Attacking and Defending Blockchains - From Horror Stories to Secure Wallets
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive review of blockchain security failures and risk mitigation strategies in this Black Hat conference talk. Delve into various wallet types, including hot, cold, online, mobile, desktop, paper, and hardware wallets, and understand their strengths and vulnerabilities. Learn about typical setups for individuals and receive recommendations for secure practices. Examine the relationship between exchanges and wallets, and investigate the concept of "warm" wallets. Analyze notable blockchain bugs and attacks, such as the Bitcoin overflow, Ethereum reentrancy, Zerocoin multi-spend, Lisk account hijack, Parity wallet bug, IOTA's hash function issues, Bitgrail withdrawals, Batch Overflow, and Verge vulnerabilities. Gain insights into BIP32 tools and their implications for blockchain security.
Syllabus
Intro
What's a wallet
Hot vs. Cold
Different types of wallets
Online wallet
Online interfaces
Mobile wallet
Desktop wallet
Paper wallet
Hardware wallet: not perfect
Typical setup for individuals
Recommendations
Exchanges and wallets
Exchanges and hardware wallets?
"Warm" wallets
Are blockchains secure?
Blockchain bugs?
Multiple targets
Attackers goals
Bitcoin overflow (CVE-2010-5139)
Ethereum reentrancy (a.k.a. DAO bug)
What happened? (simplified)
Lessons and solutions
3. Zerocoin multi-spend
Lisk account hijack
Parity wallet bug
IOTA's hash function
Bitgrail withdrawals
Batch Overflow
Verge
BIP32 tools (pt. 1)
Taught by
Black Hat
Related Courses
The Future of Payment TechnologiesUniversity of Michigan via Coursera Fintech: Blockchain for Business and Finance
The University of Texas at Austin via edX The Bitcoin Basics
Udemy Cryptocurrency Investment Fundamentals | Buy, Sell & Store
Udemy Cryptocurrency Mastery: The Complete Crypto Trading Course
Udemy