Top talks on Blockchain from DEF CON 26

Our editorial team has handpicked the best of the best talks at DEF CON 26 -is one of the world's largest hacker conventions, held annually in Las Vegas, Nevada. Following is the list of top talks on Blockchain at DEF CON 26.

DEFCON 201826th Def-Con Hacking Conference is among one of the most main event on Computer, Information Technology, Cyber Security, Software, Hacking and Hack topics.

(Source: DEF CON 26)

8669822056?profile=original

1. You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts

Speakers: 

  • Zhenxuan Bai Freelance Security Researcher
  • Yuwei Zheng Senior Security Researcher, Unicorn Team, 360 Technology
  • Senhua Wang Freelance Security Researcher
  • Kunzhe Chai Leader of Pegasus Team at 360 Radio Security Research Department, 360 Technology

In this talk, a new replay attack based on Ethereum smart contracts is presented. In the token transfer, the risk of replay attack cannot be completely avoided when the sender's signatures are abused, which can bring the loss to users. And the reason is that the applying scope of the signatures is not properly designed in the smart contracts. To test and verify this loophole, we selected two similar smart contracts for our experiment, at the same time, we used our own accounts in these two contracts to carry out the experiment. Because the same signatures of the two contracts were used in the experiment, we got a double income from sender successfully.

>>>Go To Presentation

8669822098?profile=original

2. Tineola: Taking A Bite Out of Enterprise Blockchainion of Android Carrier Devices

Speakers:

  • Stark Riedesel, Synopsys, Senior Consultant
  • Parsia Hakimian, Synopsys, Senior Consultant

In this talk we will discuss tools and techniques attackers can use to target Fabric. To this end we are demoing and releasing a new attack suite, Tineola, capable of performing network reconnaissance of a Hyperledger deployment, adding evil network peers to this deployment, using existing trusted peers for lateral network movement with reverse shells, and fuzzing application code deployed on Fabric.

>>>Go To Presentation

v3ipsh.png

Your Complete Guide To Top Talks @DEF CON 26

Get your FREE Guide on Top Talks @ DEF CON 26 . Our editorial team has gone through all the talks and handpicked the best of the best talks at DEF CON into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform