training.phriendlyphishing.com
Open in
urlscan Pro
3.167.37.76
Public Scan
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG
Submission: On October 04 via api from AU — Scanned from US
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on November 7th 2023. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 52.85.132.33 52.85.132.33 | 16509 (AMAZON-02) (AMAZON-02) | |
22 | 3.167.37.76 3.167.37.76 | 16509 (AMAZON-02) (AMAZON-02) | |
4 | 108.138.85.68 108.138.85.68 | 16509 (AMAZON-02) (AMAZON-02) | |
28 | 4 |
ASN16509 (AMAZON-02, US)
PTR: server-52-85-132-33.iad50.r.cloudfront.net
samsung.global.cdm.lang-en.us |
ASN16509 (AMAZON-02, US)
PTR: server-3-167-37-76.iad61.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-108-138-85-68.iad12.r.cloudfront.net
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
phriendlyphishing.com
training.phriendlyphishing.com |
439 KB |
4 |
amazonaws.com
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
8 KB |
2 |
lang-en.us
1 redirects
samsung.global.cdm.lang-en.us |
2 KB |
0 |
googleapis.com
Failed
ajax.googleapis.com Failed |
|
28 | 4 |
Domain | Requested by | |
---|---|---|
22 | training.phriendlyphishing.com |
samsung.global.cdm.lang-en.us
training.phriendlyphishing.com |
4 | hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
training.phriendlyphishing.com
|
2 | samsung.global.cdm.lang-en.us | 1 redirects |
0 | ajax.googleapis.com Failed |
training.phriendlyphishing.com
|
28 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
account-management.net.au Amazon RSA 2048 M02 |
2024-09-26 - 2025-10-25 |
a year | crt.sh |
training.phriendlyphishing.com Amazon RSA 2048 M02 |
2023-11-07 - 2024-12-06 |
a year | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon RSA 2048 M03 |
2024-03-12 - 2025-04-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG
Frame ID: 268BF4284D824C49ABFB53E738BF2BFF
Requests: 26 HTTP requests in this frame
Screenshot
Page Title
Training LauncherPage URL History Show full URLs
-
http://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/NlYV9...
HTTP 307
https://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/NlYV9... Page URL
-
http://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/N...
HTTP 307
https://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/N... HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0... Page URL
Detected technologies
Ruby on Rails (Web Frameworks) ExpandDetected patterns
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/NlYV9hbGxfbmxfMDAwMDE3MTAwMV9
HTTP 307
https://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/NlYV9hbGxfbmxfMDAwMDE3MTAwMV9 Page URL
-
http://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/NlYV9hbGxfbmxfMDAwMDE3MTAwMV9&is_automation=false
HTTP 307
https://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/NlYV9hbGxfbmxfMDAwMDE3MTAwMV9&is_automation=false HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/NlYV9hbGxfbmxfMDAwMDE3MTAwMV9 HTTP 307
- https://samsung.global.cdm.lang-en.us/?t=fxmOUpjV1Z7E-vSB4IUpkm-XoSzjFeyc&p=fi98VAjmxkbrnI9aF5zDaGgv0jzLDjRG/NlYV9hbGxfbmxfMDAwMDE3MTAwMV9
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
samsung.global.cdm.lang-en.us/ Redirect Chain
|
474 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
training.phriendlyphishing.com/lib/fonts/Montserrat/ |
2 KB 876 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
training.phriendlyphishing.com/lib/fonts/Righteous/ |
191 B 552 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom_micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
training.phriendlyphishing.com/lib/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 809 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom_micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
or.png
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
reporter-icons.png
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis-icon.png
training.phriendlyphishing.com/micro_course_handler/ |
338 B 702 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter_gmail.png
training.phriendlyphishing.com/micro_course_handler/ |
38 KB 38 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
launcher.html
training.phriendlyphishing.com/ |
9 KB 9 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
6 KB 8 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
training.phriendlyphishing.com/ |
4 KB 5 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUHjIg1_i6t8kCHKm4532VJOt5-QNFgpCtZ6Hw5aXo.woff2
training.phriendlyphishing.com/lib/fonts/Montserrat/ |
13 KB 13 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Righteous-Regular.ttf
training.phriendlyphishing.com/lib/fonts/Righteous/ |
40 KB 40 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
html5gallery.js
training.phriendlyphishing.com/lib/html5gallery/ |
206 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_logo.png
training.phriendlyphishing.com/tincan_production/cell_1347/custom_micro_course/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
unusual_domain_names.png
training.phriendlyphishing.com/micro_course_lessons/ |
101 KB 101 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
curiosity.png
training.phriendlyphishing.com/micro_course_lessons/ |
141 KB 142 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
events
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
events
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
2 B 644 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading_center.gif
training.phriendlyphishing.com/lib/html5gallery/skins/horizontal/ |
3 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ajax.googleapis.com
- URL
- https://ajax.googleapis.com/ajax/libs/jquery/3.5.1/jquery.min.js
Verdicts & Comments Add Verdict or Comment
32 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| handle_alt_img function| showZoneInfo function| showHeader function| showFooter string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange object| microcourse_customisation object| image_name string| alt_text object| html5GalleryObjects function| onYouTubeIframeAPIReady function| loadHtml5Gallery function| HTML5GalleryTimer function| HTML5GallerySWFObjectFunc number| ELEM_VTT number| ELEM_VTTLANG number| ELEM_VTTLABEL object| $preloading9 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
samsung.global.cdm.lang-en.us/ | Name: _session_id Value: b24c8318deb4b604aaf6918294a92882 |
|
samsung.global.cdm.lang-en.us/ | Name: XSRF-TOKEN Value: _rciz6qFX4ZIfAbl376o0024-HtGiQ6HJKRPrPgdLFC9J2RftTNxuV3ib7To5g8qLm-201_T7qbRER5GA5GTDQ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vbWljcm9fY291cnNlX2xlc3NvbnMvKiIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTc4MjgyNzk5OTAwMH19fV19 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: DbZmGWEkGmfTbhNYXFbZQS3cKbAr~SAdyBZVaTM9PpEwFNzvdUwOejJ5BMWygv9wvsu0Y4Vg9FBMoqznVWzeu5rJjjkgRBcHTPQpD~MzHTFWJBcHYZwJkyVxAX4wY0rZFobrAsGdeYLCbto5we7b2p-pNELvo8mZJgmuknfwSfrZ0xZZgErEVF20j7KXCHp-5eZI-bMABozEpfm3rd7~GIPs4Ty~WuZF2e6C6j0oy1KJAqePe-FSmaJdWwkmlak1SW26xPHsMMIMsmrI1nZkweVijr-sBX2rJFmYTMCTYArTNHiE5LYtKcIjYuh1FHCyORwt6Pr63EZwazIJ-Sgfbw__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAQ275XTV4OPFI2O7M |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.IbMBIsIEj-2hQyXO3ntuVyB_splZ_uNBHDD95l9iIXo |
|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_1%2Ftraining_package_204%2Ftraining_package_version_1033%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fhvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.IbMBIsIEj-2hQyXO3ntuVyB_splZ_uNBHDD95l9iIXo%26actor%3D%257B%2522name%2522%3A%255B%2522Bill%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3Dc9e02cd0-81f4-11ef-8c0a-85436c1e9e31 |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_1/training_package_204/landing_page/ |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src https:; connect-src 'self' https:; font-src data: *; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true |
X-Content-Type-Options | nosniff |
X-Frame-Options | sameorigin |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com
samsung.global.cdm.lang-en.us
training.phriendlyphishing.com
ajax.googleapis.com
108.138.85.68
3.167.37.76
52.85.132.33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