training.phriendlyphishing.com
Open in
urlscan Pro
143.204.90.113
Public Scan
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=OaQ3MeafSZFtKGxN4HcHqocioiWdA0Wp&p=Lvh7MUX10wlQekDdneUzVR5d5LC8ew2W
Submission: On December 07 via manual from NZ
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on October 24th 2020. Valid for: 3 months.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 54.252.116.154 54.252.116.154 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 143.204.90.113 143.204.90.113 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 65.9.73.92 65.9.73.92 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 65.9.73.66 65.9.73.66 | 16509 (AMAZON-02) (AMAZON-02) | |
14 | 5 |
ASN16509 (AMAZON-02, US)
PTR: launch.phriendlyphishing.com
586949.png.obviouslyfakedomain.com |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-90-113.fra50.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
phriendlyphishing.com
training.phriendlyphishing.com |
114 KB |
2 |
cloudfront.net
d1djgeblw6va9k.cloudfront.net |
171 KB |
2 |
amazonaws.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
3 KB |
1 |
googleapis.com
ajax.googleapis.com |
31 KB |
1 |
obviouslyfakedomain.com
1 redirects
586949.png.obviouslyfakedomain.com |
1 KB |
14 | 5 |
Domain | Requested by | |
---|---|---|
9 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | d1djgeblw6va9k.cloudfront.net |
training.phriendlyphishing.com
|
2 | i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
training.phriendlyphishing.com
|
1 | 586949.png.obviouslyfakedomain.com | 1 redirects |
14 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.launch.phriendlyphishing.com Let's Encrypt Authority X3 |
2020-10-24 - 2021-01-22 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-11-03 - 2021-01-26 |
3 months | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon |
2020-09-11 - 2021-10-13 |
a year | crt.sh |
*.cloudfront.net DigiCert Global CA G2 |
2020-05-26 - 2021-04-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=OaQ3MeafSZFtKGxN4HcHqocioiWdA0Wp&p=Lvh7MUX10wlQekDdneUzVR5d5LC8ew2W
Frame ID: 332A29CD193D668839FCB5EF92D5C4D6
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://586949.png.obviouslyfakedomain.com/?t=OaQ3MeafSZFtKGxN4HcHqocioiWdA0Wp&p=Lvh7MUX10wlQekDdneUzVR5d5LC8ew2W
HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=OaQ3MeafSZFtKGxN4HcHqocioiWdA0Wp&p=Lvh7MUX10wlQekDdneUzVR5d5... Page URL
Detected technologies
Amazon Web Services (PaaS) ExpandDetected patterns
- headers via /\(CloudFront\)$/i
- headers server /^AmazonS3$/i
Amazon Cloudfront (CDN) Expand
Detected patterns
- headers via /\(CloudFront\)$/i
Amazon S3 (Miscellaneous) Expand
Detected patterns
- headers server /^AmazonS3$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://586949.png.obviouslyfakedomain.com/?t=OaQ3MeafSZFtKGxN4HcHqocioiWdA0Wp&p=Lvh7MUX10wlQekDdneUzVR5d5LC8ew2W
HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=OaQ3MeafSZFtKGxN4HcHqocioiWdA0Wp&p=Lvh7MUX10wlQekDdneUzVR5d5LC8ew2W Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ Redirect Chain
|
25 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
3 KB 3 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Other
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
character-bg.jpg
d1djgeblw6va9k.cloudfront.net/ |
160 KB 161 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
training.phriendlyphishing.com/tincan_production/cell_300/course_1/training_package_4/landing_page/ |
25 KB 25 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.jpeg
training.phriendlyphishing.com/tincan_production/cell_300/course_1/training_package_4/landing_page/ |
25 KB 25 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.jpg
training.phriendlyphishing.com/tincan_production/cell_300/course_1/training_package_4/landing_page/ |
25 KB 25 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| showZoneInfo string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange string| html7 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_1%2Ftraining_package_4%2Ftraining_package_version_4%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fi6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6Ik9hUTNNZWFmU1pGdEtHeE40SGNIcW9jaW9pV2RBMFdwOkx2aDdNVVgxMHdsUWVrRGRuZVV6VlI1ZDVMQzhldzJXIiwiZmlyc3RfbmFtZSI6IlN0ZWZhbiIsImxpY2Vuc2VfZW5kIjoiMjAyMS0wNS0yMFQyMzo1OTo1OSsxMDowMCJ9LCJpYXQiOjE2MDczMDkwMjksImV4cCI6MTc1MzQ5ODQ0OH0.EOZP5OfpUooFKnJGRIVhFiypOeghrfPjAQtLFO6foWI%26actor%3D%257B%2522name%2522%3A%255B%2522Stefan%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3D090c69d0-3836-11eb-8061-6f61e06a57d9 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAJOUANF3WQ4HHRA6Q |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6Ik9hUTNNZWFmU1pGdEtHeE40SGNIcW9jaW9pV2RBMFdwOkx2aDdNVVgxMHdsUWVrRGRuZVV6VlI1ZDVMQzhldzJXIiwiZmlyc3RfbmFtZSI6IlN0ZWZhbiIsImxpY2Vuc2VfZW5kIjoiMjAyMS0wNS0yMFQyMzo1OTo1OSsxMDowMCJ9LCJpYXQiOjE2MDczMDkwMjksImV4cCI6MTc1MzQ5ODQ0OH0.EOZP5OfpUooFKnJGRIVhFiypOeghrfPjAQtLFO6foWI |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_1/training_package_4/landing_page/ |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: HqCnYdyMQX1uIDkwacmtl8x5yJlhQb2stxpByuYh6rYA9t~LAd1Yz9kGJEmEwzoLwemkuys9y8iIk-0K78lL09CPycHv24AXRjG9e7bTrzlJo4Ml5TkUBooImSK4hj3bLhSx7TSQCZA13JwsYFv5vVX4Wq4JSkUr66faLKyA~HMx5f3y1KdIJZkM2XxjzKtt6FXc678pmmxvQ~3VN2Y8F~Y5rknFBykzVr4D2KZ-zeba92Cvp0f-s6ZFFj3MAFa64QOkVbhU2ucVPsN0h2BxeWX9r73ZD2HGNBjoOTadIhau2YVXP80FucxegPrV-CNiO-pvp7OL70cyW3qun4BRYw__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vKiIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTYyMTUxOTE5OTAwMH19fV19 |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
586949.png.obviouslyfakedomain.com
ajax.googleapis.com
d1djgeblw6va9k.cloudfront.net
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com
training.phriendlyphishing.com
143.204.90.113
2a00:1450:4001:800::200a
54.252.116.154
65.9.73.66
65.9.73.92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