training.phriendlyphishing.com
Open in
urlscan Pro
18.65.244.65
Public Scan
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=DUJCurysqIjHlEdXgkCMIBYUU1VAYBkN&p=niak6vyH9Z1Z3D-MDmg6DRuLXVvg6uBL
Submission: On June 10 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on November 7th 2023. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 18.67.110.62 18.67.110.62 | 16509 (AMAZON-02) (AMAZON-02) | |
23 | 18.65.244.65 18.65.244.65 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 142.250.66.202 142.250.66.202 | 15169 (GOOGLE) (GOOGLE) | |
4 | 18.67.93.107 18.67.93.107 | 16509 (AMAZON-02) (AMAZON-02) | |
28 | 3 |
ASN16509 (AMAZON-02, US)
PTR: server-18-67-110-62.syd62.r.cloudfront.net
play.co.google.co.userid-81d.ws |
ASN16509 (AMAZON-02, US)
PTR: server-18-65-244-65.syd3.r.cloudfront.net
training.phriendlyphishing.com |
ASN15169 (GOOGLE, US)
PTR: syd09s23-in-f10.1e100.net
ajax.googleapis.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-67-93-107.syd62.r.cloudfront.net
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
phriendlyphishing.com
training.phriendlyphishing.com |
554 KB |
4 |
amazonaws.com
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
11 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 461 |
31 KB |
1 |
userid-81d.ws
1 redirects
play.co.google.co.userid-81d.ws |
939 B |
28 | 4 |
Domain | Requested by | |
---|---|---|
23 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
4 | hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
training.phriendlyphishing.com
|
1 | play.co.google.co.userid-81d.ws | 1 redirects |
28 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
performancemanager10.successfactors.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon RSA 2048 M02 |
2023-11-07 - 2024-12-06 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-05-21 - 2024-08-13 |
3 months | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon RSA 2048 M03 |
2024-03-12 - 2025-04-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=DUJCurysqIjHlEdXgkCMIBYUU1VAYBkN&p=niak6vyH9Z1Z3D-MDmg6DRuLXVvg6uBL
Frame ID: A3C289AB626A41D1954A56B4DF15EE76
Requests: 26 HTTP requests in this frame
Screenshot
Page Title
Training LauncherPage URL History Show full URLs
-
http://play.co.google.co.userid-81d.ws/store/apps/details?id=apps.photos/?t=DUJCurysqIjHlEdXgkCMIBYUU1VAYBkN&p=niak...
HTTP 307
https://play.co.google.co.userid-81d.ws/store/apps/details?id=apps.photos/?t=DUJCurysqIjHlEdXgkCMIBYUU1VAYBkN&p=niak... HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=DUJCurysqIjHlEdXgkCMIBYUU1VAYBkN&p=niak6vyH9Z1Z3D-MDmg6DRuLX... Page URL
Detected technologies
Ruby on Rails (Web Frameworks) ExpandDetected patterns
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: SuccessFactors
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://play.co.google.co.userid-81d.ws/store/apps/details?id=apps.photos/?t=DUJCurysqIjHlEdXgkCMIBYUU1VAYBkN&p=niak6vyH9Z1Z3D-MDmg6DRuLXVvg6uBL&
HTTP 307
https://play.co.google.co.userid-81d.ws/store/apps/details?id=apps.photos/?t=DUJCurysqIjHlEdXgkCMIBYUU1VAYBkN&p=niak6vyH9Z1Z3D-MDmg6DRuLXVvg6uBL& HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=DUJCurysqIjHlEdXgkCMIBYUU1VAYBkN&p=niak6vyH9Z1Z3D-MDmg6DRuLXVvg6uBL Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
training.phriendlyphishing.com/lib/fonts/Montserrat/ |
2 KB 817 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
training.phriendlyphishing.com/lib/fonts/Righteous/ |
191 B 533 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom_micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
training.phriendlyphishing.com/lib/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 747 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom_micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
or.png
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
reporter-icons.png
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis-icon.png
training.phriendlyphishing.com/micro_course_handler/ |
338 B 682 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter_gmail.png
training.phriendlyphishing.com/micro_course_handler/ |
38 KB 38 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
launcher.html
training.phriendlyphishing.com/ |
9 KB 9 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
8 KB 11 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
training.phriendlyphishing.com/ |
4 KB 4 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUHjIg1_i6t8kCHKm4532VJOt5-QNFgpCtZ6Hw5aXo.woff2
training.phriendlyphishing.com/lib/fonts/Montserrat/ |
13 KB 13 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Righteous-Regular.ttf
training.phriendlyphishing.com/lib/fonts/Righteous/ |
40 KB 40 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
html5gallery.js
training.phriendlyphishing.com/lib/html5gallery/ |
206 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_logo.png
training.phriendlyphishing.com/tincan_production/cell_578/custom_micro_course/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
unusual_domain_names.png
training.phriendlyphishing.com/micro_course_lessons/ |
101 KB 101 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
curiosity.png
training.phriendlyphishing.com/micro_course_lessons/ |
141 KB 142 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
link.png
training.phriendlyphishing.com/micro_course_lessons/ |
116 KB 117 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
events
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
events
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
2 B 644 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading_center.gif
training.phriendlyphishing.com/lib/html5gallery/skins/horizontal/ |
3 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
35 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| handle_alt_img function| showZoneInfo function| showHeader function| showFooter string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange object| microcourse_customisation object| image_name string| alt_text object| html5GalleryObjects boolean| ASYouTubeIframeAPIReady number| ASYouTubeTimeout function| onYouTubeIframeAPIReady number| ASVimeoTimeout function| loadHtml5Gallery function| HTML5GalleryTimer function| HTML5GallerySWFObjectFunc number| ELEM_VTT number| ELEM_VTTLANG number| ELEM_VTTLABEL object| $preloading9 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
play.co.google.co.userid-81d.ws/ | Name: XSRF-TOKEN Value: w60PbyGpba6CWZelTz3fkbtWgcwhvRl7W3cb0pEpqgTwD0B5WPzpibSiYl_ejVuVHm00gJS2vB1Uc_VRfuxzYg |
|
play.co.google.co.userid-81d.ws/ | Name: _session_id Value: 8563adcdf13135e819b7b8385efc8179 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vbWljcm9fY291cnNlX2xlc3NvbnMvKiIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTczNDUyNjc5OTAwMH19fV19 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: NJ9TzNQ~SHf1P-PQnGQeqE76FeLHEA8XyGDl6z9Go3o-rGoQOhUnVBHObSPHErD5a7W937nT2Ou4fl7rNans258Ov1QOJDujBXvnvYRwHTUJ~r~TPt89FC1uXLqpxtTV4YYmEIm0uUsr2X9x2~Cl0TLs6aC0O5xcTKC0YmxdbBybrbOln1cXCQc3s-lZriF8RuWo2W0k8f2KjuzS3wqfeirJdmp3wQbs8IZFCta8Bii-Z77K~EskmwviahS3RZtjCXun2Rw8cmwjCF~mR8YRuTkbmqROGS4JDBhOcDD5LOvZ53APDB8bojA9xvoGztWs~hBHYJ0m~~ll3AgadBMP3g__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAQ275XTV4OPFI2O7M |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.a-4H9UYe0-0pIzJIOdeFYGmIlpBGYdlCvnUCPFkXRAY |
|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_1%2Ftraining_package_204%2Ftraining_package_version_1033%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fhvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.a-4H9UYe0-0pIzJIOdeFYGmIlpBGYdlCvnUCPFkXRAY%26actor%3D%257B%2522name%2522%3A%255B%2522Robert%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3Df4314160-26cb-11ef-a035-77086710e6e2 |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_1/training_package_204/landing_page/ |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com
play.co.google.co.userid-81d.ws
training.phriendlyphishing.com
142.250.66.202
18.65.244.65
18.67.110.62
18.67.93.107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