SQL INJECTIONS

SQL Injection (SQLi) is a security vulnerability that allows attackers to interfere with the queries that an application makes to its database. This can allow attackers to view data that they are not normally able to retrieve, and in some…

CROSS SITE SCRIPTING

Cross-site scripting (XSS) is a common security vulnerability that allows attackers to inject malicious code into a website, often in the form of scripts. When users visit the compromised website, the malicious code runs in their browser, potentially leading to…

PART 3 : EXPLOITING THE DAPP

This article delves into the intricacies of exploiting a common vulnerability in smart contracts, known as a reentrancy attack, using a pirate-themed DApp called “Reentrant Pirate” as our example. The “Reentrant Pirate” DApp is designed to simulate a treasure hunt…

PART 2 : SETTING UP REENTRANT PIRATES

Embark on a thrilling adventure with Captain Reenter and his notorious crew aboard the Ether Buccaneer as you set up the Reentrant Pirates dApp. This guide will lead you through each step of the journey, from cloning the repository to…

PART 1 : INTRODUCTION TO REENTRANCY

Blockchain technology and smart contracts have revolutionised various industries by enabling decentralised and automated processes. However, these innovations come with their own set of vulnerabilities. One critical vulnerability is reentrancy, which can lead to significant security breaches if not adequately…

COMPONENTS OF ZERO TRUST MODEL

Just a recap of all the components of Zero Trust Architecture IDENTITY VERFICATION 1. Multi-Factor Authentication (MFA) MFA enhances security by requiring multiple verification methods before granting access. It’s like needing both a key and a passcode to enter a…

PART 2 : ROLE-BAC & ATTRIBUTE-BAC

In today’s digital landscape, ensuring that the right people have the right access to the right resources at the right time is critical for security and efficiency. Two predominant access control models are Role-Based Access Control (RBAC) and Attribute-Based Access…

PART 5 : SIDE CHAINS AND BRIDGES

As we move down through the Layer-2 solutions of our blockchain architecture, we get a glimpse of the programmed mechanisms that further increase scalability and efficiency. We’ve explored the basic idea of mechanisms, state channels, payment channels, and hash locking.…

PART 4 : HASH LOCKING

Hash locking is the core mechanism adopted to ensure the security of off-chain transactions in blockchain technology. Leveraging cryptographic hashing algorithms, the hash locking mechanism serves as a safe way to effect conditional transfers and plays pivotal roles in many…