YoVDO

Attacking and Defending Blockchains - From Horror Stories to Secure Wallets

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cryptocurrency Courses Risk Mitigation Courses Blockchain Security Courses Digital Wallets Courses

Course Description

Overview

Explore a comprehensive review of blockchain security failures and risk mitigation strategies in this Black Hat conference talk. Delve into various wallet types, including hot, cold, online, mobile, desktop, paper, and hardware wallets, and understand their strengths and vulnerabilities. Learn about typical setups for individuals and receive recommendations for secure practices. Examine the relationship between exchanges and wallets, and investigate the concept of "warm" wallets. Analyze notable blockchain bugs and attacks, such as the Bitcoin overflow, Ethereum reentrancy, Zerocoin multi-spend, Lisk account hijack, Parity wallet bug, IOTA's hash function issues, Bitgrail withdrawals, Batch Overflow, and Verge vulnerabilities. Gain insights into BIP32 tools and their implications for blockchain security.

Syllabus

Intro
What's a wallet
Hot vs. Cold
Different types of wallets
Online wallet
Online interfaces
Mobile wallet
Desktop wallet
Paper wallet
Hardware wallet: not perfect
Typical setup for individuals
Recommendations
Exchanges and wallets
Exchanges and hardware wallets?
"Warm" wallets
Are blockchains secure?
Blockchain bugs?
Multiple targets
Attackers goals
Bitcoin overflow (CVE-2010-5139)
Ethereum reentrancy (a.k.a. DAO bug)
What happened? (simplified)
Lessons and solutions
3. Zerocoin multi-spend
Lisk account hijack
Parity wallet bug
IOTA's hash function
Bitgrail withdrawals
Batch Overflow
Verge
BIP32 tools (pt. 1)


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube