Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Web 3.0 DApps & Smart Contract for Pentesting & Bug Bounties


itsMe

Recommended Posts

This is the hidden content, please

Description

Learn about Web 3 Security and How to identify vulnerabilities in Smart Contracts for Pentesting & Bug Bounties.

Here’s a more detailed breakdown of the course content:

In all the sections we will start the fundamental principle of How the attack works, Exploitation and How to defend from those attacks.

In this course you will learn about :

    What is Blockchain
    What are DApps
    What is a smart contract
    LAB setup to pentest smart contracts
    Metamask and its usage
    Installation of Hardhat
    Setup Remix IDE
    Practical on Functions in Remix
    Practical on View and Pure Functions in Solidity
    Mappings in solidity
    Deploying a smart contract
    Security Vulnerabilities in solidity
    Practical Example of Integer Overflow and Underflow
    How to find issues using Ethernaut Playground
    Selfdestruct in Solidity
    Fallback Functions
    Force Challenge
    Reentrancy Issues
    Private Variables in Solidity
    Using Hardhat for testing smart contracts
    An example PoC on the Parity Wallet Hack
    How to hunt on Web 3 bug bounty platforms like Immunefi & Hackenproof
    How to write a professional report

With this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you as soon as possible.

Notes:

    This course is created for educational purposes only and all the websites I have performed attacks are ethically reported and fixed.
    Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility.

Who this course is for:

    Beginners who wants to learn DApps Security
    Beginners who wants to learn about Smart Contract Audits
    Beginners who wants to learn about Web 3.0 Basics
    Beginners who wants to learn about identifying security vulnerabilities in DeFI

Requirements

    No Programming Experience Required
    Basics foundations of usage of computer systems

This is the hidden content, please

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.