Blockchain And Smart Contract Security, Hacking & Audit
Published 11/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.82 GB | Duration: 5h 46m
Published 11/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.82 GB | Duration: 5h 46m
Learn how to identify vulnerabilities on Blockchain & mitigate them , Hack Smart Contracts , Perform an Audit Review…
What you'll learn
Understand Network and Consensus and Smart Contract vulnerabilities
Understand smart contract attacks Vector in depth Theory with Practical implementation
Identify Smart contract vulnerabilities in a given Smart contract
Learn how to Hack Smart contracts with Practical implementation
Understand the different techniques used to conduct a solid Smart contract Audit review
Perform a full Smart Contract Security Audit review
Manipulate necessary tools to help you perform an Audit
categorize vulnerabilities and write an Audit report
Requirements
Have a Basic understanding of how Blockchain and smart contract work
Basic Solidity programing language knowledge practical implementation not mandatory
Security mindset
Passion and dedication to learn new Tech trend
Description
One of the most important aspect in Blockchain space is security. During the past years have seen Decentralize application , as well as Blockchain protocol that got hacked just because of some vulnerabilities lying in their Systems (Smart Contract). Repots have stated the total amount of funds stolen or hacked in Blockchain protocol including DeFi (Decentralized Finance ) in 2022 is over 2,7Billoions dollars . Since we know the TVL (total value lock) from Blockchains ( Ethereum , Binance , Solana , Polkadot , Cardarno etc..) exceed 50Billions dollars, we understand how important is security of Smart Contact. Blockchain security is also important as it helps boost adoption, improve the solutions running on Blockchain (Applications), secure investor's funds. Considering a career in Blockchain especially in security makes you stand out from the crowd. In this course we will go through : Network Consensus vulnerabilities and see how they operate. Smart contract vulnerabilities and attacks Theory + Practical Understand smart contract attacks Theory + Practical implementationIdentify Smart contract vulnerabilities in a given Smart contractLearn how to Hack smart contracts Theory + Practical implementationUnderstand the different tool for smart contract audit process Understand the different techniques used to conduct a solid Smart contract AuditPerform a full Smart Contract AuditWrite an Audit report
Overview
Section 1: Section 1 : Introduction to Smart contract security audit course
Lecture 1 Course Overview
Lecture 2 Why Security matters in Blockchain and smart contract space
Lecture 3 Smart contract Auditor Career path and salaries
Section 2: Section 2 : Consensus based Vulnerabilities Bitcoin Ethereum BnB Chain Polygon
Lecture 4 Understandig Proof Of Work Concept
Lecture 5 Hash Rate and 51% Attack
Lecture 6 51% Attack Explained
Lecture 7 Nakamoto Coefficient and 51% Attack
Lecture 8 How 51% Attack can be reduced to less than 51% Attack
Lecture 9 49% Attack
Section 3: Section 3 :Denial of Service attack Attack : Network and transaction Level
Lecture 10 Understanding Traditional Denial of Service Attack
Lecture 11 Denial of Service Attack on Blockchain : Transaction flooding
Lecture 12 Distributed Denial of Service DDOS Attack
Section 4: Section 4 : Smart Contract Attack Vector : Denial of Service
Lecture 13 Denial of Service attack on a Bank Smart Contract : Theory explained
Lecture 14 Denial of service attack on Bank Smart contract : Practical Example Hacker
Lecture 15 Denial of service Attack on Bank Contract : Practical Example Victim contract
Section 5: Section 5 : Smart Contract Attack vector Reentrancy Attack
Lecture 16 Reentrancy Attack : Theory Explained
Lecture 17 Victim contract programming part 1
Lecture 18 Victim contract programming part 2
Lecture 19 Creating Hacker Smart Contract
Lecture 20 Launching the attack on Victim contract
Lecture 21 Mitigating the Attack
Section 6: Section6: Smart Contract Attack : RugPull , Pump Dump schemes , Limit sell order
Lecture 22 Understanding the different type RugPull Attacks
Lecture 23 RugPull attacks on smart Contract
Section 7: Section7: Smart Contract Attack vector : Front Running , Signature replay Attack
Lecture 24 Front Running Attacks
Lecture 25 Signature replay Attacks
Section 8: Section 8 : DeFi (Decentralized Finance ) Concepts
Lecture 26 Liquidity pools , AMM , DEX
Lecture 27 Flashloan Concept
Section 9: Section 9 : Smart contract audit review process and methodology
Lecture 28 Audit process phase one Business requirement , Visual tools, Manual review
Lecture 29 Audit process phase Static , dynamic analysis , formal verification
Section 10: Section 10 : Capstone project : Perform a full Smart Contract audit on Wallet
Lecture 30 Vulnerabilities classifications
Lecture 31 Understanding system and business requirement for the Wallet Smart contract
Lecture 32 Basic Manual review and Structure of the Code
Lecture 33 Deep Manual review Critical vulnerabilities Found
Lecture 34 Deep manual review Low and informational vulnerabilities found
Lecture 35 Mitigation Of The Critical Vulnerabilities
Lecture 36 Presentation of the Automated tool for reviewing security issue
Lecture 37 Finding more Bugs with the Formal verification tool
Section 11: Section 11 : Exercise
Lecture 38 Perform an audit on this ERC20 Token and find the Different issues.
Cybersecurity Professional willing to learn and get into the Blockchain Security Space,Blockchain enthusiasts willing to get more insights about Smart contract security,Blockchain developers willing to improve the security of their smart contract,Crypto investors willing to learn how they can loose money from these attacks,IT professional willing to improve their Blockchain and infrastructure systems,Aspiring smart contract security auditor,CEO , CTO of Blockchain/Web3 Companies willing to know what it takes to perform an Audit review