This is the third part of the Smart Contracts series where issues about smart contracts are broken into small chunks. All the examples were run in my local blockchain using Ethereum’s remix IDE. How does an overflow really occur?Read More »Exploit Integer Overflow and Underflows in Smart Contracts
Smart contracts are used by Ethereum to handle processed based on transactions. Many companies, banks and crypto enthusiasts use them for selling their services or products. Those contracts are written by developers and some of those contains vulnerabilities. One of those is the Visibility issue.Read More »Exploit and Remediate Function Visibility Vulnerabilities in Smart Contracts
Recently I wanted to test an Android application and had to use an Android Emulator. While Android Studio’s emulator works fine, I had difficulties making it run because you can either have it rooted without Google Play Services or with Google Play Services but not rooted.Read More »Setting Up BurpSuite as a Trusted Root CA in Genymotion Emulator
Burp Suite is the most used web proxy for web application assessments. In an assessment, the configuration of the application required me to use
Platform Authentication with NTLM to authenticate. When doing that I got 401 error when JS and CSS files were requested.
Burp Suite, recently released their new API for interacting with Burp. The old API aka the “Wiener” API, was there from the release of Burp, but in 2022 the new “Montoya” API came out.
Smart Contracts, the self-executing code running on blockchain platforms, have revolutionized various industries by automating processes and providing decentralized solutions.Read More »Exploit and Prevent Reentrancy Attacks in Smart Contracts
As a network security professional or system administrator, you know the importance of regular port scans to assess your network’s security posture.Read More »Visualize Your Nmap Scan Results with Nmap Peek for VSCode
Crypto wallets use BIP39 mnemonic in order to help people memorize their key, without having to write long almost random looking strings. Those are presented to users when they create their first wallet and contain a list of 12 to 24 random words.Read More »Are 24 words strong enough to protect your valuable crypto assets?
I am using relatively often Windows 10 virtual machines with VMware Fusion and I noticed that while it had enough RAM and CPU the performance was really slow.Read More »How to fix slow performance of Windows 10 in VMware Fusion