返回
Reproduce Hacking Incidents With Foundry
In the Foundry Reproduction of Hacking Attacks course, we will look into how to use Foundry to reproduce the hacker's attack path on the Defi protocol, so as to have a deeper understanding of smart contract security.
语言solidity
难度困难
总时长1.5小时
目标学习者
这门课是给谁上的
- Developers interested in Foundry framework
- Developers interested in smart contract security
要求
- Understand basic concepts of Web3 and blockchain
- Understand the basic syntax of Solidity
你会学到什么
- Reproducing On-Chain Hacker Attack Paths with Foundry
课程安排
1. GPU token self-transfer vulnerability
This chapter will study a GPU token attack case that occurred on Binance on 2024-05-08, understand the vulnerability principle and attack details, and finally reproduce the attack.
2.Reproduce Reentrancy Attack on Defrost
This chapter will use Foundry to reproduce the path of the reentrancy attack on the Defrost project.
Reproduce Hacking Incidents With Foundry
6 小节
移动端和桌面端均可访问