Advanced Smart Contract Hacking

Advanced Smart Contract Hacking

RSA Conference via YouTube Direct link

oyente and Manticore

7 of 27

7 of 27

oyente and Manticore

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Advanced Smart Contract Hacking

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Meow-putting that computing power to use?
  3. 3 Millions of reasons to hack smart contracts
  4. 4 Problem isn't going away
  5. 5 Solidity
  6. 6 Dev tools
  7. 7 oyente and Manticore
  8. 8 MAIAN
  9. 9 Methodology
  10. 10 Leave off the first "re-" for savings
  11. 11 Writing a contract to attack a contract
  12. 12 Reentrancy (and irony) in the dao code
  13. 13 Default public - Parity wallet hack
  14. 14 execute
  15. 15 Parity multisig wallet hack 2
  16. 16 Parity 2 transactions
  17. 17 Not going with the (over)flow
  18. 18 Unchecked send in king of the ether
  19. 19 Gas limits
  20. 20 Withdraw don't send
  21. 21 Transaction-ordering dependence
  22. 22 Call-stack depth limit
  23. 23 Variable or function ambiguity
  24. 24 Odds and ends
  25. 25 Prepping for the future...
  26. 26 Real-time blockchain protection
  27. 27 Get involved

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.