Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A3B19CF24054B95323C333F0E5261BCA648F865EC5524B8072FD83ADA798EE9EE77251 |
|
CONTENT
ssdeep
|
96:TezbbcfMw3i3H3es3pd3x3u3B3meS34A3WO3l3E3s38y3whzy3/3n3qN3ZBdSZBF:izbIfjCCJF35EZrwE/rm+ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
81fcfe0001ff00ff |
|
VISUAL
aHash
|
ff7f7f3f3f3f3f3f |
|
VISUAL
dHash
|
e8e8c0d0d0d0d0d0 |
|
VISUAL
wHash
|
1c040c0c00000000 |
|
VISUAL
colorHash
|
07e00008000 |
|
VISUAL
cropResistant
|
e8e8c0d0d0d0d0d0,c6071357737cc0f3 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.