Uncovering the Persuasive Fingerprint of LLMs in Jailbreaking Attacks