Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E8922073C088B28F654646DCB9FF6AACDA15314BE7C68F0C29BCC9A5DA85387DC61C04 |
|
CONTENT
ssdeep
|
384:BgEEc0IubAKxNEQfiedhKJwJwdGODdkNKiroZ/p3j6KP36BQMR28Vjt+Bb4x6Ny2:BgEk7AKxNEQfiUhKJwJwdGOJkNKisZ/9 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c0e77f4b4b6803b4 |
|
VISUAL
aHash
|
60f676787e7ed65e |
|
VISUAL
dHash
|
c1c4c4c09494b4b4 |
|
VISUAL
wHash
|
60f666705c7e5652 |
|
VISUAL
colorHash
|
19006000000 |
|
VISUAL
cropResistant
|
faf8f4f0d0d050c0,c1c4c4c09494b4b4 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.