diff --git a/session-3-assignments/README.md b/session-3-assignments/README.md new file mode 100644 index 0000000..2d84e53 --- /dev/null +++ b/session-3-assignments/README.md @@ -0,0 +1,29 @@ +# Ethernaut Capture the Flag (CTF) +The Ethernaut is a Web3/Solidity based wargame inspired by overthewire.org, played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players. + +# Assignments + +## Submission +Please create a pull request with: +- The instance address of the contract you submitted +- Your wallet address +- The testnet you are using +- Any code you wrote for your exploit + +## Ethernaut Level 3 CoinFlip +https://ethernaut.openzeppelin.com/ + +## Read through through audit report and + +Read through the following audit report and write a detailed description about one of the vulnerabilities as a comment on this issue: https://github.com/KITTLABS/web3-Q2-security-training/issues/12 + + +https://code4rena.com/reports/2023-01-numoen/ + + +# Optional Assignment +Hint: This level can be exploited with one of the attack vectors we went over in session 3. + +## Ethernaut Level 10 Re-entrancy +https://ethernaut.openzeppelin.com/ + diff --git a/session-4-assignments/README.md b/session-4-assignments/README.md new file mode 100644 index 0000000..f20f9b9 --- /dev/null +++ b/session-4-assignments/README.md @@ -0,0 +1,18 @@ +# Ethernaut Capture the Flag (CTF) +The Ethernaut is a Web3/Solidity based wargame inspired by overthewire.org, played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players. + +# Assignments + +## Submission +Please create a pull request with: +- The instance address of the contract you submitted +- Your wallet address +- The testnet you are using +- Any code you wrote for your exploit + +## Ethernaut Level 4 Telephone +https://ethernaut.openzeppelin.com/ + +## Ethernaut Level 5 Token +https://ethernaut.openzeppelin.com/ + diff --git a/session-5-assignments/README.md b/session-5-assignments/README.md new file mode 100644 index 0000000..2e8a4d2 --- /dev/null +++ b/session-5-assignments/README.md @@ -0,0 +1,31 @@ +# Ethernaut Capture the Flag (CTF) +Damn Vulnerable DeFi is the wargame to learn offensive security of DeFi smart contracts in Ethereum. + +Featuring flash loans, price oracles, governance, NFTs, DEXs, lending pools, smart contract wallets, timelocks, and more! + +# Assignments + +## Submission +Please create a pull request with: +- The instance address of the contract you submitted +- Your wallet address +- The testnet you are using +- Any code you wrote for your exploit + + +## Ethernaut Level 15 NaughtCoin +https://ethernaut.openzeppelin.com/ + +## Read through through audit report and + +Read through the following audit report and write a detailed description about one of the vulnerabilities as a comment on this issue: https://github.com/KITTLABS/web3-Q2-security-training/issues/17 + + +https://code4rena.com/reports/2023-01-blockswap-fv + + +# Optional Assignment +Hint: This level can be exploited with one of the attack vectors we went over in session 5. + +## Damn Vulnerable Defi Level 2: Naive reciever +https://www.damnvulnerabledefi.xyz/challenges/naive-receiver/