Web 3.0 Dapps For Pentesting & Bug Bounties

Posted By: ELK1nG

Web 3.0 Dapps For Pentesting & Bug Bounties
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.59 GB | Duration: 4h 31m

Practical course to Web 3 Pentesting & Bug bounties

What you'll learn

DeFi Security

Smart Contract

Blockchain

Cyber Security

Blockchain Security

Ethereum

Remix IDE

Requirements

No Programming Experience Required

Basics foundations of usage of computer systems

Description

Learn about Web 3 Security and How to identify vulnerabilities in Smart Contracts for Pentesting & Bug Bounties.Here's a more detailed breakdown of the course content:In all the sections we will start the fundamental principle of How the attack works, Exploitation and How to defend from those attacks.In this course you will learn about :What is BlockchainWhat are DAppsWhat is a smart contractLAB setup to pentest smart contractsMetamask and its usageInstallation of Hardhat Setup Remix IDEPractical on Functions in RemixPractical on View and Pure Functions in SolidityMappings in solidityDeploying a smart contractSecurity Vulnerabilities in solidity Practical Example of Integer Overflow and UnderflowHow to find issues using Ethernaut PlaygroundSelfdestruct in SolidityFallback FunctionsForce ChallengeReentrancy IssuesPrivate Variables in SolidityUsing Hardhat for testing smart contractsAn example PoC on the Parity Wallet HackHow to hunt on Web 3 bug bounty platforms like Immunefi & HackenproofHow to write a professional reportWith this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you as soon as possible.Notes:This course is created for educational purposes only and all the websites I have performed attacks are ethically reported and fixed.Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility.

Overview

Section 1: Introduction

Lecture 1 What is a Blockchain

Lecture 2 Core Components of a Blockchain

Lecture 3 Practical Example of how Blockchain Works

Lecture 4 What is Ethereum

Lecture 5 What are Smart Contracts

Lecture 6 Metamask and its usage

Lecture 7 Decentralized Applications (dApps)

Lecture 8 What a dApp looks like

Lecture 9 Etherscan.io

Lecture 10 Remix Introduction

Lecture 11 Solidity Rundown

Lecture 12 Practical on Data Types in Remix

Lecture 13 Variables in Solidity

Lecture 14 Practical on Variables in Remix

Lecture 15 Read And Write Operations

Lecture 16 Functions in Solidity

Lecture 17 Practical on Functions in Remix

Lecture 18 Types of functions in Solidity

Lecture 19 Practical on View and Pure Functions in Solidity

Lecture 20 Constructors in Solidity

Lecture 21 Practical on Constructors in Remix

Lecture 22 Modifiers in Solidity

Lecture 23 Practical on Modifiers in Remix

Lecture 24 Mappings in solidity

Lecture 25 Practical on How to interact with a smart contract in Remix

Section 2: Smart Contract Vulnerabilities

Lecture 26 Ethernaut

Lecture 27 Fallback Functions

Lecture 28 Fallback Challenge

Lecture 29 Private Variables in Solidity

Lecture 30 Vault

Lecture 31 More on Constructors

Lecture 32 Working of Constructors

Lecture 33 Fallout Challenge

Lecture 34 Integer Overflow and underflow

Lecture 35 Practical Example of Integer Overflow and Underflow

Lecture 36 Token Challenge

Lecture 37 Selfdestruct in Solidity

Lecture 38 Force Challenge

Lecture 39 Reentrancy

Lecture 40 Re-entrancy Challenge

Section 3: Tools and Methods for PoCs of Web3 Vulnerabilities

Lecture 41 The Whats and Whys of a Proof of Concept in Web3

Lecture 42 Installation of Hardhat

Lecture 43 Using hardhat for compiling contracts

Lecture 44 Using Hardhat to run scripts

Lecture 45 Using Hardhat for testing smart contracts

Lecture 46 An example PoC on the Parity Wallet Hack

Beginners who wants to learn DApps Security,Beginners who wants to learn about Smart Contract Audits,Beginners who wants to learn about Web 3.0 Basics,Beginners who wants to learn about identifying security vulnerabilities in DeFI