Torrent details for "Live Training #7 – Smart Contract Security #2"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
372.78 MB
Info Hash:
42fbc444b17c406706f82f84b631b0bf64f3811c
Added By:
Added:  
28-02-2022 14:04
Views:
543
Health:
Seeds:
1
Leechers:
0
Completed:
55
wide




Description
wide
Image error
Description

What is the highest paid skill in the Blockchain industry?
Security.
As a smart contract security specialist, you can earn up to 250k USD / year.

Yep.

Hundreds of millions have been lost to smart contract hacks.
If you can write safe smart contracts, it’s worth a LOT of money.

And in the security niche, smart contract audits is what pays the most.
Blockchain companies pay hundreds of thousands of dollars for a single smart contract audit.

In a smart contract audit, there are 2 components:

   Finding security vulnerabilities
   Presenting your findings in a report

The mindset to have is different than for a developer who try to write a safe smart contract.
As a smart contract auditor, you put yourself in the shoes of a hacker and try to exploit security vulnerability, if any.

In this training, you will learn from a professional security specialist how to do smart contract audits.
After this training, you will be able to do your own smart contract audits and charge top dollars for it!


LIVE EVENT

When is the training?

   July 20th, 11pm UTC+8
   If you cannot access the live event, you will still be able to access the recording after

PART I: OFFENSIVE SECURITY IN SMART CONTRACTS

   The Mindset of a Pentester
   Types of Scan:
       Manual Scanning
       Static Analysis
       Dynamic Analysis

PART II: AUDIT METHODOLOGY

   Black Box
   Grey Box
   White Box
   How to write a report and risk assessment

PART III: DETECT CRITICAL ENDPOINTS IN SMART CONTRACTS

   Solograph
   Critical Functions Signature

PART VI: THE SWC REGISTER (SMART CONTRACT WEAKNESS CLASSIFICATION)

PART V: EXPLOIT SOLIDITY VULNERABILITIES

   Detect and Exploit Re-Entrancy Attacks
   Detect and Exploit Integer overflow/underflow
   Detect Denial of Service
   Force Sending Ether
   Bypass the Tx.Origin Authentication

PART VI: STATIC ANALYSIS

   Use Slither to detect Solidity issues

PART VII: DYNAMIC ANALYSIS

   MythX
   Manticore

PRE-REQUISITES

   Basics of NodeJS
   Basics of the command line
   Ethereum
   Solidity
   ERC20
   Truffle
   Required software:
       Code editor (ex: Visual Studio Code)
       A terminal (for Windows users, you can use the bash emulation of git for windows)
       NodeJS
       Truffle
   Works on Windows 8/10, recent versions of Ubuntu & MacOS

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes