Becoming Anonymous OnlineAs a Pentester setting up and tuning an infrastructure is just as much critical as writing reports that engage.Jan 122Jan 122
Unpacking OWASP Smart Contract Top 10: Part 8— Insecure RandomnessThe Importance of Fair Play in Blockchain: Avoiding Insecure Randomness”Oct 23, 2023Oct 23, 2023
Demystifying OWASP Smart Contract Top 10: Part 10 — Unchecked External CallsHello there, curious minds! Welcome to the final part of our journey through the Open Web Application Security Project’s (OWASP) Smart…Oct 20, 2023Oct 20, 2023
Unpacking OWASP Smart Contract Top 10: Part 9 — Gas Limit VulnerabilitiesHello there! Welcome back to our journey through the Open Web Application Security Project’s (OWASP) Smart Contract Top 10. In this ninth…Oct 19, 2023Oct 19, 2023
Deciphering OWASP Smart Contract Top 10: Part 7 — Logic ErrorsWelcome, fellow hackers, to the seventh part of our journey through the Open Web Application Security Project’s (OWASP) Smart Contract Top…Oct 18, 2023Oct 18, 2023
“Exploring OWASP Smart Contract Top 10: Part — DoS Attacks”Welcome, hackers 20s! In this article, we’re diving deep into the intriguing world of “Understanding Denial of Service Attacks in Solidity…Oct 18, 2023Oct 18, 2023
“Exploring OWASP Smart Contract Top 10: Part 5— Front-running Attacks/Race condition”IntroductionOct 17, 2023Oct 17, 2023
“Exploring OWASP Smart Contract Top 10: Part 4— Access Control Vulnerabilities”In the context of Solidity, access control refers to the mechanisms and patterns used to control who can interact with certain functions or…Oct 16, 2023Oct 16, 2023
Part3 of OWASP smart-contract-top-10: Block.Timestamp ManipulationIntroductionOct 15, 2023Oct 15, 2023
Published inCoinsBench“Exploring OWASP Smart Contract Top 10: Part 2 — Arithmetic Over/Underflows Vulnerabilities”Integer Overflow is a phenomenon that occurs when the integer data type cannot hold the actual value of a variable. Integer Overflow and…Oct 15, 2023Oct 15, 2023