区块链和智能合约安全、黑客攻击和审计
Blockchain And Smart Contract Security, Hacking and Audit
- 1 - Course Overview
- 2 - Why Security matters in Blockchain and smart contract space
- 3 - Smart contract Auditor Career path and salaries
- 4 - Understandig Proof Of Work Concept
- 5 - Hash Rate and 51 Attack
- 6 - 51 Attack Explained
- 7 - Nakamoto Coefficient and 51 Attack
- 8 - How 51 Attack can be reduced to less than 51 Attack
- 9 - 49 Attack
- 10 - Understanding Traditional Denial of Service Attack
- 11 - Denial of Service Attack on Blockchain Transaction flooding
- 12 - Distributed Denial of Service DDOS Attack
- 13 - Denial of Service attack on a Bank Smart Contract Theory explained
- 14 - Denial of service attack on Bank Smart contract Practical Example Hacker
- 15 - Denial of service Attack on Bank Contract Practical Example Victim contract
- 16 - Reentrancy Attack Theory Explained
- 17 - Victim contract programming part 1
- 18 - Victim contract programming part 2
- 19 - Creating Hacker Smart Contract
- 20 - Launching the attack on Victim contract
- 21 - Mitigating the Attack
- 22 - Understanding the different type RugPull Attacks
- 23 - RugPull attacks on smart Contract
- 24 - Front Running Attacks
- 25 - Signature replay Attacks
- 26 - Liquidity pools AMM DEX
- 27 - Flashloan Concept
- 28 - Audit process phase one Business requirement Visual tools Manual review
- 29 - Audit process phase Static dynamic analysis formal verification
- 30 - Vulnerabilities classifications
- 31 - Understanding system and business requirement for the Wallet Smart contract
- 32 - Basic Manual review and Structure of the Code
- 33 - Deep Manual review Critical vulnerabilities Found
- 34 - Deep manual review Low and informational vulnerabilities found
- 35 - Mitigation Of The Critical Vulnerabilities
- 36 - Presentation of the Automated tool for reviewing security issue
- 37 - Finding more Bugs with the Formal verification tool