Help
RSS
API
Feed
Maltego
Contact
Domain > blktech.cn
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-11-20
43.159.98.18
(
ClassC
)
Port 443
HTTP/1.1 200 OKServer: openrestyContent-Type: text/htmlVary: Accept-EncodingVary: OriginVary: Access-Control-Request-MethodVary: Access-Control-Request-HeadersContent-Language: zh-CNPragma: no-cacheExpires: 0X-Content-Type-Options: nosniffStrict-Transport-Security: max-age31536000X-Frame-Options: SAMEORIGINX-XSS-Protection: 0Referrer-Policy: strict-origin-when-cross-originset-cookie: XSRF-TOKEN8b548834-e420-4641-abdf-e79c3768b96b; Path/; HTTPOnlyStrict-Transport-Security: max-age31536000Cache-Control: must-revalidate, no-cache, no-store, max-age0Transfer-Encoding: chunkedConnection: keep-aliveDate: Thu, 20 Nov 2025 15:38:14 GMTEO-LOG-UUID: 13804411865744429127EO-Cache-Status: MISS !DOCTYPE html>html langen>head> meta contenttext/html; charsetUTF-8 http-equivContent-Type /> meta content#1b1b1e media(prefers-color-scheme: dark) nametheme-color /> meta contentyes nameapple-mobile-web-app-capable /> meta contentblack-translucent nameapple-mobile-web-app-status-bar-style /> meta contentwidthdevice-width, user-scalableno initial-scale1, shrink-to-fitno, viewport-fitcover nameviewport /> title>BlockTech/title> link relstylesheet href/themes/halo-theme-chirpy/assets/dist/main.css?v1.4.6 /> script src/themes/halo-theme-chirpy/assets/dist/main.js?v1.4.6 typemodule >/script> script typetext/javascript> class ModeToggle { static get MODE_KEY() { return mode; } static get MODE_ATTR() { return data-mode; } static get DARK_MODE() { return dark; } static get LIGHT_MODE() { return light; } static get ID() { return mode-toggle; } constructor() { if (this.hasMode) { if (this.isDarkMode) { if (!this.isSysDarkPrefer) { this.setDark(); } } else { if (this.isSysDarkPrefer) { this.setLight(); } } } let self this; /* always follow the system prefers */ this.sysDarkPrefers.addEventListener(change, () > { if (self.hasMode) { if (self.isDarkMode) { if (!self.isSysDarkPrefer) { self.setDark(); } } else { if (self.isSysDarkPrefer) { self.setLight(); } } self.clearMode(); } self.notify(); }); } /* constructor() */ get sysDarkPrefers() { return window.matchMedia((prefers-color-scheme: dark)); } get isSysDarkPrefer() { return this.sysDarkPrefers.matches; } get isDarkMode() { return this.mode ModeToggle.DARK_MODE; } get isLightMode() { return this.mode ModeToggle.LIGHT_MODE; } get hasMode() { return this.mode ! null; } get mode() { return sessionStorage.getItem(ModeToggle.MODE_KEY); } /* get the current mode on screen */ get modeStatus() { if (this.isDarkMode || (!this.hasMode && this.isSysDarkPrefer)) { return ModeToggle.DARK_MODE; } else { return ModeToggle.LIGHT_MODE; } } setDark() { document.documentElement.setAttribute( ModeToggle.MODE_ATTR, ModeToggle.DARK_MODE ); sessionStorage.setItem(ModeToggle.MODE_KEY, ModeToggle.DARK_MODE); } setLight() { document.documentElement.setAttribute( ModeToggle.MODE_ATTR, ModeToggle.LIGHT_MODE ); sessionStorage.setItem(ModeToggle.MODE_KEY, ModeToggle.LIGHT_MODE); } clearMode() { document.documentElement.removeAttribute(ModeToggle.MODE_ATTR); sessionStorage.removeItem(ModeToggle.MODE_KEY); } /* Notify another plugins that the theme mode has changed */ notify() { window.postMessage( { direction: ModeToggle.ID, message: this.modeStatus }, * ); } flipMode() { if (this.hasMode) { if (this.isSysDarkPrefer) { if (this.isLightMode) { this.clearMode(); } else { this.setLight(); } } else { if (this.isDarkMode) { this.clearMode(); } else { this.setDark(); } } } else { if (this.isSysDarkPrefer) { this.setLight(); } else { this.setDark(); } } halo.flipMode(); this.notify(); } /* flipMode() */ } /* ModeToggle */ const modeToggle new ModeToggle(); /script> meta namegenerator contentHalo 2.21.8/>!-- PluginSearchWidget start -->script src/plugins/PluginSearchWidget/assets/static/search-widget.iife.js?version1.7.0 defer>/script>link relstylesheet href/plugins/PluginSearchWidget/assets/static/style.css?version1.7.0 />!-- PluginSearchWidget end -->/head>body>aside aria-labelSidebar idsidebar classd-flex flex-column align-items-end > header classprofile-wrapper> a classrounded-circle href/ idavatar> img src/upload/%E9%A3%9E%E8%A1%8C%E7%8C%AB.png width112 height112 altavatar /> /a> h1 classsite-title> a href/>BlockTech/a> /h1> p classsite-subtitle fst-italic> blocktech /p> /header> !-- .profile-wrapper --> nav classnav flex-column flex-grow-1 w-100 ps-0 > ul classnav> li classnav-item> a classnav-link href/ > i classfa-fw fas fa-bars-staggered >/i> span>首页/span> /a> /li> li classnav-item> a classnav-link href/categories target_self > i classfa-fw fas fa-bars-staggered >/i> span>分类/span> /a> /li> li classnav-item> a classnav-link href/tags target_self > i classfa-fw fas fa-bars-staggered >/i> span>标签/span> /a> /li> li classnav-item> a classnav-link href/about > i classfa-fw fas fa-bars-staggered >/i> span>关于/span> /a> /li> !-- .nav-item --> /ul> /nav> !-- ul.nav.flex-column --> div classsidebar-bottom d-flex flex-wrap align-items-center w-100> !-- {% unless site.theme_mode %}--> button classmode-toggle btn aria-labelSwitch Mode> i classfas fa-adjust>/i> /button> span classicon-border>/span> a hrefhttps://github.com/KillerManK> i classfab fa-github>/i> /a> a hrefhttps://x.com/KEVINBTCA> i classfab fa-twitter>/i> /a> a href/feed.xml> i classfas fa-rss>/i> /a> /div> !-- .sidebar-bottom --> /aside>div idmain-wrapper classd-flex justify-content-center> div classcontainer d-flex flex-column px-xxl-5> header idtopbar-wrapper> div idtopbar classd-flex align-items-center justify-content-between px-lg-3 h-100 > nav idbreadcrumb aria-labelBreadcrumb> span>主页/span> /nav> !-- display none--> button typebutton idsidebar-trigger classbtn btn-link> i classfas fa-bars fa-fw>/i> /button> div idtopbar-title>BlockTech/div> !-- .display none--> button typebutton idsearch-trigger classbtn btn-link> i classfas fa-search fa-fw>/i> /button> search classalign-items-center ms-3 ms-lg-0> i classfas fa-search fa-fw>/i> a hrefjavascript:SearchWidget.open() title搜索> input classform-control idsearch-input typesearch aria-labelsearch autocompleteoff placeholder搜索 > /a> /search> button typebutton classbtn btn-link text-decoration-none idsearch-cancel> 取消 /button> /div>/header> div classrow flex-grow-1> main aria-labelMain Content classcol-12 col-lg-11 col-xl-9 px-md-4 pb-5 > article classpx-1> div idpost-list classflex-grow-1 pe-xl-2> article classcard-wrapper> a href/archives/wei-ming-ming-wen-zhang-r5CQEUld classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>双点击劫持原理与防御/h1> div classcard-text content mt-0 mb-2> p>原理解析 基本概念:DoubleClickjacking 是一种进阶点击劫持。攻击者伪装出与真实授权页几乎一致的界面,将真实目标页(如 OAuth 授权页)以叠加/对齐的方式置于可交互层之上或下方,诱导用户“双击”。页面强调它可绕过常见的 X-Frame-Options 与框架破坏脚本。/p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-09-08/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> 安全 网络 /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> article classcard-wrapper> a href/archives/wei-ming-ming-wen-zhang-1U3ahBGA classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>点击劫持原理与防御/h1> div classcard-text content mt-0 mb-2> p>定义 点击劫持是一种网络安全攻击,攻击者通过在网页中嵌入(通常用<iframe>)目标网站的真实页面,并将其设置为透明或部分透明,诱导用户点击,从而在不知情的情况下完成敏感操作。/p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-09-08/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> 安全 网络 /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> article classcard-wrapper> a href/archives/jian-qie-ban-jie-chi-yuan-li-yu-fang-yu classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>剪切板劫持原理与防御/h1> div classcard-text content mt-0 mb-2> p>案例 近期,慢雾安全团队发现一种名为Clickfix的钓鱼攻击,攻击者通过伪装成常见的机器人校验(如checkbox验证),诱导用户点击并执行恶意命令。 攻击流程: 用户点击校验按钮/p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-09-05/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> 安全 网络 /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> article classcard-wrapper> a href/archives/ling-zhuan-zhang-gong-ji-yuan-li-yu-fang-yu classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>零转账攻击原理与防御/h1> div classcard-text content mt-0 mb-2> p>概念 零转账(Zero Transfer):在以太坊上向某地址发起金额为 0 的转账/事件记录。 原生 ETH:value 0 的交易可执行,但不产生余额变化。 ERC-20:transfer(to, 0) 或 transferFrom(from, to, 0) 通常被允许,并会触发 Trans/p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-09-05/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> 安全 网络 /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> article classcard-wrapper> a href/archives/ling-ding-dan-diao-yu-gong-ji-yuan-li-yu-fang-yu classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>零订单钓鱼攻击原理与防御/h1> div classcard-text content mt-0 mb-2> p>案例 这是一个典型的 Seaport 零订单钓鱼攻击。攻击者创建了一个看似提供高价(100 ETH)购买您 NFT 的订单,但实际上订单中的对价被设置为 0 ETH。 在这个钓鱼订单中,关键问题是:/p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-09-05/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> 安全 网络 /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> article classcard-wrapper> a href/archives/shu-qian-gong-ji-yuan-li-yu-fang-yu classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>书签攻击原理与防御/h1> div classcard-text content mt-0 mb-2> p>Web3 场景下的 Discord「书签攻击」原理与防御 黑客常借助 Discord 进行社工与链接投放,其中「书签攻击」(Bookmarklet Attack / 书签注入)是近年常见的一种前端攻击手法。它不依赖浏览器漏洞,而是利用用户“主动执行”的书签脚本,在用户浏览器上下文中执行恶意代码,从而/p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-09-05/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> 安全 网络 /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> article classcard-wrapper> a href/archives/lian-jie-xie-yi-ji-zhang-hu-chou-xiang-de-quan-lian-lu-an-quan-chai-jie classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>链接协议及账户抽象的全链路安全拆解/h1> div classcard-text content mt-0 mb-2> p>1. 说明 WalletConnect 协议与账户抽象(ERC-4337 及 EIP-7702)的结合,为去中心化身份验证和交易体验带来了革命性变化。本调研旨在从技术实现、交互流程、安全风险及针对钓鱼攻击案例等角度,深入研究 WalletConnect 与账户抽象在 Web3 环境下的安全架构,并探/p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-09-04/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> 安全 Wallet Chain /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> article classcard-wrapper> a href/archives/ton-zhuan-zhang-yuan-li-chai-jie classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>Ton 转账原理拆解/h1> div classcard-text content mt-0 mb-2> p>背景 TON 是消息驱动的账户抽象链:所有操作都是智能合约之间通过异步消息(外部消息、内部消息)互动完成。 钱包是合约:用户持有的钱包其实是一个部署在链上的合约(如 v3、v4、v5 钱包),由私钥签名外部消息驱动执行转账等操作。 Toncoin 与 Jetton 的差异: Toncoin 是链的原/p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-08-27/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> Chain /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> article classcard-wrapper> a href/archives/ton-xiu-gai-duo-qian-yu-zhu-yi classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>Ton 修改多签与注意/h1> div classcard-text content mt-0 mb-2> p>TON 多签合约:修改成员(增删钥或换人) 说明:多签并无唯一官方实现。以下以社区常见 SafeMultisig/SetcodeMultisig 风格进行抽象,接口名与 TL‑B 布局可能因实现不同而异。若你提供具体仓库或 ABI,我可给出精确到位宽的代码与序列化。 一、目标 初始多签:成员集合 {/p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-08-27/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> Wallet /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> article classcard-wrapper> a href/archives/tonsheng-cheng-duo-qian-di-zhi-yu-zhu-yi classcard post-preview flex-md-row-reverse > div classcard-body d-flex flex-column> h1 classcard-title my-2 mt-md-0>Ton生成多签地址与注意/h1> div classcard-text content mt-0 mb-2> p>用 Python 生成 TON 普通钱包地址与多签钱包地址 下面用可运行的 Python 示例演示如何“离线”生成: 普通钱包(Wallet v4R2)的地址 多签钱包(以 SafeMultisig 风格为例)的地址 并解释底层原理:在 TON 中,地址来自合约的 StateInit(code + /p> /div> div classpost-meta flex-grow-1 d-flex align-items-end> div classme-auto > !-- posted date --> i classfar fa-calendar fa-fw me-1>/i> em class >2025-08-27/em > !-- categories --> i classfar fa-folder-open fa-fw me-1>/i> span classcategories> Chain /span> /div> /div> !-- .post-meta --> /div> !-- .card-body --> /a> /article> /div> nav aria-labelPage Navigation> ul classpagination align-items-center mt-4 mb-0> !-- left arrow --> li classpage-item disabled> a aria-labelprevious-page classpage-link href/ > i classfas fa-angle-left>/i> /a> /li> !-- page numbers --> li classpage-item active > a classpage-link href/page/1>1/a> /li> li classpage-item > a classpage-link href/page/2>2/a> /li> li classpage-item > a classpage-link href/page/3>3/a> /li> li classpage-item disabled> span classpage-link >…/span > /li> li classpage-item> a classpage-link href/page/7 >7/a > /li> !-- right arrow --> li classpage-item> a aria-labelnext-page classpage-link href/page/2 > i classfas fa-angle-right>/i> /a> /li> /ul> /nav> /article> /main> !-- panel --> aside aria-labelPanel idpanel-wrapper classcol-xl-3 ps-2 text-muted > html langen> div classaccess> section idaccess-lastmod classpost> h2 classpanel-heading>最近更新/h2> ul classpost-content list-unstyled ps-0 pb-1 ms-1 mt-2 > li classtext-truncate lh-lg> a href/archives/wei-ming-ming-wen-zhang-r5CQEUld>双点击劫持原理与防御/a> /li> li classtext-truncate lh-lg> a href/archives/wei-ming-ming-wen-zhang-1U3ahBGA>点击劫持原理与防御/a> /li> li classtext-truncate lh-lg> a href/archives/jian-qie-ban-jie-chi-yuan-li-yu-fang-yu>剪切板劫持原理与防御/a> /li> li classtext-truncate lh-lg> a href/archives/ling-zhuan-zhang-gong-ji-yuan-li-yu-fang-yu>零转账攻击原理与防御/a> /li> li classtext-truncate lh-lg> a href/archives/ling-ding-dan-diao-yu-gong-ji-yuan-li-yu-fang-yu>零订单钓鱼攻击原理与防御/a> /li> /ul> /section> section> h2 classpanel-heading>热门标签/h2> div classd-flex flex-wrap mt-3 mb-1 me-3 > a classpost-tag btn btn-outline-primary href/tags/eth >ETH/a > a classpost-tag btn btn-outline-primary href/tags/ji-chu >基础/a > a classpost-tag btn btn-outline-primary href/tags/ye-wu >业务/a > a classpost-tag btn btn-outline-primary href/tags/zi-chan >资产/a > a classpost-tag btn btn-outline-primary href/tags/ton >TON/a > a classpost-tag btn btn-outline-primary href/tags/wallet >Wallet/a > a classpost-tag btn btn-outline-primary href/tags/feng-kong >风控/a > a classpost-tag btn btn-outline-primary href/tags/xi-lie-wen-zhang >系列文章/a > a classpost-tag btn btn-outline-primary href/tags/btc >BTC/a > a classpost-tag btn btn-outline-primary href/tags/shi-chang >市场/a > /div> /section> /div> div classaccess-sticky> section classaccess-links > h2 classpanel-heading>站点信息/h2> ul classpost-content pl-0 pb-1 ml-1 mt-2> /ul> /section> /div>/html> /aside> /div> div classrow> !-- tail --> div idtail-wrapper classcol-12 col-lg-11 col-xl-9 px-md-4> footer aria-labelSite Info classd-flex flex-column justify-content-center text-muted flex-lg-row justify-content-lg-between align-items-lg-center pb-lg-3 > p> ©2025 a hrefhttps://blktech.cn>BlockTech/a>. !-- copyright--> span data-bs-toggletooltip data-bs-placementtop titleExcept where otherwise noted, the blog posts on this site are licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) License by the author. > 保留部分权利。 /span> /p> p> 使用 a hrefhttps://halo.run target_blank relnoopener>Halo/a> 主题 a hrefhttps://github.com/airbozh/halo-theme-chirpy target_blank relnoopener >Chirpy/a > /p> /footer> /div> /div> /div> aside aria-labelScroll to Top> button idback-to-top typebutton classbtn btn-lg btn-box-shadow > i classfas fa-angle-up>/i> /button> /aside>/div>div idmask>/div>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]