Windows 10 will reach EOS (end of support) on October 14, 2025. For more information, see this article.

Prohledat stránky podpory

Vyhněte se podvodům. Za účelem poskytnutí podpory vás nikdy nežádáme, abyste zavolali nebo poslali SMS na nějaké telefonní číslo nebo abyste sdělili své osobní údaje. Jakékoliv podezřelé chování nám prosím nahlaste pomocí odkazu „Nahlásit zneužití“.

Zjistit více

blob:

  • 2 odpovědi
  • 0 má tento problém
  • 70 zobrazení
  • Poslední odpověď od J S

more options

Hello,

I process phishing URL's,

I have recently come across URL's that make use of a BLOB: syntax on the URL:

blob:https://bolig.botik.dk/16c8c011-0fa5-4ba0-a10f-ed7675055cc6

You can see an example of the Phishing URL in this PhishTank entry:

https://phishtank.com/phish_detail.php?phish_id=9118779

That URL then re-directs to the above "BLOB" URL.

My understanding is that it is "locally" generating the phishing website, similar to an old fashioned about: syntax, however it's not clear what the significance of bolig.botik.dk URL is - loading that URL without the BLOB: prefix causes an error

Can someone explain:

1) What is the BLOB: syntax, and 2) what would be reported to have the phishing URL removed in the above example?

Hello, I process phishing URL's, I have recently come across URL's that make use of a BLOB: syntax on the URL: blob:https://bolig.botik.dk/16c8c011-0fa5-4ba0-a10f-ed7675055cc6 You can see an example of the Phishing URL in this PhishTank entry: https://phishtank.com/phish_detail.php?phish_id=9118779 That URL then re-directs to the above "BLOB" URL. My understanding is that it is "locally" generating the phishing website, similar to an old fashioned about: syntax, however it's not clear what the significance of bolig.botik.dk URL is - loading that URL without the BLOB: prefix causes an error Can someone explain: 1) What is the BLOB: syntax, and 2) what would be reported to have the phishing URL removed in the above example?

Zvolené řešení

Web and JavaScript developers use Blobs for various purposes, but a common one is to generate a downloadable file within the web page without having to retrieve anything further from the server. I use this method to create HTML files, PNG files, and JPEG files. I sometimes see PDF files open in a new tab with a blob: URL.

The "object" URL generated in this process is specific to the generated file and doesn't exist on the server. So I don't think you can report the blob itself as a phishing file, you would need to report the page that generates the blob as a phishing page.

Přečíst dotaz v kontextu 👍 1

Všechny odpovědi (2)

more options

Zvolené řešení

Web and JavaScript developers use Blobs for various purposes, but a common one is to generate a downloadable file within the web page without having to retrieve anything further from the server. I use this method to create HTML files, PNG files, and JPEG files. I sometimes see PDF files open in a new tab with a blob: URL.

The "object" URL generated in this process is specific to the generated file and doesn't exist on the server. So I don't think you can report the blob itself as a phishing file, you would need to report the page that generates the blob as a phishing page.

Pomohla vám tato odpověď?

more options

Wonderful! If only all technical support was as helpful as you. And you're a volunteer? Some company could be paying you mega dollars for answers only a fraction as useful. Thanks.

Pomohla vám tato odpověď?

Položit dotaz

Pro přidání odpovědi se musíte přihlásit ke svému účtu. Pokud dosud nemáte účet, položte nový dotaz.