training.phriendlyphishing.com
Open in
urlscan Pro
13.225.63.24
Public Scan
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=GqmQbTd4NLM8tWpUH6bC-nf1AVi76yIB&p=41ioLMHBkkTUqBRxCXZe1Ec0OuCpgACm
Submission: On September 07 via manual from NZ — Scanned from US
Summary
TLS certificate: Issued by Amazon on June 29th 2022. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 18.160.144.38 18.160.144.38 | 16509 (AMAZON-02) (AMAZON-02) | |
7 | 13.225.63.24 13.225.63.24 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:816::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:80c::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 108.156.201.108 108.156.201.108 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 13.226.39.62 13.226.39.62 | 16509 (AMAZON-02) (AMAZON-02) | |
13 | 5 |
ASN16509 (AMAZON-02, US)
PTR: server-18-160-144-38.den52.r.cloudfront.net
invoice.net.lang-en.us |
ASN16509 (AMAZON-02, US)
PTR: server-13-225-63-24.ewr53.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-108-156-201-108.den52.r.cloudfront.net
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-226-39-62.ewr53.r.cloudfront.net
d1djgeblw6va9k.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
phriendlyphishing.com
training.phriendlyphishing.com |
35 KB |
2 |
cloudfront.net
d1djgeblw6va9k.cloudfront.net |
171 KB |
2 |
amazonaws.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
3 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 120 ajax.googleapis.com — Cisco Umbrella Rank: 480 |
32 KB |
1 |
lang-en.us
1 redirects
invoice.net.lang-en.us |
1 KB |
13 | 5 |
Domain | Requested by | |
---|---|---|
7 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | d1djgeblw6va9k.cloudfront.net |
training.phriendlyphishing.com
|
2 | i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
training.phriendlyphishing.com
|
1 | fonts.googleapis.com |
training.phriendlyphishing.com
|
1 | invoice.net.lang-en.us | 1 redirects |
13 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon |
2022-06-29 - 2023-07-29 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-08-15 - 2022-11-07 |
3 months | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon |
2022-07-16 - 2023-08-14 |
a year | crt.sh |
*.cloudfront.net Amazon |
2022-02-01 - 2023-01-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=GqmQbTd4NLM8tWpUH6bC-nf1AVi76yIB&p=41ioLMHBkkTUqBRxCXZe1Ec0OuCpgACm
Frame ID: 89C55781494055E9090B2054DF0F97FD
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
SCAM Training LauncherPage URL History Show full URLs
-
http://invoice.net.lang-en.us/?t=GqmQbTd4NLM8tWpUH6bC-nf1AVi76yIB&p=41ioLMHBkkTUqBRxCXZe1Ec0OuCpgACm
HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=GqmQbTd4NLM8tWpUH6bC-nf1AVi76yIB&p=41ioLMHBkkTUqBRxCXZe1Ec0O... Page URL
Detected technologies
Ruby on Rails (Web Frameworks) ExpandDetected patterns
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://invoice.net.lang-en.us/?t=GqmQbTd4NLM8tWpUH6bC-nf1AVi76yIB&p=41ioLMHBkkTUqBRxCXZe1Ec0OuCpgACm
HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=GqmQbTd4NLM8tWpUH6bC-nf1AVi76yIB&p=41ioLMHBkkTUqBRxCXZe1Ec0OuCpgACm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ Redirect Chain
|
11 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter.png
training.phriendlyphishing.com/micro_course_handler/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
3 KB 3 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
character-bg.jpg
d1djgeblw6va9k.cloudfront.net/ |
160 KB 161 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| showZoneInfo string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange string| html9 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
invoice.net.lang-en.us/ | Name: XSRF-TOKEN Value: JghHDXA%2BRjd9xfgxIGyN%2F3SJK37w1HSrPvd37Yno%2F3syi4mKnRFxVBLSwyCA3%2Fi%2BFr7Q0ay9NrLQKeTAxeXPRQ%3D%3D |
|
invoice.net.lang-en.us/ | Name: _session_id Value: ce69660bbf1902c9f58a7fc3f127a74e |
|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vbWljcm9fY291cnNlX3Byb2R1Y3Rpb24vKiIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTY2NDgwMjAwMDAwMH19fV19 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: eBKczOEysO9k~kF2OIjOfl7if0RvvAroTZ8XU4QLEAMfiZ~hE~nTIpGj-Vp8Rikh0gCkFe-3aP1~kUfyxNtZzMnITXT2lytQnvyhyPUNtqot88Ts2JUBoPXc6UBNxhf8Q7wAtzEr5CbHA~BZvL8TAdXSqeUQ3fHjXGYKTbW-p22oVs8w5NqoESwnA-Lz8sYUm5InaQIi2ewLO6uTkuXxcULZTBTtFdZGFc3ZabB0wOOLGY7XYSvQ5DJKo7l0iMh0WW8RQUErUtXLTMS5k3GuCm0ukWnJtfPk5IiF-rlNN2vBOBX-nznk3CpGfYfyQm8mG6gRX-fUPknnYxEiA1ZSAg__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAJOUANF3WQ4HHRA6Q |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6IkdxbVFiVGQ0TkxNOHRXcFVINmJDLW5mMUFWaTc2eUlCOjQxaW9MTUhCa2tUVXFCUnhDWFplMUVjME91Q3BnQUNtIiwiZmlyc3RfbmFtZSI6IkFsbW8iLCJsaWNlbnNlX2VuZCI6IjIwMjItMTAtMDRUMDA6MDA6MDArMTE6MDAifSwiaWF0IjoxNjYyNTE4ODgxLCJleHAiOjM5NDU2Mzc4MTN9.keUV8VTjTIVqTiB0Qhq0caYns9K4PqkO1Z_P4sJwGjY |
|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_1%2Ftraining_package_4%2Ftraining_package_version_530%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fi6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6IkdxbVFiVGQ0TkxNOHRXcFVINmJDLW5mMUFWaTc2eUlCOjQxaW9MTUhCa2tUVXFCUnhDWFplMUVjME91Q3BnQUNtIiwiZmlyc3RfbmFtZSI6IkFsbW8iLCJsaWNlbnNlX2VuZCI6IjIwMjItMTAtMDRUMDA6MDA6MDArMTE6MDAifSwiaWF0IjoxNjYyNTE4ODgxLCJleHAiOjM5NDU2Mzc4MTN9.keUV8VTjTIVqTiB0Qhq0caYns9K4PqkO1Z_P4sJwGjY%26actor%3D%257B%2522name%2522%3A%255B%2522Almo%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3D7ce8d6e0-2e57-11ed-bfb2-b98633806aa8 |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_1/training_package_4/landing_page/ |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
d1djgeblw6va9k.cloudfront.net
fonts.googleapis.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com
invoice.net.lang-en.us
training.phriendlyphishing.com
108.156.201.108
13.225.63.24
13.226.39.62
18.160.144.38
2607:f8b0:4006:80c::200a
2607:f8b0:4006:816::200a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