Главная
Study mode:
on
1
Intro
2
when transactions aren't enough
3
meow-putting that computing to use
4
smart contracts
5
billions, or just millions of reasons
6
problem isn't going away
7
Solidity
8
dev tools
9
oyente and Manticore
10
basic methodology
11
leave off the first "re-" for savings
12
reentrancy (and irony) in the dao code
13
default public - Parity wallet hack
14
init Wallet
15
execute
16
Parity multisig wallet hack 2
17
Parity 2 transactions
18
unchecked send in king of the ether
19
gas limits
20
withdrawn not sent
21
encryption
22
transaction-ordering dependence
23
call-stack depth limit
24
variable or function ambiguity
25
odds and ends
26
things might be getting better?
27
keep in touch
Description:
Explore a comprehensive methodology for hacking smart contracts in this NolaCon 2018 conference talk. Delve into the world of Solidity, development tools, and security vulnerabilities in blockchain technology. Learn about reentrancy attacks, public visibility issues, and the infamous DAO and Parity wallet hacks. Examine common pitfalls such as unchecked sends, gas limits, and transaction-ordering dependencies. Gain insights into encryption challenges, call-stack depth limits, and variable ambiguity. Discover potential improvements in smart contract security and stay informed about the latest developments in this rapidly evolving field.

Hacking Smart Contracts - A Methodology

Add to list