Technical illustration DeFi lightning loan attack and defense: take the bZx incident as an example

0

 187 total views

Yudan and Kong, senior security engineers of SlowMist Technology, believe that the DeFi security situation is severe, and security audits are currently the most cost-effective way to protect project security.

Original Title: “DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues”
Written by: Yudan and Kong, SlowMist Senior Security Engineer

This Hacking Time includes closed-door training on blockchain security and a keynote speech on blockchain security. The SlowMist security team will share with industry experts. It focuses on the construction of security system, the key points of offensive and defense from the perspective of underground hackers, and the security of digital assets. To communicate.

The following topics are selected from the “DeFi Flash Loan Attack and Defense Battle” brought by SlowMist Technology senior security engineer yudan &Kong. Based on the two earliest flash loan attack cases of bZx, yudan and Kong introduced the basic attack form of flash loan-proxy Currency price manipulation, detailed description of the defense plan of lightning loan based on price manipulation and how to use lightning loan to find another way to make profits by manipulating the unit price of LP Token when its price cannot be manipulated. I also reviewed the 2020 DeFi hacking event with everyone through the SlowMist Hacked Archive. Yudan and Kong believe that the DeFi security situation is severe, and security audits are currently the most cost-effective way to protect project security. In the current DeFi dark forest, we walk in Linyuan and need to walk on thin ice.

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

More topics PPT

Disclaimer:

Blockcast.cc does not endorse any content or product on this page. While we aim at providing you all important information that we could obtain, readers should do their own research before taking any actions related to the company and carry full responsibility for their decisions, nor can this article be considered as investment advice or recommendations. Every investment and trading move involves risk, you should conduct your own research when making a decision.