YoVDO

Blockchain and Smart Contract Attack Vectors

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Blockchain Development Courses Blockchain Security Courses Smart Contracts Courses Vulnerability Analysis Courses

Course Description

Overview

Explore known vulnerabilities in smart contracts and blockchain networks in this HITB GSEC 2018 conference talk. Delve into specific issues that have occurred on the Ethereum blockchain, applicable to any platform using the Ethereum Virtual Machine. Learn about best practices to mitigate these vulnerabilities. Examine potential attack vectors on the Bitcoin network and similar peer-to-peer validation systems. Cover topics including integer underflow/overflow, timestamp dependence, denial of service, reentrancy attacks, Parity Wallet attacks, short address attacks, honeypots, 51% attacks, long-range attacks, TEE-based consensus, partitioning attacks, and delay attacks. Gain insights from cybersecurity expert Jorden Seet, who shares his experience in penetration testing, smart contract auditing, and blockchain development.

Syllabus

Intro
Blockchain is a special kind of Database
Blockchain is a Distributed Ledger
What are Smart Contracts?
Why do Smart Contracts need Blockchain?
Integer Underflow/Overflow
Timestamp Dependence
Denial of Service
Reentrancy Attack
Parity Wallet attacks
Short Address Attack
Honeypots
51% Attack (Proof of Work)
Long Range Attack (Proof of Stake)
TEE-based consensus
Partitioning Attack
Delay Attack
Questions?


Taught by

Hack In The Box Security Conference

Related Courses

Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera
Complete Ethical Hacking Bootcamp
Udemy
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Performing Threat Modeling with the PASTA Methodology
Pluralsight