![](/screenshots/330d7f81-1daf-4088-9495-7e9ef414c082.png)
training.phriendlyphishing.com
Open in
urlscan Pro
54.192.18.12
Public Scan
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=npUi1UhIosgazHCSkq1IDJK7irFHo93S&p=0DzwoMwm2hJm3vH99l7HFpqHTP3s-Mm-
Submission: On March 07 via manual from NZ — Scanned from NZ
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on December 7th 2022. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 13.224.167.57 13.224.167.57 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 54.192.18.12 54.192.18.12 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 74.125.130.95 74.125.130.95 | 15169 (GOOGLE) (GOOGLE) | |
1 | 74.125.24.95 74.125.24.95 | 15169 (GOOGLE) (GOOGLE) | |
2 | 54.192.18.77 54.192.18.77 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 13.224.167.93 13.224.167.93 | 16509 (AMAZON-02) (AMAZON-02) | |
15 | 5 |
ASN16509 (AMAZON-02, US)
PTR: server-13-224-167-57.hkg54.r.cloudfront.net
bankdetails.vaevk.org |
ASN16509 (AMAZON-02, US)
PTR: server-54-192-18-12.hkg62.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-54-192-18-77.hkg62.r.cloudfront.net
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-224-167-93.hkg54.r.cloudfront.net
d1djgeblw6va9k.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
phriendlyphishing.com
training.phriendlyphishing.com |
20 KB |
2 |
cloudfront.net
d1djgeblw6va9k.cloudfront.net |
171 KB |
2 |
amazonaws.com
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
3 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 36 ajax.googleapis.com — Cisco Umbrella Rank: 306 |
32 KB |
1 |
vaevk.org
1 redirects
bankdetails.vaevk.org |
1 KB |
15 | 5 |
Domain | Requested by | |
---|---|---|
9 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | d1djgeblw6va9k.cloudfront.net |
training.phriendlyphishing.com
|
2 | hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
training.phriendlyphishing.com
|
1 | fonts.googleapis.com |
training.phriendlyphishing.com
|
1 | bankdetails.vaevk.org | 1 redirects |
15 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon RSA 2048 M02 |
2022-12-07 - 2024-01-05 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-02-08 - 2023-05-03 |
3 months | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon RSA 2048 M02 |
2023-02-24 - 2023-06-10 |
4 months | crt.sh |
*.cloudfront.net Amazon RSA 2048 M01 |
2022-12-08 - 2023-12-07 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=npUi1UhIosgazHCSkq1IDJK7irFHo93S&p=0DzwoMwm2hJm3vH99l7HFpqHTP3s-Mm-
Frame ID: 6CAC64310170BFF88E381993F576A0BA
Requests: 14 HTTP requests in this frame
Screenshot
![](/screenshots/330d7f81-1daf-4088-9495-7e9ef414c082.png)
Page Title
Training LauncherPage URL History Show full URLs
-
http://bankdetails.vaevk.org/?t=npUi1UhIosgazHCSkq1IDJK7irFHo93S&p=0DzwoMwm2hJm3vH99l7HFpqHTP3s-Mm-/%7B
HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=npUi1UhIosgazHCSkq1IDJK7irFHo93S&p=0DzwoMwm2hJm3vH99l7HFpqHT... Page URL
Detected technologies
![](/vendor/wappa/icons/Ruby on Rails.png)
Detected patterns
![](/vendor/wappa/icons/Google Font API.png)
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bankdetails.vaevk.org/?t=npUi1UhIosgazHCSkq1IDJK7irFHo93S&p=0DzwoMwm2hJm3vH99l7HFpqHTP3s-Mm-/%7B
HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=npUi1UhIosgazHCSkq1IDJK7irFHo93S&p=0DzwoMwm2hJm3vH99l7HFpqHTP3s-Mm- Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ Redirect Chain
|
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 950 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler-1798.css
training.phriendlyphishing.com/micro_course_handler/ |
1 KB 732 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 759 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 967 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
heart.svg
training.phriendlyphishing.com/micro_course_handler/ |
545 B 901 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter.png
training.phriendlyphishing.com/micro_course_handler/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
2 KB 3 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
character-bg.jpg
d1djgeblw6va9k.cloudfront.net/ |
160 KB 161 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| showZoneInfo string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange string| html9 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bankdetails.vaevk.org/ | Name: XSRF-TOKEN Value: Ha4VH22iHyzIroJLxg719q9IvhAW7ZHiVTkl6bi2Ci96R9gojxzFrWB%2B1%2Bv2EGX5iq3KWEfP4H%2BxegLaLntWEA%3D%3D |
|
bankdetails.vaevk.org/ | Name: _session_id Value: e5015cff0275c23fc63a7351c7a6f27b |
|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vbWljcm9fY291cnNlX2xlc3NvbnMvKiIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTc1MTU0Mzk5OTAwMH19fV19 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: KskXukg4jsni~E8ATZChVPnXwV9aJ8jWIEu5uM62~Sll6h523H8ZHD-w5aTeAnn92TL6IvcMWWEWk7t8~uwBL9dCcAzfOYqbaHJGqmcBLLgv5ZxxvE1KKUKsd8w56WyJWy6-lc7MmukeDSxrPuoLjFfTt3Y3dctcUxE~6Mgf5D74WPkz26AvbZ7RYoounbv4PmwzFvEjiQEycRUtOxc43p0Brtvim6iI-3E0B3mQIAq5hDygyHXsunNWe2ayzfFIKmosyd3UDovY88yRYEmxwvW92SrwIe9QpNqxwtf6gW8yHmvBf4JhkkH0mNgFezMW0e4hb0RNxFdLS1QTFeId6A__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAQ275XTV4OPFI2O7M |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6Im5wVWkxVWhJb3NnYXpIQ1NrcTFJREpLN2lyRkhvOTNTOjBEendvTXdtMmhKbTN2SDk5bDdIRnBxSFRQM3MtTW0tIiwiZmlyc3RfbmFtZSI6IkNoaXBvIiwibGljZW5zZV9lbmQiOiIyMDI1LTA3LTAzVDIxOjU5OjU5KzEwOjAwIn0sImlhdCI6MTY3ODE1MzYxNCwiZXhwIjo3NTA2ODUzNzgxM30.Dtw_JDJ7oGy0bNW_MLiIkVRrJ5k1XD71SfyfLFsOs4k |
|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_1%2Ftraining_package_4%2Ftraining_package_version_737%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fhvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6Im5wVWkxVWhJb3NnYXpIQ1NrcTFJREpLN2lyRkhvOTNTOjBEendvTXdtMmhKbTN2SDk5bDdIRnBxSFRQM3MtTW0tIiwiZmlyc3RfbmFtZSI6IkNoaXBvIiwibGljZW5zZV9lbmQiOiIyMDI1LTA3LTAzVDIxOjU5OjU5KzEwOjAwIn0sImlhdCI6MTY3ODE1MzYxNCwiZXhwIjo3NTA2ODUzNzgxM30.Dtw_JDJ7oGy0bNW_MLiIkVRrJ5k1XD71SfyfLFsOs4k%26actor%3D%257B%2522name%2522%3A%255B%2522Chipo%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3Df06a1960-bc89-11ed-a1c6-c532954f6517 |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_1/training_package_4/landing_page/ |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bankdetails.vaevk.org
d1djgeblw6va9k.cloudfront.net
fonts.googleapis.com
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com
training.phriendlyphishing.com
13.224.167.57
13.224.167.93
54.192.18.12
54.192.18.77
74.125.130.95
74.125.24.95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