EthSecurity
5.23K subscribers
113 photos
20 files
772 links
Download Telegram
One more. Don't give up ๐Ÿ™๐Ÿป
https://www.ctfprotocol.com/tracks/eko2022
Become a Certified Metasploit Expert (CME)!
Buy the Metasploit Test Prep Videos and Receive A Voucher to Take The Test for FREE!
#metasploit #cybersecurity #cyberwarrior



white-hat-hacker.com/certified-metaโ€ฆ
hackers-arise.com/blank-1
D-Squared@discord: Hey folks - Hereโ€™s another video on this ZK learning journey. This time around weโ€™re focusing on common ZK vulnerabilities found within Circom and similar ZK domain specific languages.

Hereโ€™s the video walkthrough - https://youtu.be/1RQSwj8h8rM

Additionally, I send out a weekly email newsletter relating to crypto security if youโ€™re interested, subscribe here - https://eepurl.com/gLhH9r

P.S. Also, if there are other communities you think would be interested in explainer series like this, feel free to share.
Forwarded from EthSecurity
The Interest Protocol token sale contract has a bug that allows admins to take all IPT tokens before purchasers can claim them.

The admin withdraw() method does not check if it has already been called - withdraw() can be called repeatedly to drain the entire contract of IPT.
Some Users were attacked recently, scammers used a tiny camera, mended in a sunglasses (they were able to see the seed phrase over the shoulder).
recover Platypus stolen funds.

Date: 17/02/23
Blockchain: ETH

Problem: Exploiter contract is missing withdraw function, access control.

The Platypus hack is a very interesting event in the DeFi history, first of all that is because the hacker was found after some on-chain investigation because of using ENS. The second reason is because a part of funds were frozen on the attacker contract because of the mistake during the exploit.

The Platypus:
1) Updated contracts.
2) Called flash loan callback function on attacker contract, which approves hacker funds on the contract to the Platypus.
3) Transfer funds from the hacker.

Discoverer: BlockSec.
Recovered: 2.4 M $
link
๐Ÿ”ฅ1
Guys do you want to be more engage with smart contract security in private group? If yes leave a comment
๐Ÿง Multisig exploiter is laundering fund through eXch.

eXch is a non-KYC exchange
Bridge risk framework


๐Ÿ”ดBridge types:

๐Ÿ“Native bridges:
user move asset from base chain to other chain

๐Ÿ“General bridges: liquidity providers

๐Ÿ”ดBridge participants:

๐Ÿ“Bridge users
๐Ÿ“Passive liquidity provider
๐Ÿ“Message Relayer

๐Ÿ”ดAttack surface Area
๐Ÿ“smart contract vulnerabilities
๐Ÿ“Compromised signer keys
๐Ÿ“Reorgs
๐Ÿ“Malicious RPCs or node vulnerabilities
๐Ÿ“Challenge windows/censorship attacks