|
VISUAL
aHash
|
fff7e7c4e4e77fff |
|
VISUAL
dHash
|
802d0d8d0dcdc8d4 |
|
VISUAL
wHash
|
7fc7c1c0c024277f |
|
VISUAL
colorHash
|
07200048040 |
|
VISUAL
cropResistant
|
802d0d8d0dcdc8d4,c749035ec0c51719,0100203232300801,0d070d078191dd47 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.