Skip to content
This repository has been archived by the owner on Oct 29, 2023. It is now read-only.

Ethernaut challenge 1 -Hello Ethernaut & Challenge 2- Fallback Yardi244 #11

Open
wants to merge 9 commits into
base: web3mayne-Session-1
Choose a base branch
from
29 changes: 29 additions & 0 deletions session-3-assignments/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
# Ethernaut Capture the Flag (CTF)
The Ethernaut is a Web3/Solidity based wargame inspired by overthewire.org, played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players.

# Assignments

## Submission
Please create a pull request with:
- The instance address of the contract you submitted
- Your wallet address
- The testnet you are using
- Any code you wrote for your exploit

## Ethernaut Level 3 CoinFlip
https://ethernaut.openzeppelin.com/

## Read through through audit report and

Read through the following audit report and write a detailed description about one of the vulnerabilities as a comment on this issue: https://github.com/KITTLABS/web3-Q2-security-training/issues/12


https://code4rena.com/reports/2023-01-numoen/


# Optional Assignment
Hint: This level can be exploited with one of the attack vectors we went over in session 3.

## Ethernaut Level 10 Re-entrancy
https://ethernaut.openzeppelin.com/

18 changes: 18 additions & 0 deletions session-4-assignments/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
# Ethernaut Capture the Flag (CTF)
The Ethernaut is a Web3/Solidity based wargame inspired by overthewire.org, played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players.

# Assignments

## Submission
Please create a pull request with:
- The instance address of the contract you submitted
- Your wallet address
- The testnet you are using
- Any code you wrote for your exploit

## Ethernaut Level 4 Telephone
https://ethernaut.openzeppelin.com/

## Ethernaut Level 5 Token
https://ethernaut.openzeppelin.com/

31 changes: 31 additions & 0 deletions session-5-assignments/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
# Ethernaut Capture the Flag (CTF)
Damn Vulnerable DeFi is the wargame to learn offensive security of DeFi smart contracts in Ethereum.

Featuring flash loans, price oracles, governance, NFTs, DEXs, lending pools, smart contract wallets, timelocks, and more!

# Assignments

## Submission
Please create a pull request with:
- The instance address of the contract you submitted
- Your wallet address
- The testnet you are using
- Any code you wrote for your exploit


## Ethernaut Level 15 NaughtCoin
https://ethernaut.openzeppelin.com/

## Read through through audit report and

Read through the following audit report and write a detailed description about one of the vulnerabilities as a comment on this issue: https://github.com/KITTLABS/web3-Q2-security-training/issues/17


https://code4rena.com/reports/2023-01-blockswap-fv


# Optional Assignment
Hint: This level can be exploited with one of the attack vectors we went over in session 5.

## Damn Vulnerable Defi Level 2: Naive reciever
https://www.damnvulnerabledefi.xyz/challenges/naive-receiver/