Why/What Blockchain Exploitation?
In this blog series we will analyze blockchain vulnerabilities and exploit them ourselves in various lab and development environments. If you would like to stay up to date on new posts follow and subscribe to the following:Twitter: @ficti0n
URL: http://cclabs.io
http://consolecowboys.com
As of late I have been un-naturally obsessed with blockchains and crypto currency. With that obsession comes the normal curiosity of "How do I hack this and steal all the monies?"
However, as usual I could not find any actual walk thorough or solid examples of actually exploiting real code live. Just theory and half way explained examples.
Note: As usual this is live ongoing research and info will be released as it is coded and exploited.
Background Info:
- In client server we generally have the following:
- Front End - what the user sees (HTML Etc)
- Server Side - code that handles business logic
- Back End - Your database for example MySQL
A Decentralized Application Model:
- Smart contracts are your access into the blockchain.
- Your smart contract is kind of like an API
- Essentially DAPPs are Ethereum enabled applications using smart contracts as an API to the blockchain data ledger
- DAPPs can be banking applications, wallets, video games etc.
A blockchain is a trust-less peer to peer decentralized database or ledger
Consensus:
Proof of stake is simply staking large sums of coins which are at risk of loss if one were to perform a malicious action while helping to perform consensus of data.
Things to Note:
- So, the thing to note is that our smart contracts are located on the blockchain
- And the blockchain is immutable
- This means an Agile development model is not going to work once a contract is deployed.
- This means that updates to contracts is next to impossible
- All you can really do is create a kill-switch or fail safe functions to disable and execute some actions if something goes wrong before going permanently dormant.
- If you don't include a kill switch the contract is open and available and you can't remove it
- Smart Contracts are generally open source
- Which means people like ourselves are manually bug hunting smart contracts and running static analysis tools against smart contract code looking for bugs.
- Kill the current contract which stays on the blockchain
- Then deploy a whole new version.
- If there is no killSwitch the contract will be available forever.
- Many contracts and projects do not even think about and SDLC.
- They rarely add penetration testing and vulnerability testing in the development stages if at all
- At best there is a bug bounty before the release of their main-nets
- Which usually get hacked to hell and delayed because of it.
- Things are getting better but they are still behind the curve, as the technology is new and blockchain mostly developers and marketers. Not hackers or security testers.
- If sensitive data is placed on the blockchain it is there forever
- Which means that if a cryptographic algorithm is broken anything which is encrypted with that algorithm is now accessible
- We all know that algorithms are eventually broken!
- So its always advisable to keep sensitive data hashed for integrity on the blockchain but not actually stored on the blockchain directly
Exploitation of Re-Entrancy Vulnerabilities:
Example Scenario:
Example Target Code:
Example Attacking Code:
Setting up a Lab Environment and coding your Attack:
Coding your Exploit and Interfacing with a Contract Programmatically:
Conclusion:
- Nsa Hack Tools
- Pentest Tools Github
- Pentest Tools Linux
- Pentest Automation Tools
- Pentest Tools Download
- Best Hacking Tools 2020
- Best Pentesting Tools 2018
- Hack And Tools
- Pentest Tools Bluekeep
- Blackhat Hacker Tools
- Pentest Tools Apk
- Hacking Tools Name
- Hacker Hardware Tools
- Hack Tools Download
- Pentest Tools Open Source
- Hacker Tools Linux
- Pentest Tools Online
- Hack And Tools
- Hack Tools For Mac
- Hacks And Tools
- Hacker Tools 2019
- Pentest Tools Open Source
- Hacking Tools For Pc
- Hacking Tools For Games
- Physical Pentest Tools
- Hacking Tools
- Growth Hacker Tools
- Tools For Hacker
- Hacking Tools For Windows Free Download
- Best Hacking Tools 2019
- Hack Tools For Games
- Hack Tools Github
- Pentest Tools Online
- Hacking Tools Pc
- Hacking Tools Usb
- Free Pentest Tools For Windows
- Hacking Tools For Beginners
- Hacker Tools Free Download
- Pentest Tools
- Pentest Tools Framework
- Hack Rom Tools
- Easy Hack Tools
- Hacking Tools For Beginners
- Hack Tools For Windows
- Hacking Tools Windows 10
- Hacking Tools For Kali Linux
- Hacker Tools Apk
- Hacker Search Tools
- Top Pentest Tools
- Hacker Tools Software
- Hacker Tools Github
- Hacker Tools Software
- Hacking Tools For Mac
- Hacker Tools Github
- Hacking Tools For Mac
- Game Hacking
- Hacking Tools Download
- Easy Hack Tools
- Hack App
- Hacker Tools Software
- Hacking Tools Mac
- Pentest Tools
- Hacking Tools Pc
- Black Hat Hacker Tools
- Pentest Tools Github
- Physical Pentest Tools
- Kik Hack Tools
- Hacker Tools Hardware
- Hacking Tools Free Download
- Hacker Tools Github
- Pentest Tools List
- Hacker Tools Apk
- Hacker
- Underground Hacker Sites
- Underground Hacker Sites
- Hacking Tools Kit
- Tools 4 Hack
- Hacking Tools Kit
- Hacker Tools Software
- Hackrf Tools
- New Hacker Tools
- Hacking Tools For Windows
- Hacking Tools For Windows Free Download
- New Hack Tools
- Pentest Tools Bluekeep
- What Are Hacking Tools
- Hacker Tools Hardware
- Hacker Tools Apk
- Hacker
- Hacker Tools Software
- Physical Pentest Tools
- Underground Hacker Sites
- Pentest Tools Windows
- Easy Hack Tools
- Hacker Tools Free
- Computer Hacker
- Hacking Tools For Kali Linux
- Hack Tool Apk No Root
- Hacking Tools For Kali Linux
- Hack App
- Hacking Tools For Beginners
- Hack Tools For Windows
- Hack Tools For Ubuntu
- Growth Hacker Tools
- Install Pentest Tools Ubuntu
- Hacker Search Tools
- Bluetooth Hacking Tools Kali
- Hacker Tools For Mac
- Hack Website Online Tool
- Hacker Tool Kit
- Pentest Tools Linux
- Pentest Tools Android
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Pc
- Blackhat Hacker Tools
- Pentest Automation Tools
- Hacking Tools Name
- Hack Tools
- Usb Pentest Tools
- Hack Tool Apk No Root
- Pentest Tools Apk
- Hacker Tools Apk Download
- Pentest Tools Framework
- Hacker Tools Software
- Tools Used For Hacking
- Hack Tools 2019
- Pentest Automation Tools
- Hack And Tools
- Beginner Hacker Tools
No comments:
Post a Comment