当前位置:网站首页>When Netflix's NFTs Forget Web2 Business Security
When Netflix's NFTs Forget Web2 Business Security
2022-08-02 00:15:00 【Blockchain-Metaverse-Chain Games-NFT-Digital Collection】
Netflix Netflix is a video entertainment service company with a market value of 80 billion US dollars, and has 222 million paid members in more than 190 countries/regions. How can such a giant let go of the web3 outlet?
Therefore, under the recent popularity of X2earn, he also creatively created a Watch to Eran
Official entrance: https://lovedeathandart.com/

Probably a QR code will randomly appear when members are reading the video. After combining with the user's Ethereum address, the official will sign the information, and the user will get a signature value, and with this value, you canIn the NFT contract officially released by netflix, casting an nft, as shown in the figure, is very good in aesthetics and combined with a stable economic model, perhaps it is a top-notch project like running shoes!
So at the beginning, everyone wanted to make a wave of members, come and watch 2 eran slowly

However, I never imagined that the process of getting the official signature was completely unprotected!
At the beginning of the event, when the web3 scientists were full of excitement and trembling hands to grab the package and waited until they received the QR code, they were surprised to find that the original scan code signature does not need to be authenticated with the web2 account, and there is no risk controllogic???
Just construct the following request and write your own Ethereum address and serial number in the target

The mac system can be issued directly on the command line, and the window system can use postman and other request package building tools to issue this request.There will be a signature in the returned information.
Then go to the official contract address
https://etherscan.io/address/0xfd43d1da000558473822302e1d44d81da2e4cc0d#writeContract
Write, write a data value at will (it is not verified in the contract), and the corresponding serial number, you can mint.
And a few hours later, some students made a one-click script to further reduce the difficulty of operation.

Because the cost of obtaining this nft is too low, under the current gas cost of 20wei, there have been 5W transactions as of 5.20-9 o'clock, most of which are mint operations.Of course, after the bug occurs, the price of this nft will not be too high, and everyone is equivalent to participating in the experience and playing
But for Netflix, an idea that might rival stepn was blown up in the most basic web2 business process.
Although in a sense, the spread of this bug seems to be completely beyond the planning of the event itself..

Interpretation from a security perspective
1: It belongs to the standard design mode. It is combined with the signature verification method of eip1271 to determine the eligibility for the whitelist. 1271 is designed for signing contracts. The specified isValidSignature can set any signature verification logic, such as supporting single signature, multiple signaturessignature, threshold signature, etc.
If such signature verification is not performed, how to control the mint whitelist in this activity is a high cost issue.
Because the event itself is to motivate users to continue watching,
If the accumulated whitelist merkle tree is rooted on the chain for a period of time, the user will be motivated and feedback will be longer
And if every time you get a user, you will be whitelisted once, which will cause high costs for the event party
2: Secondly, the contract will also include the serial number of this wallet address into hasMinted to prevent replay, and the method is to modify the permissions first and then operate mint, which is also in place.
web2
But from the point of view of web2, the cost of breaking through the link in which he obtains the official signature is almost zero.This can be compared to the traditional web2 marketing and issuing coupons, which has always been a big challenge for enterprises.
The author has been engaged in web2 business security risk control for 5 years. Out of professional habit, I also add web2's easy-to-use security protection countermeasures.
The core is a system that relies on a sound account security system, a comprehensive blacklist database, and a real-time confrontation strategy.
A robust web2 marketing anti-cheating scenario protection requires 4 major steps:
1: Business Risk Assessment = Product Logic Data Embedding Embedding Processing Dynamic Embedding Confrontation
2: Offline Strategy Modeling = Strategy R&D Validation Online Evaluation
3: Continued confrontation on the existing network = strategy grayscale strategy monitoring strategy iteration dynamic attack and defense customer complaint feedback black product intelligence
4: Confrontation of decision-making and disposal = timely blocking of behavior, human-machine verification, identity verification
It is highly dependent on the quality of black data, which is the basis of cost confrontation. The core includes device fingerprint library, IP portrait library, mobile phone portrait library, account portrait library, etc.
Finally, the continuous algorithm strengthens policy detection, such as anomaly detection, gang detection, behavior detection, etc.
Anyway
The foundation of web2 is not lost to the glory of running shoes. Web3 is a marketing tool but it is not an independent ecology. In the long run, it will coexist with many infrastructures of web2.
边栏推荐
猜你喜欢

DVWA靶场环境搭建

cdh6 opens oozieWeb page, Oozie web console is disabled.

Chrome书签插件,让你实现高效整理

Enterprise firewall management, what firewall management tools are there?

GetHashCode方法与=

Work for 5 years, test case design is bad?To look at the big case design summary

WEB安全基础 - - - XRAY使用

【加密周报】经济衰退在加息气氛中蔓延 美联储“放手一搏”?盘点上周加密市场发生的重大事件

REST会消失吗?事件驱动架构如何搭建?

如何进行数据库备份
随机推荐
Docker实践经验:Docker 上部署 mysql8 主从复制
QML包管理
【Leetcode】470. Implement Rand10() Using Rand7()
【无标题】
Various Joins of Sql
An interview question about iota in golang
2022 6th Strong Net Cup Part WP
零基础如何学习单片机,一位入门者的进阶路径,可参考
ansible模块--copy模块
REST会消失吗?事件驱动架构如何搭建?
Is TCP reliable?Why?
多御安全浏览器android版更新至1.7,改进加密协议
【MySQL系列】 MySQL表的增删改查(进阶)
FAST-LIO2 code analysis (2)
els 方块边界变形处理
重装腾讯云云监控后如果对应服务不存在可通过sc.exe命令添加服务
Excel表格数据导入MySQL数据库
尚硅谷MySQL学习笔记
TCP 可靠吗?为什么?
C语言七夕来袭!是时候展现专属于程序员的浪漫了!