Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14BA2CB55B1380E7A01AEB3E1E61823C852D7C33383CA5FE492FD75944B68F9A9B9710C |
|
CONTENT
ssdeep
|
192:WAmTZn+GHAVJGICZlCPwT+j4tM2wfI4O4yG4so4VFF4W4Oe3dSDaundbpj:XVGgVTCLA6qfxHyPAVo/OoSDdndbpj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
90916b6b2e2e9e9c |
|
VISUAL
aHash
|
017e7e464e004040 |
|
VISUAL
dHash
|
09d8b49c9cd89080 |
|
VISUAL
wHash
|
817e7e5e7e00607c |
|
VISUAL
colorHash
|
30200011040 |
|
VISUAL
cropResistant
|
09d8b49c9cd89080 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.
Pages with identical visual appearance (based on perceptual hash)