Tag: blockchain

Penetration Testing Wiki

₿ Blockchain & DeFi Cyberattacks Review

Index of cyberattacks (from recent to oldest): 💣 OLA $3.6 Million hack (2022) 💣 INV $15.6 Million price manipulation through keep3r oracle (2022) 💣 BAYC Discord compromise and phishing (2022) 💣 Ronin $625 Million hack (2022) 💣 Wormhole Qbridge $324 Million hack (2022) 💣 Poly Network Access Control $610 Million hack (2021) 💣 PancakeSwap Lottery…
Read more

Learn Blockchain Security for free Android app

🏆 If you want to learn about blockchain security, give a try to Learn Blockchain Security Android app! You can learn about blockchain attacks, smart contracts vulnerabilities and general blockchain concepts. Download it here: https://play.google.com/store/apps/details?id=com.defensahacker.blockchainquiz Also check the most common vulnerabilities on Smart Contracts:

Pentestwiki.org joins the Brave Verified Creator program

BAT (Basic Attention Token) is a crypto token natively supported by the Brave webbrowser that blocks standard trackers and cookies and shows you a limited number of ads in a pop-up window. For each ad you can earn around 0.005 BAT and also you can send BAT to websites that are part of the BAT…
Read more

Top 10 smart contract vulnerabilities on Ethereum

NCC group started an initiative called DASP for Decentralized Application Security Project in 2018. It covers the top 10 vulnerabilities found in smart contracts running on the Ethereum blockchain. This is a quick summary of the top 10: Reentrancy: Occurs when external contract calls are allowed to make new calls to the calling contract before…
Read more

Certified Blockchain Security Professional certification

After studying blockchain for a while, I decided to apply for the Blockchain Training Alliance (BTA) Certified Blockchain Security Professional Certification, CBSP for short. The exam covers the basics of blockchain consensus algorithms, advanced blockchain security mechanisms (permissioned blockchains, checkpointing, multisignatures, ring signatures, stealth transactions, confidential transactions, zero-knowledge proofs and Pedersen commitments), network-level attacks (51%…
Read more