Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A76167B500445E3F0A42D6D0BB242A3CA2D3D187BEC60E4871F5434E9F97F6A890318B |
|
CONTENT
ssdeep
|
48:TXpJMIGv1a7fLaSPF2i3I7SR+8aALIzYXVqmTBB+s3+2Sq08AAH1YXNPySao:TIITNPmOA9a5evUYdVx |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b131cfcccc933331 |
|
VISUAL
aHash
|
cfc7c7c7c3ffffff |
|
VISUAL
dHash
|
9c9e9e9e9658260c |
|
VISUAL
wHash
|
03030303c3f3dfc3 |
|
VISUAL
colorHash
|
07402000080 |
|
VISUAL
cropResistant
|
9c9e9e9e9658260c,326a92923ca8a2ae |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain