当前位置:网站首页>How I secured 70,000 ETH and won a 6 million bug bounty
How I secured 70,000 ETH and won a 6 million bug bounty
2022-08-01 10:02:00 【Xijing Swordsman】
Article table of contents
How I secured 70,000 ETH and won a 6 million bug bounty
Original link: https://pwning.mirror.xyz/CB4XUkbJVwPo7CaRwRmCAPaP2DMjPQccW-NOcCwQlAs
Hello!I'm pwning.eth, a wanderer in the hacker space who recently jumped into the crypto world.A few months ago, I reported a critical bug in the Aurora engine, a layer 2 EVM solution based on the NEAR protocol.At least 70,000 ETH was at risk of being stolen until I discovered the thorny vulnerability and helped the Aurora team fix it.If 200 million tokens were taken over by black hackers, it would be the top five heists in Defi history.In the end, I won a bug bounty of 6 million, which is the second largest bounty in history.
I'm an experienced white hat Hacker from the Web2 world.I've seen hacks in the crypto world for a while and there's a lot of randomness!I'm not surprised by the astronomical profits of Defi Hackers, since real-world criminals also make a lot of money. However, I really feel for the story of Saurik, a famous hacker in the IOS jailbreak communityShock.The scale of his bug bounties is unheard of in the traditional security world, so I can't wait to start my own treasure hunt in Web3.
I first check the bounty list on Immunefi.The Aurora Bounty Program, listed at the top of the site, caught my eye due to its huge bounty offer.This is a new type of project made by a group of talented engineers, which suggests that it might be complex enough to be immune to common Defi Hackers, and mysterious enough that I could learn something magical.Because of my experience in hacking modern complex systems, I was able to quickly start researching new blockchains. I reviewed the Aurora bridge and it was a solid project.Then I looked into the Aurora engine and found the unicorn bug within a few hours.Unlike normal defi exploits, I thought I was quick and lucky to randomly identify this bug, so I took the time to verify and replicate this bug in case it was a false positive.I spent days studying, building, learning, testing and finally finalizing the report.
I tried contacting the Aurora team on Discord, messaging the official bounty email, and submitting issues via Immunefi.They quickly identified and patched the vulnerability, official link.Their reward for critical vulnerabilities in smart contracts is calculated as 10% of their potential economic damage, worth up to $6,000,000. In this case, the potential damage may be ten times higher than this maximum reward.Therefore, I am eligible to receive the maximum possible amount in the form of locked Aurora tokens, with a total value of $6,000,000.Listed on Immunefi, a very wise and lucky move :)
Technical details have been explained by Immunefi.Here is my short summary:
- Aurora engine implements bridging tokens in pre-built contracts with hardcoded addresses.They are magic bridges for connecting Ethereum, NEAR and Aurora.
- Vulnerable contracts are issued at a specific address in bridge events, assuming
msg.valueis collected by itself.
However, if the contract is called bydelegatecall(),msg.valueis never sent to the contract, but logs are sent as usual. - By repeating malicious withdrawals, an attacker can exponentially double the balance.Infinite inflation of ETH could disrupt Aurora's entire ecosystem: all 71K ETH in Aurora's account could be depleted, and the free ETH could have bought other valuable tokens.(Billions of TVLs on the Aurora Bridge)
If you're hardcore enough, you might find The original report and script is fun, enjoy!
边栏推荐
猜你喜欢
随机推荐
基于CAP组件实现补偿事务与消息幂等性
50.【动态二维数组的运用】
redis
会议OA(待开会议&所有会议)
报告:想学AI的学生数量已涨200%,老师都不够用了
堆内存的介绍及应用(含例子)
实验。。。。
CTO strongly banning the use of the Calendar, that in what?
Go-Excelize API源码阅读(八)——GroupSheets(sheets []string)、UngroupSheets()
编码解码(btoa、encodeURIComponent、encodeURI、escape)
Enterprise WeChat group: robot timing reminder function database configuration
In the background of the GBase 8c database, what command is used to perform the master-slave switchover operation for the gtm and dn nodes
2022年7月31日--使用C#迈出第一步--使用C#中的数组和foreach语句来存储和循环访问数据序列
记一次 .NET 某智慧物流WCS系统CPU爆高分析
notes....
使用ESP32驱动QMA7981读取三轴加速度(带例程)
Google Earth Engine——给影像添加一个属性对于单景的时间序列并返回影像
Manual upgrade and optimization tutorial of Lsky Pro Enterprise Edition
redis
Explain / Desc 执行计划分析









