training.phriendlyphishing.com
Open in
urlscan Pro
13.225.80.20
Public Scan
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=rP05e1TmUYZKfO5Rclq0a2uJ9rPrTZ_X&p=Gh22TYbJE-tcKQjWXs5nf8mufB1g3enK
Submission: On April 20 via manual from AU — Scanned from GB
Summary
TLS certificate: Issued by R3 on March 31st 2022. Valid for: 3 months.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 54.252.116.154 54.252.116.154 | 16509 (AMAZON-02) (AMAZON-02) | |
7 | 13.225.80.20 13.225.80.20 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:82f::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 143.204.98.34 143.204.98.34 | 16509 (AMAZON-02) (AMAZON-02) | |
13 | 5 |
ASN16509 (AMAZON-02, US)
PTR: launch.phriendlyphishing.com
www.obviouslyfakedomain.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-225-80-20.fra2.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-98-34.fra50.r.cloudfront.net
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
phriendlyphishing.com
training.phriendlyphishing.com |
35 KB |
2 |
amazonaws.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
4 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 46 ajax.googleapis.com — Cisco Umbrella Rank: 282 |
32 KB |
1 |
obviouslyfakedomain.com
1 redirects
www.obviouslyfakedomain.com |
1 KB |
0 |
cloudfront.net
Failed
d1djgeblw6va9k.cloudfront.net Failed |
|
13 | 5 |
Domain | Requested by | |
---|---|---|
7 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
training.phriendlyphishing.com
|
1 | fonts.googleapis.com |
training.phriendlyphishing.com
|
1 | www.obviouslyfakedomain.com | 1 redirects |
0 | d1djgeblw6va9k.cloudfront.net Failed |
training.phriendlyphishing.com
|
13 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.phriendlyphishing.com R3 |
2022-03-31 - 2022-06-29 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-03-28 - 2022-06-20 |
3 months | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon |
2021-08-15 - 2022-09-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=rP05e1TmUYZKfO5Rclq0a2uJ9rPrTZ_X&p=Gh22TYbJE-tcKQjWXs5nf8mufB1g3enK
Frame ID: 179673EB9737D608CFDFDE9637E3E831
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
SCAM Training LauncherPage URL History Show full URLs
-
http://www.obviouslyfakedomain.com/?t=rP05e1TmUYZKfO5Rclq0a2uJ9rPrTZ_X&p=Gh22TYbJE-tcKQjWXs5nf8mufB1g3enK/fakeo...
HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=rP05e1TmUYZKfO5Rclq0a2uJ9rPrTZ_X&p=Gh22TYbJE-tcKQjWXs5nf8muf... Page URL
Detected technologies
Ruby on Rails (Web Frameworks) ExpandDetected patterns
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.obviouslyfakedomain.com/?t=rP05e1TmUYZKfO5Rclq0a2uJ9rPrTZ_X&p=Gh22TYbJE-tcKQjWXs5nf8mufB1g3enK/fakeorderform123505
HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=rP05e1TmUYZKfO5Rclq0a2uJ9rPrTZ_X&p=Gh22TYbJE-tcKQjWXs5nf8mufB1g3enK Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ Redirect Chain
|
11 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter.png
training.phriendlyphishing.com/micro_course_handler/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
3 KB 4 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
character-bg.jpg
d1djgeblw6va9k.cloudfront.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- d1djgeblw6va9k.cloudfront.net
- URL
- https://d1djgeblw6va9k.cloudfront.net/character-bg.jpg
- Domain
- d1djgeblw6va9k.cloudfront.net
- URL
- https://d1djgeblw6va9k.cloudfront.net/landing-page-bubble.png
Verdicts & Comments Add Verdict or Comment
21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| showZoneInfo string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.obviouslyfakedomain.com/ | Name: XSRF-TOKEN Value: Wkf40XKsdrrh2Q%2FyP1W5FTARQQxw%2FirnJsawlQzHBzB3MXQhaEMju4I7IdJWOjSjW6Pq4ZdXWTsBCx7ujbfXnw%3D%3D |
|
www.obviouslyfakedomain.com/ | Name: _session_id Value: 3af5364c08a8e9f9a62f2aa56ca9f379 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
d1djgeblw6va9k.cloudfront.net
fonts.googleapis.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com
training.phriendlyphishing.com
www.obviouslyfakedomain.com
d1djgeblw6va9k.cloudfront.net
13.225.80.20
143.204.98.34
2a00:1450:4001:800::200a
2a00:1450:4001:82f::200a
54.252.116.154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