https://ahv3ctpms4e.corporatereward.net/

Eingereichte URL:
https://ahv3ctpms4e.corporatereward.net/
Bericht beendet:

Die von der Seite ausgehenden identifizierten Links

JavaScript-Variablen · 3 gefunden

Globale JavaScript-Variablen, die in das Window Object einer Seite geladen werden, sind Variablen, die außerhalb von Funktionen deklariert werden und von jeder Stelle des Codes innerhalb des aktuellen Bereichs zugänglich sind

NameTyp

Konsolenprotokoll-Meldungen · 2 gefunden

In der Web-Konsole protokollierte Meldungen

TypKategorieProtokoll

HTML

Der HTML-Rohtext der Seite

<!DOCTYPE html><html><head>
    <meta charset="UTF-8">
    <meta name="viewport" content="width=device-width, initial-scale=1">
    <meta http-equiv="X-UA-Compatible" content="chrome=1">

    <title>404 - Quick Tip | Cofense</title>

    <link rel="shortcut icon" type="image/x-icon" href="https://cofense.com/favicon.ico">

    <style type="text/css">
      body {
        background: #FFF;
        color: #FFF;
        font-family: Helvetica, Arial, "sans-serif";
        font-size: 14px;
        margin: 0;
        padding: 0;
      }

      #copyright {
        color: #fff;
        text-align: center; font-size: 1em;
      }
      
      .wrap {
        max-width: 960px;
        margin: 0 auto;
      }
      
      #title { height: 130px;	}
      
      #title img {
        position: relative;
        top: -30px;
      }
      
      #tips {
        background: #f1f1f2;
        padding: 30px 0 60px 0;
        position: relative;
        z-index: 97;
      }
      
      .wrap img {
        width: 100%;
        height: auto;
      }
      
      #ground {
        background: url(/images/www/Cofense_spear_phishing_quick_tip_ground.png);
        background-repeat: no-repeat;
        width: 100%;
        max-height: 200px;
        height: 100%;
        position: absolute;
        bottom: -30px;
        z-index: 99;
      }

      #header {
        background-color:#112436;
        width: 100%;
        height: 200px;
        display: inline-block;
      }
        
      #footer {
        background-color:#112436;
        width: 100%;
        height: 100px;
        display: inline-block;
      }
        
      #midfooter {
        background-color:#FFFFFF;
        width: 100%;
        height: 190px;
      }
    </style>
  </head>

  <body>
    <div id="header">
      <h1 style="color:#FFFFFF; text-align: center; line-height:10px; padding-top:10px;">How did I get here?</h1><br>
      <p style="color:#FFFFFF; text-align: center; line-height:30px; font-size:25px; ">
        This was an authorized phishing simulation<br>
        from your organization as part of your program.
      </p>
    </div>

    <div class="wrap" id="title">
      <img src="/images/www/phishme_spear_phishing_quick_tip_title.png" alt="Spear phishing general quick tips title">
    </div>

    <div id="tips">
      <div class="wrap">
        <img src="/images/www/phishme_spear_phishing_quick_tip.png" alt="General Spear Phishing Quick Tips">
      </div>
    </div>

    <div id="midfooter">
      <table width="100%" height="190">
        <tbody><tr>
          <td align="right">
            <img width="20%" alt="" src="/images/www/reporter.png">
          </td> 
          <td align="left">
            <p style="color:#000000; font-size:18px; ">
              <strong>Remember:</strong> you are the last line of defense against phishing.<br> If you receive a suspicious email, report it immediately.
            </p>
          </td>
        </tr>
      </tbody></table>
    </div>

    <div id="footer">
      <p style="color:#FFFFFF; text-align: center;font-size:20px; ">If you are a PhishMe operator, contact support if you need help setting up your scenario</p>

      <div id="copyright">
        © <script>document.write(new Date().getFullYear())</script>2024 Cofense, Inc.
      </div>
    </div>

    <div id="ground">
      &nbsp;
    </div>
  

</body></html>