저는 사이버보안 관련 학과에 재학중인 대학생입니다..! 수능을 재수로 마치게되고, 이후 해당 학과에 진학하게 되며 뒤늦게 해킹에 관심을 가지게 되었다고 생각합니다. 그러나 학과의 수업만으로는 이론이 아닌 실제 exploit코드를 작성하거나 WEB3와 관련된 내용을 배우는 것에는 지장이 있었습니다. 대부분의 학과는 Blockchain, WEB3관련 지식을 다루지 않으니까요 그렇기에 더욱 드림핵이 도움이 된 것 같습니다! 드림핵의 Unit별로 나눠져있는 보안 취약점과 도구들의 사용 방법이 체계적으로 이뤄져있어서 이해하기에 너무 도움이 되었습니다! 또한 워게임을 풀이시켜 학습에 원동력을 부여하고, 다양한 사람들의 풀이 방법을 보며 학습할 수 있어서 너무 좋았습니다 감사합니다!
Smart Contract Security
In this path, you’ll learn the structure and vulnerabilities of Ethereum and Solidity-based smart contracts. You'll study key attack methods like Reentrancy, Integer Overflow, and Storage Manipulation. Through hands-on analysis of real-world cases, you'll develop the foundational knowledge necessary to audit smart contracts and take on Web3 bug bounty challenges.
Smart Contract Security
In this path, you’ll learn the structure and vulnerabilities of Ethereum and Solidity-based smart contracts. You'll study key attack methods like Reentrancy, Integer Overflow, and Storage Manipulation. Through hands-on analysis of real-world cases, you'll develop the foundational knowledge necessary to audit smart contracts and take on Web3 bug bounty challenges.
Retail Price
1250 coins
When you subscribe
Free
0% Completed
Total 0 completed
Lecture
0 /17
17
Wargame
0 /7
7
Why It's Worth Your Time
In blockchain, even a single line of flawed smart contract code can lead to losses worth hundreds of millions of dollars, making security absolutely critical. Vulnerabilities such as reentrancy attacks and issues related to fallback functions have frequently appeared in real-world hacks. This path is designed to help learners build a solid foundation by first understanding the structure of the Ethereum network and EVM, then practicing the identification and exploitation of vulnerabilities within Solidity-based smart contracts through hands-on exercises. It is ideal for those aiming for careers such as blockchain security researchers or smart contract auditors.
Topics Covered
- Understanding the structure of Ethereum and the Ethereum Virtual Machine (EVM)
- Basics of Solidity syntax and smart contract development
- Common smart contract vulnerabilities and exploitation techniques
- Practical exercises on security threats like integer overflow, sender spoofing, and storage manipulation
- Reentrancy attacks, fallback functions, and their defenses
- Security issues with proxy contracts and risks of upgradable smart contracts
Recommended For
- Aspiring blockchain security researchers and smart contract auditors
- Those interested in smart contract security and blockchain vulnerability analysis
- CTF participants aiming to solve smart contract challenges
Prerequisite Knowledge
- Basic Linux usage skills
- Interest or basic knowledge of Solidity and smart contract development
- Understanding of basic blockchain and cryptography concepts
Unit Composition
- 1
- 2
- 3
- 4
- 5
- 6
- 7250Coin
Free with subscription
250CoinFree with subscription
Explore proxy contract vulnerabilities and defense strategies in Solidity.Proxy ContractsProxy Contracts[Exercise] Storage CollisionExploit Tech: Storage CollisionSC: My First Proxy Contract[Exercise] Initializer & SelfdestructExploit Tech: Initializer & SelfdestructSC: Ultra Upgradeable Proxy
Reviews
Retail Price
1250 coins
When you subscribe
Free
0% Completed
Total 0 completed
Lecture
0 /17
17
Wargame
0 /7
7