17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Web3 And Blockchain Security - Pen Testing And Bug Bounty Part1
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Smart contract reentrancy vulnerability exploitation using Remix and Truffle
Integer overflow/underflow in smart contracts
Smart contract self-destruct vulnerabilities (exploitation with Solidity flaw)
Cross-site scripting (XSS) in dApp interfaces (exploitation with Burp Suite or OWASP ZAP)
SQL injection in decentralized databases (exploitation with SQLmap)
Front-end injection attacks in dApps (exploitation with JavaScript injecteb3 wallets (exploitation using Metamask or WalletConnect)
Denial-of-Service (DoS) attacks on blockchain networks
Exploiting gas price vulnerabilities in Ethereum transactions
Time-based attacks on smart contracts
Replay attacks on cross-chain transactions
Exploiting gas limit vulnerabilities
Blockchain reorganization attacks
Supply chain attacks on blockchain infrastructure
Requirements
8GB Ram PC
Basics Of Cyber Security
Basics Of Blockchain
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1 - Introduction/1 - Introduction to WEB3.mp4
24.8 MB
~Get Your Files Here !/1 - Introduction/10 - Consensus Mechanisms ProofofWork ProofofStake Byzantine Fault Tolerance.mp4
33.5 MB
~Get Your Files Here !/1 - Introduction/11 - Public vs Private Blockchains.mp4
8.7 MB
~Get Your Files Here !/1 - Introduction/12 - Solidity Programming Language.mp4
73.7 MB
~Get Your Files Here !/1 - Introduction/13 - Smart Contract Lifecycle.mp4
26.9 MB
~Get Your Files Here !/1 - Introduction/14 - Gas Fees and Transaction.mp4
37.3 MB
~Get Your Files Here !/1 - Introduction/15 - Advantages and Disadvantages of Smart Contracts.mp4
27.2 MB
~Get Your Files Here !/1 - Introduction/2 - Web3 Architecture.mp4
31.9 MB
~Get Your Files Here !/1 - Introduction/3 - Decentralized Finance.mp4
13.3 MB
~Get Your Files Here !/1 - Introduction/4 - Decentralized Autonomous Organizations.mp4
15 MB
~Get Your Files Here !/1 - Introduction/5 - NonFungible Tokens.mp4
12.5 MB
~Get Your Files Here !/1 - Introduction/6 - Web3js Library.mp4
8.6 MB
~Get Your Files Here !/1 - Introduction/7 - Ethersjs Library.mp4
5.5 MB
~Get Your Files Here !/1 - Introduction/8 - Distributed Ledger Technology.mp4
20.8 MB
~Get Your Files Here !/1 - Introduction/9 - Block Structure and Hashing.mp4
116 MB
~Get Your Files Here !/2 - Web3 Network Attacks/16 - Blockchain Network Attacks.mp4
54.6 MB
~Get Your Files Here !/2 - Web3 Network Attacks/17 - Consensus Mechanism Vulnerabilities.mp4
40.8 MB
~Get Your Files Here !/2 - Web3 Network Attacks/18 - Sybil Attacks and Spam Transactions.mp4
15 MB
~Get Your Files Here !/2 - Web3 Network Attacks/19 - Oracle Manipulation.mp4
27.5 MB
~Get Your Files Here !/2 - Web3 Network Attacks/20 - DenialofService DoS Attacks on Blockchains.mp4
27.2 MB
~Get Your Files Here !/3 - Smart Contract vulnerabilities/21 - Smart contract reentrancy vulnerability exploitation using Remix and Truffle.mp4
14.7 MB
~Get Your Files Here !/3 - Smart Contract vulnerabilities/22 - Integer overflowunderflow in smart contracts.mp4
22.1 MB
~Get Your Files Here !/3 - Smart Contract vulnerabilities/23 - Smart contract selfdestruct vulnerabilities exploitation with Solidity flaw.mp4
11.3 MB
~Get Your Files Here !/4 - Web3 Application Security/24 - Crosssite scripting XSS in dApp interfaces.mp4
15.7 MB
~Get Your Files Here !/4 - Web3 Application Security/25 - SQL injection in decentralized databases exploitation with SQLmap.mp4
12.6 MB
~Get Your Files Here !/4 - Web3 Application Security/26 - Authentication bypass in Web3 wallets exploitation using Metamask.mp4
15 MB
~Get Your Files Here !/4 - Web3 Application Security/27 - Frontend injection attacks in dApps exploitation with JavaScript injection.mp4
15.8 MB
~Get Your Files Here !/5 - Network and Protocol Vulnerabilities/28 - DenialofService DoS attacks on blockchain networks.mp4
27.5 MB
~Get Your Files Here !/5 - Network and Protocol Vulnerabilities/29 - Exploiting gas price vulnerabilities in Ethereum transactions.mp4
32.7 MB
~Get Your Files Here !/5 - Network and Protocol Vulnerabilities/30 - Timebased attacks on smart contracts.mp4
86.4 MB
~Get Your Files Here !/5 - Network and Protocol Vulnerabilities/31 - Replay attacks on crosschain transactions.mp4
110.6 MB
~Get Your Files Here !/5 - Network and Protocol Vulnerabilities/32 - Exploiting gas limit vulnerabilities.mp4
93 MB
~Get Your Files Here !/5 - Network and Protocol Vulnerabilities/33 - Blockchain reorganization attacks.mp4
16.2 MB
~Get Your Files Here !/5 - Network and Protocol Vulnerabilities/34 - Supply chain attacks on blockchain infrastructure.mp4