training.phriendlyphishing.com
Open in
urlscan Pro
18.65.244.38
Public Scan
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=NPKa5thcRjlvg6SZOyDORz7SVSuH2kMf&p=Pie1bLp_qha4F40COVEyDfD_qaXgLfUi
Submission: On April 13 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on November 7th 2023. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 18.67.111.48 18.67.111.48 | 16509 (AMAZON-02) (AMAZON-02) | |
13 | 18.65.244.38 18.65.244.38 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 18.67.111.69 18.67.111.69 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 108.158.32.43 108.158.32.43 | 16509 (AMAZON-02) (AMAZON-02) | |
17 | 3 |
ASN16509 (AMAZON-02, US)
PTR: server-18-67-111-48.syd62.r.cloudfront.net
rms.gov.au.hzeak.in |
ASN16509 (AMAZON-02, US)
PTR: server-18-65-244-38.syd3.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-67-111-69.syd62.r.cloudfront.net
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
ASN16509 (AMAZON-02, US)
PTR: server-108-158-32-43.syd3.r.cloudfront.net
d1djgeblw6va9k.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
phriendlyphishing.com
training.phriendlyphishing.com |
75 KB |
2 |
cloudfront.net
d1djgeblw6va9k.cloudfront.net |
171 KB |
2 |
amazonaws.com
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
10 KB |
1 |
hzeak.in
1 redirects
rms.gov.au.hzeak.in |
941 B |
17 | 4 |
Domain | Requested by | |
---|---|---|
13 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | d1djgeblw6va9k.cloudfront.net |
training.phriendlyphishing.com
|
2 | hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
training.phriendlyphishing.com
|
1 | rms.gov.au.hzeak.in | 1 redirects |
17 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon RSA 2048 M02 |
2023-11-07 - 2024-12-06 |
a year | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon RSA 2048 M03 |
2024-03-12 - 2025-04-09 |
a year | crt.sh |
*.cloudfront.net Amazon RSA 2048 M01 |
2023-10-10 - 2024-09-19 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=NPKa5thcRjlvg6SZOyDORz7SVSuH2kMf&p=Pie1bLp_qha4F40COVEyDfD_qaXgLfUi
Frame ID: 8D98DDF47EB77509F5C4741272B9939F
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Training LauncherPage URL History Show full URLs
-
http://rms.gov.au.hzeak.in/?t=NPKa5thcRjlvg6SZOyDORz7SVSuH2kMf&p=Pie1bLp_qha4F40COVEyDfD_qaXgLfUi/roads...
HTTP 307
https://rms.gov.au.hzeak.in/?t=NPKa5thcRjlvg6SZOyDORz7SVSuH2kMf&p=Pie1bLp_qha4F40COVEyDfD_qaXgLfUi/roads... HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=NPKa5thcRjlvg6SZOyDORz7SVSuH2kMf&p=Pie1bLp_qha4F40COVEyDfD_q... Page URL
Detected technologies
Ruby on Rails (Web Frameworks) ExpandDetected patterns
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://rms.gov.au.hzeak.in/?t=NPKa5thcRjlvg6SZOyDORz7SVSuH2kMf&p=Pie1bLp_qha4F40COVEyDfD_qaXgLfUi/roads/registration/inspections/overview.html
HTTP 307
https://rms.gov.au.hzeak.in/?t=NPKa5thcRjlvg6SZOyDORz7SVSuH2kMf&p=Pie1bLp_qha4F40COVEyDfD_qaXgLfUi/roads/registration/inspections/overview.html HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=NPKa5thcRjlvg6SZOyDORz7SVSuH2kMf&p=Pie1bLp_qha4F40COVEyDfD_qaXgLfUi Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ Redirect Chain
|
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
training.phriendlyphishing.com/lib/fonts/Montserrat/ |
2 KB 818 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler-1798.css
training.phriendlyphishing.com/micro_course_handler/ |
1 KB 725 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
training.phriendlyphishing.com/lib/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 750 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
heart.svg
training.phriendlyphishing.com/micro_course_handler/ |
545 B 894 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter.png
training.phriendlyphishing.com/micro_course_handler/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gmail_addin.png
training.phriendlyphishing.com/micro_course_handler/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
7 KB 10 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
training.phriendlyphishing.com/ |
4 KB 5 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
character-bg.jpg
d1djgeblw6va9k.cloudfront.net/ |
160 KB 161 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| showZoneInfo string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange string| html9 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
rms.gov.au.hzeak.in/ | Name: XSRF-TOKEN Value: FZuEt9wDYuzFqGIW-2keIW27L8ZJNkAZIVR79FCTubWoXHznOCRH3OGHD_TXzpYeYWBxXc-M2YwqXHhotNPR-g |
|
rms.gov.au.hzeak.in/ | Name: _session_id Value: 7d9814964cff82449c0cefbc18f430ec |
|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vbWljcm9fY291cnNlX2xlc3NvbnMvKiIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTczNDUyNjc5OTAwMH19fV19 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: NJ9TzNQ~SHf1P-PQnGQeqE76FeLHEA8XyGDl6z9Go3o-rGoQOhUnVBHObSPHErD5a7W937nT2Ou4fl7rNans258Ov1QOJDujBXvnvYRwHTUJ~r~TPt89FC1uXLqpxtTV4YYmEIm0uUsr2X9x2~Cl0TLs6aC0O5xcTKC0YmxdbBybrbOln1cXCQc3s-lZriF8RuWo2W0k8f2KjuzS3wqfeirJdmp3wQbs8IZFCta8Bii-Z77K~EskmwviahS3RZtjCXun2Rw8cmwjCF~mR8YRuTkbmqROGS4JDBhOcDD5LOvZ53APDB8bojA9xvoGztWs~hBHYJ0m~~ll3AgadBMP3g__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAQ275XTV4OPFI2O7M |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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_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.lNbaUzhQQNmSh08-x-mMCoRhGpWXGyQS5fy4NP-8UcU |
|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_1%2Ftraining_package_204%2Ftraining_package_version_1033%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fhvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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_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.lNbaUzhQQNmSh08-x-mMCoRhGpWXGyQS5fy4NP-8UcU%26actor%3D%257B%2522name%2522%3A%255B%2522Ian%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3Debaa2720-f979-11ee-9561-bbf241cbaa66 |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_1/training_package_204/landing_page/ |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
d1djgeblw6va9k.cloudfront.net
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com
rms.gov.au.hzeak.in
training.phriendlyphishing.com
108.158.32.43
18.65.244.38
18.67.111.48
18.67.111.69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