InfoSecTube
1.7K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
🥪 What is a Sandwich Attack in Crypto?
A Sandwich Attack is a sneaky and sophisticated DeFi exploit where an attacker manipulates the price of a token by sandwiching a victim’s transaction between two of their own.

🔍 How it works:

👀 Monitor the mempool for a large pending trade (usually a swap).

🥪 Front-run: The attacker submits a buy order right before the victim’s trade to push the price up.

🍞 Victim’s transaction goes through at a worse price.

💸 Back-run: The attacker then sells the tokens at the inflated price caused by the victim’s trade.

Result?
🚨 The attacker profits from the price slippage the victim unknowingly caused, while the victim loses value on their trade.

⚠️ Common in DEXs (like Uniswap) where transaction ordering can be manipulated due to the transparent mempool and lack of price protection.

💡 Defense Tips:

– Use slippage limits
– Trade on private or protected DEXs (e.g., via Flashbots or MEV-protected networks)
– Batch or randomize transactions

#CryptoSecurity #DeFi #SandwichAttack #BlockchainHacks #MEV #Ethereum #InfoSec #InfoSecTube #Web3Security

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
🔗 On-Chain vs Off-Chain Execution in Smart Contracts

💡 On-Chain Execution:


Everything happens directly on the blockchain.

Smart contract code is executed by the network of nodes.

Pros: Transparent, secure, and decentralized.

Cons: Slower and costly due to gas fees.

🔒 Off-Chain Execution:

Some logic or data is handled outside the blockchain.

Results are then submitted to the chain for finalization.

Pros: Faster, cheaper, and more scalable.

Cons: Less transparent and can be centralized.

🔄 The Balance:
Use on-chain for security and trustless execution, and off-chain for speed and cost efficiency. Many smart contracts combine both for optimal performance.

#Blockchain #SmartContracts #OnChain #OffChain #Crypto #Decentralization


🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
📡 1. IMSI-catcher

IMSI = International Mobile Subscriber Identity — a unique number tied to your SIM card and mobile identity.

An IMSI-catcher is a fake base station that pretends to be a legitimate cell tower so that nearby phones connect to it.
Once a phone connects, the attacker can:

Request the IMSI before encryption starts — revealing the device’s real identity (often used to track people).

Downgrade the connection to an older, insecure network (like 2G).

Potentially intercept calls, SMS, or metadata if the attack is advanced.

📍 Real-world example: Law enforcement and attackers have used IMSI-catchers (like Stingrays) to track phones in protests or monitor specific targets.

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
📶 2. Downgrade Attack

A downgrade attack happens when an attacker forces your phone to fall back to an older, weaker network protocol — like pushing it from 4G/5G down to 2G — because older generations have little or no encryption.

How it works:

The fake base station advertises only 2G support (or blocks higher ones).

The phone, trying to stay connected, switches to 2G.

The attacker now has access to a less secure connection and can more easily intercept traffic or request the IMSI.

📍 Why it’s dangerous: Even if your phone is designed for secure 4G/5G communication, a downgrade lets attackers exploit the weak spots in legacy protocols.


🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
🔓 3. Insecure Attach

When a phone connects to a network, it goes through an attach procedure — essentially a handshake to authenticate and establish encryption.

An insecure attach attack manipulates this process so that the connection happens without proper encryption or integrity checks.

Attackers might:

Advertise that encryption isn’t required (e.g., use cipher algorithm A5/0 — which is “no encryption”).

Exploit phones that accept insecure parameters without warning the user.

Intercept communications or inject malicious traffic before the network applies proper security.

📍 Why it matters: If the attach step is insecure, even strong networks become vulnerable because the phone may trust a rogue base station.

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
🔴 تزریق کد در زمان اجرا با Runtime Patching

🔸درواقع Runtime Patching یعنی تغییر رفتار برنامه‌ها بدون دسترسی به سورس کد و قبل از اجرای کامل.

🔹در سطح حرفه‌ای، این کار با hook کردن توابع، دستکاری import table و حتی overwrite کردن کد ماشین در حافظه انجام می‌شود. ابزارهایی مثل Frida و DynInst برای تحلیل و inject کدهای سفارشی کاربرد دارند. این تکنیک می‌تواند APIهای امنیتی را دور بزند یا داده‌ها را قبل از رمزنگاری capture کند. در مقابل، سیستم‌ها با Integrity Checks و DEP/NX سعی می‌کنند از آسیب جلوگیری کنند.

⭕️در نتیجه Runtime Patching یک سطح وحشتناک از کنترل برنامه‌هاست که بدون آن، تحلیل عمیق و نفوذ حرفه‌ای ممکن نیست.

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
InfoSecTube pinned «🎯 دوره تست و نفوذ پیشرفته وب (سناریو محور) – قسمت اول لینک 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us»
InfoSecTube pinned «🎯 دوره تست و نفوذ پیشرفته وب (سناریو محور) – قسمت سوم لینک 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us YouTube»
InfoSecTube pinned «🎯 دوره تست و نفوذ پیشرفته وب (سناریو محور) – قسمت هفتم لینک 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us»
🔐 What is Oblivious RAM (ORAM)?
🧠💾 ORAM is a cutting-edge cryptographic technique designed to hide memory access patterns. Even if an attacker is watching every memory read/write, ORAM makes it look like random noise—no clue what data is actually being touched!

📦 How?
It works by shuffling and re-encrypting data every time it’s accessed. This makes all memory operations indistinguishable to an outside observer. Think of it as the digital equivalent of mixing cards after every draw. 🃏🔁

⚠️ The Catch?
This privacy comes at a cost: ORAM introduces significant performance overhead, which makes it impractical for high-speed or real-time systems… for now. ⏱️🚫

🔍 Stay tuned as researchers continue pushing the limits to make privacy-preserving memory more usable!

#CyberSecurity #Privacy #ORAM #ObliviousRAM #MemorySecurity #InfoSec #Cryptography #InfoSecTube

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
☠️Someone has recreated all of Epstein’s emails as a fully functional Gmail-style inbox — it even has a search feature! 👀📧
It’s honestly impressive how close it feels to the real Gmail interface and how easy it is to browse through the messages.
Link

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1