当前位置:网站首页>How I secured 70,000 ETH and won a 6 million bug bounty
How I secured 70,000 ETH and won a 6 million bug bounty
2022-08-01 10:02:00 【Xijing Swordsman】
Article table of contents
How I secured 70,000 ETH and won a 6 million bug bounty
Original link: https://pwning.mirror.xyz/CB4XUkbJVwPo7CaRwRmCAPaP2DMjPQccW-NOcCwQlAs
Hello!I'm pwning.eth, a wanderer in the hacker space who recently jumped into the crypto world.A few months ago, I reported a critical bug in the Aurora engine, a layer 2 EVM solution based on the NEAR protocol.At least 70,000 ETH was at risk of being stolen until I discovered the thorny vulnerability and helped the Aurora team fix it.If 200 million tokens were taken over by black hackers, it would be the top five heists in Defi history.In the end, I won a bug bounty of 6 million, which is the second largest bounty in history.
I'm an experienced white hat Hacker from the Web2 world.I've seen hacks in the crypto world for a while and there's a lot of randomness!I'm not surprised by the astronomical profits of Defi Hackers, since real-world criminals also make a lot of money. However, I really feel for the story of Saurik, a famous hacker in the IOS jailbreak communityShock.The scale of his bug bounties is unheard of in the traditional security world, so I can't wait to start my own treasure hunt in Web3.
I first check the bounty list on Immunefi.The Aurora Bounty Program, listed at the top of the site, caught my eye due to its huge bounty offer.This is a new type of project made by a group of talented engineers, which suggests that it might be complex enough to be immune to common Defi Hackers, and mysterious enough that I could learn something magical.Because of my experience in hacking modern complex systems, I was able to quickly start researching new blockchains. I reviewed the Aurora bridge and it was a solid project.Then I looked into the Aurora engine and found the unicorn bug within a few hours.Unlike normal defi exploits, I thought I was quick and lucky to randomly identify this bug, so I took the time to verify and replicate this bug in case it was a false positive.I spent days studying, building, learning, testing and finally finalizing the report.
I tried contacting the Aurora team on Discord, messaging the official bounty email, and submitting issues via Immunefi.They quickly identified and patched the vulnerability, official link.Their reward for critical vulnerabilities in smart contracts is calculated as 10% of their potential economic damage, worth up to $6,000,000. In this case, the potential damage may be ten times higher than this maximum reward.Therefore, I am eligible to receive the maximum possible amount in the form of locked Aurora tokens, with a total value of $6,000,000.Listed on Immunefi, a very wise and lucky move :)
Technical details have been explained by Immunefi.Here is my short summary:
- Aurora engine implements bridging tokens in pre-built contracts with hardcoded addresses.They are magic bridges for connecting Ethereum, NEAR and Aurora.
- Vulnerable contracts are issued at a specific address in bridge events, assuming
msg.valueis collected by itself.
However, if the contract is called bydelegatecall(),msg.valueis never sent to the contract, but logs are sent as usual. - By repeating malicious withdrawals, an attacker can exponentially double the balance.Infinite inflation of ETH could disrupt Aurora's entire ecosystem: all 71K ETH in Aurora's account could be depleted, and the free ETH could have bought other valuable tokens.(Billions of TVLs on the Aurora Bridge)
If you're hardcore enough, you might find The original report and script is fun, enjoy!
边栏推荐
- The use of scrapy crawler framework
- 阿里腾讯面试一二
- ASP.NET Core 6 Framework Revealing Instance Demonstration [30]: Develop REST API with Routing
- Shell: Conditional test action
- SkiaSharp 之 WPF 自绘 五环弹动球(案例版)
- STM32 personal notes - program run and fly
- Is the real database data of TiDB stored in kv and pd?
- C语言小游戏——扫雷
- Google Earth Engine——给影像添加一个属性对于单景的时间序列并返回影像
- 消息队列面试题(2022最新整理)
猜你喜欢
随机推荐
怎么找出电脑隐藏的软件(如何清理电脑隐藏软件)
将本地项目推送到远程仓库
Explain / Desc 执行计划分析
安装GBase 8c数据库的时候,报错显示“Resource,如何解决?
量化日常工作指标
C语言小游戏——扫雷
sql server, FULL mode, dbcc shrinkfile(2,1) can not shrink the transaction log, or the original size, why?
报告:想学AI的学生数量已涨200%,老师都不够用了
mysql login in cmd and basic operations of database and table
已解决(pip安装库报错)Consider using the-- user option or check the permissions.
CTFshow,命令执行:web31
7/31 训练日志
世界第4疯狂的科学家,在103岁生日那天去世了
微服务:事务管理
Go-Excelize API source code reading (8) - GroupSheets(sheets []string), UngroupSheets()
Meeting OA (Upcoming Meetings & All Meetings)
rpm和yum
周鸿祎称微软抄袭 360 安全模式后发文否认;英特尔CEO基辛格回应市值被AMD超越:股价下跌是咎由自取|极客头条
sqlserver怎么查询一张表中同人员的交叉日期
InputStream转成String








