Smart Contract Security
10.0
(1)
Tier 2 Easy Skill Path Blockchain
In this path, you’ll learn the structure and vulnerabilities of Ethereum and Solidity-based smart contracts. You'll study key attack methods like Reentrancy, Integer Overflow, and Storage Manipulation. Through hands-on analysis of real-world cases, you'll develop the foundational knowledge necessary to audit smart contracts and take on Web3 bug bounty challenges.
Smart Contract Security
10.0
(1)
Tier 2 Easy Skill Path Blockchain
In this path, you’ll learn the structure and vulnerabilities of Ethereum and Solidity-based smart contracts. You'll study key attack methods like Reentrancy, Integer Overflow, and Storage Manipulation. Through hands-on analysis of real-world cases, you'll develop the foundational knowledge necessary to audit smart contracts and take on Web3 bug bounty challenges.
Retail Price
1250 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /17
17
Wargame 0 /7
7
You can access locked objectives by upgrading your plan or purchasing the units separately.

Why It's Worth Your Time

In blockchain, even a single line of flawed smart contract code can lead to losses worth hundreds of millions of dollars, making security absolutely critical. Vulnerabilities such as reentrancy attacks and issues related to fallback functions have frequently appeared in real-world hacks. This path is designed to help learners build a solid foundation by first understanding the structure of the Ethereum network and EVM, then practicing the identification and exploitation of vulnerabilities within Solidity-based smart contracts through hands-on exercises. It is ideal for those aiming for careers such as blockchain security researchers or smart contract auditors.

Topics Covered

  • Understanding the structure of Ethereum and the Ethereum Virtual Machine (EVM)
  • Basics of Solidity syntax and smart contract development
  • Common smart contract vulnerabilities and exploitation techniques
  • Practical exercises on security threats like integer overflow, sender spoofing, and storage manipulation
  • Reentrancy attacks, fallback functions, and their defenses
  • Security issues with proxy contracts and risks of upgradable smart contracts

Recommended For

  • Aspiring blockchain security researchers and smart contract auditors
  • Those interested in smart contract security and blockchain vulnerability analysis
  • CTF participants aiming to solve smart contract challenges

Prerequisite Knowledge

  • Basic Linux usage skills
  • Interest or basic knowledge of Solidity and smart contract development
  • Understanding of basic blockchain and cryptography concepts
Unit Composition
Total 7 units
  1. 1
    10.0
    (5)
    Free
    10.0
    (5)
    Free
    Explore blockchain, smart contracts, and Ethereum development tools.
    Blockchain and Smart Contracts
    Blockchain and smart contracts
    Environment Setup
    Build Your Environment and Practice⚙️
    Ethereum and Solidity
    Smart contracts on Ethereum
    Syntax and characteristics of Solidity
  2. 2
    9.5
    (2)
    200
    Coin
    Free with subscription
    9.5
    (2)
    200
    Coin
    Free with subscription
    Explore numeric errors in Solidity and how to exploit and defend against them.
    Numeric Errors
    Numeric Errors
    [Exercise] Integer Overflow
    Exploit Tech: Integer Overflow
    SC: Dreamhack Token Shop
  3. 3
    0.0
    (0)
    200
    Coin
    Free with subscription
    0.0
    (0)
    200
    Coin
    Free with subscription
    Understand caller verification in smart contracts and analyze Solidity vulnerabilities.
    Sender
    Sender
    [Exercise] Sender
    Exploit Tech: Transmitter
    SC: Token Giveaway
  4. 4
    0.0
    (0)
    200
    Coin
    Free with subscription
    0.0
    (0)
    200
    Coin
    Free with subscription
    Explore EVM storage mechanisms and smart contract security in Solidity.
    Storage
    Storage
    [Exercise] Storage
    Exploit Tech: Storage
    SC: Nando's Private Safe
  5. 5
    10.0
    (1)
    200
    Coin
    Free with subscription
    10.0
    (1)
    200
    Coin
    Free with subscription
    Explore Solidity's fallback function vulnerabilities and secure smart contract practices.
    Fallback
    Fallback
    [Exercise] Fallback
    Exploit Tech: Fallback
    SC: King of Dreamhack
  6. 6
    10.0
    (1)
    200
    Coin
    Free with subscription
    10.0
    (1)
    200
    Coin
    Free with subscription
    Explore reentrancy attacks in smart contracts and learn prevention techniques.
    Reentrancy
    Reentrancy
    [Exercise] Reentrancy
    Exploit Tech: Reentrancy
    SC: Make Boko Winner
  7. 7
    0.0
    (0)
    250
    Coin
    Free with subscription
    0.0
    (0)
    250
    Coin
    Free with subscription
    Explore proxy contract vulnerabilities and defense strategies in Solidity.
    Proxy Contracts
    Proxy Contracts
    [Exercise] Storage Collision
    Exploit Tech: Storage Collision
    SC: My First Proxy Contract
    [Exercise] Initializer & Selfdestruct
    Exploit Tech: Initializer & Selfdestruct
    SC: Ultra Upgradeable Proxy
Reviews
10.0 (1)
24 days ago

저는 사이버보안 관련 학과에 재학중인 대학생입니다..! 수능을 재수로 마치게되고, 이후 해당 학과에 진학하게 되며 뒤늦게 해킹에 관심을 가지게 되었다고 생각합니다. 그러나 학과의 수업만으로는 이론이 아닌 실제 exploit코드를 작성하거나 WEB3와 관련된 내용을 배우는 것에는 지장이 있었습니다. 대부분의 학과는 Blockchain, WEB3관련 지식을 다루지 않으니까요 그렇기에 더욱 드림핵이 도움이 된 것 같습니다! 드림핵의 Unit별로 나눠져있는 보안 취약점과 도구들의 사용 방법이 체계적으로 이뤄져있어서 이해하기에 너무 도움이 되었습니다! 또한 워게임을 풀이시켜 학습에 원동력을 부여하고, 다양한 사람들의 풀이 방법을 보며 학습할 수 있어서 너무 좋았습니다 감사합니다!

Retail Price
1250 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /17
17
Wargame 0 /7
7
You can access locked objectives by upgrading your plan or purchasing the units separately.