Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15811522500A148A74203D3F86795D506229EC200CFC31F18D7F047AE1DF6E05DAA72C8 |
|
CONTENT
ssdeep
|
12:hRwMy7FUVqC2wuO11RXCGvGQlJo23oJDVgCWLg0L/3GuuxWCdObRaeZuV:hR/Ce2p+1RSG+Ql9YNum0xrRaQuV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a56d85f634ccc998 |
|
VISUAL
aHash
|
d262700086e27f3f |
|
VISUAL
dHash
|
a6c6c3c50c8ee6de |
|
VISUAL
wHash
|
f260710386e27f1f |
|
VISUAL
colorHash
|
32400010000 |
|
VISUAL
cropResistant
|
a6c6c3c50c8ee6de |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.