Главная
Study mode:
on
1
Intro
2
Meow-putting that computing power to use?
3
Millions of reasons to hack smart contracts
4
Problem isn't going away
5
Solidity
6
Dev tools
7
oyente and Manticore
8
MAIAN
9
Methodology
10
Leave off the first "re-" for savings
11
Writing a contract to attack a contract
12
Reentrancy (and irony) in the dao code
13
Default public - Parity wallet hack
14
execute
15
Parity multisig wallet hack 2
16
Parity 2 transactions
17
Not going with the (over)flow
18
Unchecked send in king of the ether
19
Gas limits
20
Withdraw don't send
21
Transaction-ordering dependence
22
Call-stack depth limit
23
Variable or function ambiguity
24
Odds and ends
25
Prepping for the future...
26
Real-time blockchain protection
27
Get involved
Description:
Dive into advanced Solidity hacking techniques in this 35-minute RSA Conference talk. Explore bleeding-edge exploits and learn the crucial skill of writing contracts to hack other contracts. Gain insights into the persistent security challenges in blockchain technology and understand the potential dangers of new tool advancements. Examine real-world examples like the DAO hack and Parity wallet vulnerabilities. Discover methodologies for identifying and exploiting smart contract weaknesses, including reentrancy attacks, public visibility issues, and overflow vulnerabilities. Learn about gas limits, transaction-ordering dependence, and call-stack depth limitations. Prepare for future blockchain security challenges and explore real-time protection strategies. Suitable for those with blockchain and Solidity basics, this talk equips you with advanced knowledge to enhance your smart contract hacking skills.

Advanced Smart Contract Hacking

RSA Conference
Add to list