Главная
Study mode:
on
1
Intro
2
Trail of Bits Cyber security research company - High-end security research with a real- world attacker mentality to reduce risk and fortify code. Security Engineering
3
Prompt
4
Ethereum Implementation
5
Accounts and Transactions and Blocks
6
EVM: Ethereum Virtual Machine
7
ABI and Address Spaces
8
Sample Contract Creation
9
Sample Contract Death
10
Sample Contract Usage (3)
11
Solidity Behaviors and Issues
12
Uninitialized Variables
13
Not So Smart Contracts
14
Ethersplay Binary Ninja Plugin
15
IDA-EVM IDA Pro Module
16
Mythril
17
Manticore
18
Storage Requirements Check stackexchange first.
19
Geth and Parity
20
Geth Running Options
21
Client Operation Suggestions
22
Answering Questions
23
Tracing
24
Who? What? When?
25
Blockchain Data
26
The Block in Blockchain
27
web3.js and web3.py web3.js is official client library
28
Finding Contracts
29
Geth Experience Geth crashing with synemode fast-consistently - new install
30
Parity Experience
31
Hybrid Approach
32
Empty Code Results
33
First Contract Creation Block 46402 (2015-08-07)
34
First Contract "Creation" (With Enough Gas)
35
First Contract Creation (With Code)
36
Top Duplicates (3)
37
Massive selfdestruct (2)
38
Criteria
39
Creator != selfdestruct destination
40
10,000 ETH!
41
Creator != selfdestruct transaction originator
42
300ETH selfdestruct
43
Etherwow
44
Becoming Mortal
45
Conclusion
Description:
Explore Ethereum smart contract vulnerabilities and attack analysis in this 39-minute Black Hat conference talk. Dive into the world of blockchain security as Jay Little introduces Ethereum smart contracts, demonstrates reverse engineering techniques for binary-only contracts, and highlights common vulnerability classes. Learn to investigate attacks on contracts using new tools that re-process blockchain ledger data, recreate contracts with state, and analyze suspect transactions through traces and heuristics. Gain insights into Ethereum implementation, EVM (Ethereum Virtual Machine), Solidity behaviors, and issues like uninitialized variables. Discover tools such as Ethersplay, IDA-EVM, Mythril, and Manticore for smart contract analysis. Explore blockchain data, web3.js and web3.py libraries, and techniques for finding contracts. Examine real-world examples of contract creations, deaths, and massive self-destructs. Enhance your understanding of blockchain security and smart contract vulnerabilities to better protect and analyze Ethereum-based systems. Read more

Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths

Black Hat
Add to list
00:00
-00:28