这篇文章,我将告诉你我是如何溯源加密货币相关安全事件的,还有好用的工具列表和优秀的案例,欢迎大家收藏备用,有想交流的也可以留言给我。
I - 溯源流程
-
在区块链相关事件调查中,一般我会先使用工具进行收集和常规分析,例如tenderly.co、ethtective.com、breadcrumbs.app、9000.hal.xyz、dune.xyz、nansen.ai、bloxy.info、github.com/naddison36/tx2uml,github.com/ApeWorX/evm-trace 。
-
推荐工具(https://github.com/OffcierCia/On-Chain-Investigations-Tools-List)和站点(https://walletexplorer.com/)中的所有工具,几乎所有工具都有单独的知识库和文档、YouTube、blog和一个报告库,方便又好用。
-
我还看到了一种相当有噱头的方法,以3D和VR方式可视化区块链交易:(ethresear.ch/t/open-source-3d-and-vr-blockchain-visualizations/3297/2)
-
其次,我尝试设置地址/集群(https://www.impersonator.xyz/),通过Chainalysis或amlbot.com类似的厂商都去跑一个安全风险测试报告。查看更多类似的工具(https://cryptosorted.info/blockchain-analysis-and-crypto-investigation-tools/)。
-
作为第三步,我通过impersonator、unrekt.net或revoke.cash检查器和其他工具检查合约和钱包地址。例如,tutela.xyz、github.com/TutelaLabs工具可以帮你锁定TornadoCash背后的资金
-
在调查事件时,进行经典的OSINT(https://twitter.com/hashtag/OSINT)溯源调查也很重要,例如,如果我们正在溯源调查泄露事件,就有必要尝试找找聊天消息记录、涉及员工询问和找其它可用的信息侧。比如有时这会产生数据:https://web.archive.org/web/20220820023651/https://www.1337pwn.com/how-to-investigate-cryptocurrency-crimes-using-blockchain-explorers-and-osint-tools/
-
关注些优质的区块链OSINT专家,可以发现很多小技巧和思路,比如:@w1nt3r_eth
II - 链上溯源调查工具清单
-
依旧优先推荐这里工具列表(https://github.com/OffcierCia/On-Chain-Investigations-Tools-List)和站点(https://walletexplorer.com/)中的所有工具
VR链上调查:
-
ethresear.ch/t/open-source-3d-and-vr-blockchain-visualizations/3297/2
-
symphony.iohk.io
-
medium.com/coinmonks/visualizing-bitcoin-transactions-in-3d-and-virtual-reality-e3e28b3055df
-
www.lopp.net/bitcoin-information/visualizations.html
-
app.bubblemaps.io
ETH-USDT流向:
dune.com
未测试但有价值的列表:
https://sovs.notion.site/Block-Smart-Contract-Explorers-8dcaed059c844e3b8f9b67b8eb90174a
III - 如何调查链上黑客攻击
-
1 twitter.com/officer_cia/status/1591509308818493440
-
2 twitter.com/officer_cia/status/1591509312312156163
-
3 twitter.com/cryptoPothu/status/1536204331493363713
-
4 graph.org/How-one-can-deanonymize-Monero-to-a-certain-
degree-of-probability-11-19
值得关注:
-
由 ZachXBT列出https://mobile.twitter.com/i/lists/1476992161409376269
-
阅读这篇关于成为链上侦探的文章https://anchainai.medium.com/defi-detectives-quickstart-guide-tools-for-the-crypto-sleuth-9c246d2ec23a
-
阅读Vice的这篇文章https://www.vice.com/en/article/xgd9zw/meet-the-blockchain-detectives-who-track-cryptos-hackers-and-scammers
-
关注MistTrack推https://twitter.com/MistTrack_io
-
链上分析技巧https://twitter.com/cryptoPothu/status/1536204331493363713
-
关注DEFIachttps://twitter.com/TheDEFIac
-
关注Onchainsnoop推https://mobile.twitter.com/Onchainsnoop
-
关注 PeckShieldAlert推https://mobile.twitter.com/PeckShieldAlert
-
关注 BlockSecTeam推https://mobile.twitter.com/BlockSecTeam
-
关注 lookonchain推https://mobile.twitter.com/lookonchain
-
ZachXBT的调查技巧https://zachxbt.mirror.xyz/
-
来自CountZero的技巧https://twitter.com/countze0/status/1541805338625818624
-
0xFooBar推https://twitter.com/0xfoobar
-
CryptoShine推https://twitter.com/CryptoShine
-
关注合约漏洞达人immunefihttps://immunefi.medium.com/
-
rekt.news站点https://rekt.news/
-
hack数据库https://telegra.ph/Retrospective-hacks-in-web3-10-24
-
关注officer_cia的推https://twitter.com/officer_cia
IV - 案例:
看看这优质的链上OSINT取证调查案例,实际上是使用 breadcrumbs.app制作的报告,效果很好 :
This thread will show you how you can catch web3 hackers/scammers using OSINT techniques. I will use address 0x8c7934611b6AD70FBEa13A1593dE167a4689b9A9 as an example. According to @zachxbt, hackers had stolen 91 NFTs. pic.twitter.com/DMR8hKpEos
— Count Ze0 (@CountZe0) June 28, 2022
“Kollegah” is using picrelated as their TG profile picture. So, there is a group of phishing addresses with the strong financial connections sending money to the guy spamming Discord and promoting NFTs. Seems suspicious to me. pic.twitter.com/ATnOHZjKvx
— Count Ze0 (@CountZe0) June 28, 2022
建议实操下链上溯源调查的步骤(https://www.breadcrumbs.app/reports/2101),了解它们是如何完成的。
看看下面的方案报告,并再次阅读这个事件,但要遵循其链上本身故事情节
https://www.breadcrumbs.app/reports/2101
也看看这个很棒的链上溯源案例
https://officercia.mirror.xyz/bekcfdWBwPh4FIzYNKfhaaorjYB90JbNRUb2oiSjiJI
V - 更多的tips
-
etherscan.io
-
blockchair.com/ru
-
tokenview.com
-
www.ethtective.com
-
breadcrumbs.app
-
chainabuse.com
-
cryptoscamdb.org
-
graphsense.info + github.com/graphsense
-
MaltegoCE+maltego.com/transform-hub/tatum-blockchain-explorer
-
cryptoblacklist.io/en/ethereum-blacklist
-
explorer.crystalblockchain.com (所有者检查)
-
oxt.me (注册后,所有者检查)
-
blockpath.com
-
Maltego CE + Blockchain.info
google搜索技巧:
-
eth地址 -block
-
site:etherscan.io ETH_address
-
site:https://docs.google.com/spreadsheets Bounty intext:”@gmail.com”
-
BTC地址 -block
-
site:bitcointalk.org BTC_address
-
site:https://docs.google.com/spreadsheets Bounty intext:”@gmail.com”
-
https://bitrankverified.com/
如何成为一名OSINT专家:
https://officercia.mirror.xyz/5KSkJOTgMtvgC36v1GqZ987N-_Oj_zwvGatOk0A47Ws
余弦的区块链黑暗森林自救手册:
https://github.com/slowmist/Blockchain-dark-forest-selfguard-handbook/blob/main/README_CN.md
顺便贴一个警告:真实网络溯源调查是如何弄错的:
https://www.bbc.co.uk/news/technology-22214511
原文始发于微信公众号(军机故阁):OSINT--加密货币溯源方法
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论