22 Vulnerabilities I Use To Find Criticals FAST!

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ส.ค. 2024
  • Are you a security researcher looking to join a world-class team? Apply to open positions at Guardian here: guardianaudits.notion.site/Gu...
    Want to become an expert security researcher in a matter of months?
    Get the guide to becoming a senior auditor in 6 months here: www.intogateway.com/guide
    Looking for a Smart Contract Audit? Apply to work with the Guardian team on our website: guardianaudits.com
    Join our community aimed at building and sharing a wealth of blockchain and solidity knowledge to help developers/auditors of all levels transform the web3 ecosystem.
    lab.guardianaudits.com/
    Videos Mentioned:
    9:31 - Weird ERC20 tokens - • 12 ERC20 Edge Cases | ...
    16:55 - Complete guide to reentrancy - • The Ultimate Guide To ...
    21:31 - 3 Red flags of inflation attacks - • Vault Exploit Mastercl...
    25:22 - 4 External call attack vectors - • The 4 External Call At...
    28:23 - 5 Upgradability patterns • Smart Contract Upgrade...
    29:50 - Ethereum signature introduction - • Ethereum Cryptography ...
    29:50 - Ethereum Signature Malleability - • Web3 Exploits | Signat...
    Timestamps:
    00:00 - Intro
    02:51 - #1 Frontrunning & backrunning
    04:39 - #2 Using very small amounts
    05:27 - #3 Passing zero as an input
    06:39 - #4 Using contracts that cannot accept ether
    07:35 - #5 Gas griefing with external calls
    08:34 - #6 Weird ERC20 tokens
    09:38 - #7 Price manipulation
    10:51 - #8 Blacklisted ERC20 addresses
    13:14 - #9 Overflow/underflow
    14:08 - #10 Block re-orgs
    16:35 - #11 Reentrancy
    17:06 - #12 Sybil attacks on incentives
    18:27 - #13 Flash loans
    19:41 - #14 Accepting data from any address
    20:52 - #15 Inflating internal accounting by sending tokens to the contract
    22:06 - #16 Forced precision loss when it really matters
    24:00 - #17 Addresses that might be empty at one point, yet house contract code at another
    25:10 - #18 Reverting
    25:41 - #19 Unexpected addresses
    27:20 - #20 Selector clashing
    28:42 - #21 Signatures
    30:05 - #22 Hash collision
    32:08 - Join the Solidity lab
    32:47 - My 6 step guide to becoming a senior security researcher

ความคิดเห็น • 8

  • @sjsjsjjsjsjsskksksksks
    @sjsjsjjsjsjsskksksksks 2 หลายเดือนก่อน

    Thank you

  • @daveinvest1914
    @daveinvest1914 6 หลายเดือนก่อน

    Taking the cyfrin course and super excited to find you, i hope this journey will be great.

  • @pythusiast4701
    @pythusiast4701 6 หลายเดือนก่อน

    Luv this guy

  • @gk_eth
    @gk_eth 6 หลายเดือนก่อน

    Hi owen, i didn't find any dates for scheduling call..Is the cohort already begun? I dmed u on twitter also....

  • @__CJ.__
    @__CJ.__ 6 หลายเดือนก่อน

  • @code7631
    @code7631 6 หลายเดือนก่อน

    💙