Artwork

Inhoud geleverd door HackerNoon. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door HackerNoon of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

Exploiting EIP-7702 Delegation in the Ethernaut Cashback Challenge — A Step-by-Step Writeup

13:49
 
Delen
 

Manage episode 522836480 series 3474370
Inhoud geleverd door HackerNoon. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door HackerNoon of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

This story was originally published on HackerNoon at: https://hackernoon.com/exploiting-eip-7702-delegation-in-the-ethernaut-cashback-challenge-a-step-by-step-writeup.
How to exploit EIP-7702 delegation flaws: A deep dive into the Ethernaut Cashback challenge with bytecode hacks and storage attacks
Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive content about #ethernaut, #eip-7702, #security, #exploiting-eip-7702, #eip-7702-delegation, #paywithcashback, #cashback-contract, #hackernoon-top-story, and more.
This story was written by: @hacker39947670. Learn more about this writer by checking @hacker39947670's about page, and for more stories, please visit hackernoon.com.
The Ethernaut Cashback challenge exploits flawed EIP-7702 delegation security. The contract's modifiers assume strict access controls, but have critical vulnerabilities: First exploit: Craft a contract with the Cashback address embedded in bytecode at the expected offset, bypassing the onlyDelegatedToCashback modifier. Jump over the address to execute normally. Call accrueCashback directly to gain max cashback for both currencies and one NFT. Second exploit: Use storage collision—delegate your EOA to a contract that writes to the same nonce slot, inject nonce = 9999, then re-delegate to Cashback and execute one final transaction to reach nonce 10,000 and mint a second NFT with your player address. Key lesson: Never store security-critical state in EOAs—delegation allows unrestricted storage manipulation across delegated contracts.Retry

  continue reading

445 afleveringen

Artwork
iconDelen
 
Manage episode 522836480 series 3474370
Inhoud geleverd door HackerNoon. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door HackerNoon of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

This story was originally published on HackerNoon at: https://hackernoon.com/exploiting-eip-7702-delegation-in-the-ethernaut-cashback-challenge-a-step-by-step-writeup.
How to exploit EIP-7702 delegation flaws: A deep dive into the Ethernaut Cashback challenge with bytecode hacks and storage attacks
Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive content about #ethernaut, #eip-7702, #security, #exploiting-eip-7702, #eip-7702-delegation, #paywithcashback, #cashback-contract, #hackernoon-top-story, and more.
This story was written by: @hacker39947670. Learn more about this writer by checking @hacker39947670's about page, and for more stories, please visit hackernoon.com.
The Ethernaut Cashback challenge exploits flawed EIP-7702 delegation security. The contract's modifiers assume strict access controls, but have critical vulnerabilities: First exploit: Craft a contract with the Cashback address embedded in bytecode at the expected offset, bypassing the onlyDelegatedToCashback modifier. Jump over the address to execute normally. Call accrueCashback directly to gain max cashback for both currencies and one NFT. Second exploit: Use storage collision—delegate your EOA to a contract that writes to the same nonce slot, inject nonce = 9999, then re-delegate to Cashback and execute one final transaction to reach nonce 10,000 and mint a second NFT with your player address. Key lesson: Never store security-critical state in EOAs—delegation allows unrestricted storage manipulation across delegated contracts.Retry

  continue reading

445 afleveringen

כל הפרקים

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding

Luister naar deze show terwijl je op verkenning gaat
Spelen