hexbyteblog.hexbyte.in·a day agoEthernaut Series - 04 (Telephone)Concept The main concept being taught in this level is the difference between the use of tx.origin and msg.sender. Let’s try and understand this using the following image: Observations: If Bob calls contract A, the contract will see the value of tx...DiscussEthernautWeb3
hexbyteblog.hexbyte.in·Oct 5, 2024Ethernaut Series - 02 (Fal1out)We are asked to claim ownership of a contract whose code is provided as such: // SPDX-License-Identifier: MIT pragma solidity ^0.6.0; import "openzeppelin-contracts-06/math/SafeMath.sol"; contract Fallout { using SafeMath for uint256; mapp...DiscussEthernautWeb3 Security
hexbyteblog.hexbyte.in·Oct 5, 2024Ethernaut Series - 01The challenge asks us to claim the ownership of the contract and reduce its balance to 0. In this case, we have been provided with the contract itself. // SPDX-License-Identifier: MIT pragma solidity ^0.8.0; contract Fallback { mapping(address =...DiscussEthernautEthernaut
Justin & MichaelPronotyourcryptopodcast.com·Oct 4, 2024A Bridge too FarIn October of 2022 an attacker made off with 600M (!!!) by finding a bug in a bridge contract connecting two of Binance’s blockchains. How did it happen? It’s time to blow the dust off your third year Data Structures textbook. Listen to us stumble ou...DiscussWeb3 Security
Mansoor Buttmansoor-eth.hashnode.dev·Oct 3, 2024Mastering EIP-712: A Practical Implementation GuideMessage signing in Ethereum has a surprisingly complicated history. Best practices and economic realities have evolved considerably over the years. In Ethereum's earliest days, you could get away with storing any and all activity onchain without brea...DiscussDeep Dive into Smart ContractsSolidity
Siddharth Pateljarvisdev.hashnode.dev·Sep 24, 2024Challenge 11: Backdoor, Damn vulnerable defi V4 lazy solutions seriesWhy Lazy? I’ll strongly assume that you’ve gone through challenge once or more time and you’ve some understandings of the challenge contracts flows. So, I’ll potentially will go towards solution directly. Problem statement: There’s Safe wallets regi...DiscussDamn vulnerable defi V4 solutionsdamn vulnerable defi
Siddharth Pateljarvisdev.hashnode.dev·Sep 19, 2024Challenge 10: Free rider, Damn vulnerable defi V4 lazy solutions seriesWhy Lazy? I’ll strongly assume that you’ve gone through challenge once or more time and you’ve some understandings of the challenge contracts flows. So, I’ll potentially will go towards solution directly. Problem statement: We’re given 1 NFT market ...DiscussDamn vulnerable defi V4 solutionsdamn vulnerable defi
Harsh TandelforBreachForcebreachforce.net·Sep 11, 2024Crypto Exchange Hacking Basics: Security Vulnerabilities, Testing, and MitigationCryptocurrency exchanges are frequent targets for hackers due to the high value of the digital assets they hold. Understanding common security vulnerabilities, knowing how to test them as an ethical hacker, and applying effective mitigation strategie...Discusscrypto exchange hacks
Magda Jankowskamagdajankowska.hashnode.dev·Aug 30, 2024🛡️ Mastering Ethereum Security: A Step-by-Step Guide to Documenting the SecureBank Contract for Production-Ready Solidity Code📚 Introduction In the world of Ethereum smart contracts, security is paramount. Even a minor vulnerability can lead to catastrophic losses. In this guide, we’ll walk you through the process of building a secure smart contract by starting with a simp...DiscussBlockchain
Magda Jankowskamagdajankowska.hashnode.dev·Aug 30, 2024🔐 Master Solidity: Must-Know Interview Questions for Ethereum Developers 🛠️ (Theory Only)As blockchain technology evolves, the demand for skilled Ethereum developers, particularly those proficient in Solidity, continues to rise. Whether you’re a developer preparing for an interview or a recruiter evaluating candidates, having a comprehen...DiscussBlockchain