返回
项目实战

Reproduce Hacking Incidents With Foundry

In the Foundry Reproduction of Hacking Attacks course, we will look into how to use Foundry to reproduce the hacker's attack path on the Defi protocol, so as to have a deeper understanding of smart contract security.

语言solidity
难度困难
总时长1.5小时

目标学习者

这门课是给谁上的

  • Developers interested in Foundry framework
  • Developers interested in smart contract security

要求

  • Understand basic concepts of Web3 and blockchain
  • Understand the basic syntax of Solidity

你会学到什么

  • Reproducing On-Chain Hacker Attack Paths with Foundry
Foundry
Solidity

课程安排

  • 1. GPU token self-transfer vulnerability

    This chapter will study a GPU token attack case that occurred on Binance on 2024-05-08, understand the vulnerability principle and attack details, and finally reproduce the attack.


  • 2.Reproduce Reentrancy Attack on Defrost

    This chapter will use Foundry to reproduce the path of the reentrancy attack on the Defrost project.

practice

Reproduce Hacking Incidents With Foundry

6 小节
移动端和桌面端均可访问