Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T179417B60C2195C1602A1D1EAAAF7331B12A5970DCA462F0497BCD3BE7DCBE54FD982E4 |
|
CONTENT
ssdeep
|
48:AEuHX1W5cGqmMYGM23dBmSiHrFiFdKqmMYGS+:Q18k/73WSOrF09/e+ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d80df267b2728378 |
|
VISUAL
aHash
|
001818ff000080ff |
|
VISUAL
dHash
|
30b2b2b230c8059d |
|
VISUAL
wHash
|
00d8ffff1800c0ff |
|
VISUAL
colorHash
|
010000001c0 |
|
VISUAL
cropResistant
|
c888c8a888a0a1c0,23078d9e9c8d7212,34b2b2b2b0c8210d |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Victim enters credit/debit card details including CVV and expiration. Card data is captured and can be used for fraudulent transactions or sold on dark web markets.