KS note – Telegram
KS note
495 subscribers
61 photos
2 files
71 links
・ Web3 & etc.

🥷⛓️🍷 @MostPow3rful
Download Telegram
☁️ --rpc-url VS —-fork-url — Foundry
👌3
Forwarded from Remedy
🧢 gm whitehats 🧢

Continuing with our Glider Q&A Series, this week's question is: How does Glider work?

🎩 Glider at its heart is a code-analysis query engine. It allows developers/researchers to write Glides (queries written in Python).

Each Glide defines a specific set of instructions that the query engine must execute. These instructions specify what Solidity code Glider should look for.

Once a Glide is written, a Glide developer can then submit the query to Glider. Glider first validates that the query syntax is correct. If the syntax is correct, Glider then processes the query instructions and scans the entire Glider database for any Solidity code that matches the query’s specifications.

Once finished, Glider returns the Solidity code results back to the researcher/developer to review in a readable format.

Don't forget to join our Discord for more Glider Resources 💊

Wishing you all a nice weekend 🫡
Please open Telegram to view this post
VIEW IN TELEGRAM
🙏6
🧪 unit & integration Testing What, Why, How — Using Foundry Toolkit

🔗 https://chatgpt.com/share/20595387-9115-440e-ba13-215b2f0e9d69
👌6
1️⃣7️⃣ #ETHERNAUT #level_17 #Recovery

- First Must Check The Contract at https://sepolia.etherscan.com (HERE)
- Then Check the transaction which contract deployed at it (HERE)
- then you will See Some Ether transfered between some contracts. the second contract which received the ether is the our target (HERE)
- we must be sure that the contract is the right contract so we can use some functions such as name(), balances(),.... but i called transfer() (HERE) {Before i transfered 0.1 ether to the contract}
- then we must call destroy() function (HERE)

🥷🍷 <Happy Hacking/>
🔥111
2️⃣1️⃣ #ETHERNAUT #level_21 #Shop

🥷🍷 <Happy Hacking/>
❤‍🔥11🏆1🦄1
Forwarded from Programmer Jokes
🆒4🔥1
👓 Recording all the emitted events - Explained The Foundry Book's Example

⚠️ import {Vm} from "lib/forge-std/src/Vm.sol";

🔗 https://book.getfoundry.sh/cheatcodes/record-logs
👾85🔥1
Forwarded from GO-TO CVE
CVE-2023-46943-week-18.pdf
1.1 MB
بررسی آسیب‌پذیری CVE-2023-46943 👨‍💻

سلام به همه دوستان عزیز! 🌟

خوش آمدید به برنامه هفته 18 از تحلیل آسیب‌پذیری‌های hashtag#GOTOCVE. این هفته به بررسی آسیب‌پذیری مهم CVE-2019-15107 پرداخته‌ایم که مربوط به webmin و آسیب پذیری RCE روی این پلتفروم کنترول سرویس وب است برای برسی بیشتر با ما همراه باشید.

👾 Week: 18
🔍 CVE: CVE-2019-15107
📊 Type: RCE
🛠 CMS: Webmin

در این برنامه، به جزئیات آسیب‌پذیری، روش‌های اکسپلویت و تکنیک‌های پیشگیری از آن خواهیم پرداخت ایم.

رای پیوستن به کانال تلگرام ما و دریافت آخرین اخبار و به‌روزرسانی‌ها، از لینک زیر استفاده کنید:
🔗 پیوستن به کانال تلگرام
https://news.1rj.ru/str/GOTOCVE💫

مقالات ما را نیز می‌توانید در وب‌سایت زیر دنبال کنید:
🔗 مطالعه مقالات
https://lnkd.in/dFFCY5Kn


نویسندگان:
• Maha
• Mostpow3rful
• Parsa Momeni
• Fazel Mohammad Ali Pour
• Reza Olfat
• Ali Soltani
7🔥3
🆒3🦄2🔥1
🍾 Finally! pwned "Locked and Loaded" Blockchain Challenge At HTB & Solved All the blockchain challenges (Non-VIP)

🔗 X
🔗 Linkedin
🍾9❤‍🔥21
Forwarded from Ali Soltani
🔐 Join the GO-TO CVE Channel! 🔐

Every week, we take a deep dive into the latest CVE vulnerabilities, explaining how they work and how to protect against them. We also share custom exploits and pentesting techniques to help you understand the vulnerabilities better. Additionally, we cover SOC (Security Operations Center) strategies and provide insights on malware analysis regularly. Stay informed, stay secure! 🚨

👉 If you’re passionate about cybersecurity or just want to stay ahead of the latest threats, this is the place for you. Let’s build a safer tomorrow together!

Join us now and be part of the conversation:
🔗 https://news.1rj.ru/str/GOTOCVE
🔥4🙏1
1️⃣5️⃣ #ETHERNAUT #level_15 #Naught_Coin

before call the exploit function, don't forgot to call approve() :
cast send $TARGET_CONTRACT_ADDRESS "approve(address,uint256)" EXPLOIT_CONTRACT_ADDRESS 1000000000000000000000000 --private-key $PRIVATE_KEY --rpc-url $SEPOLIA_RPC_URL


🥷🍷 <Happy Hacking/>
😈12🔥1👌1