From 0753f13263d058e2339f7bd4bf3129d30ecdda98 Mon Sep 17 00:00:00 2001 From: Robert Leonard Date: Sat, 22 Apr 2023 08:39:27 -0400 Subject: [PATCH 1/4] session-3-assignment --- Readme.md | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 Readme.md diff --git a/Readme.md b/Readme.md new file mode 100644 index 0000000..2d84e53 --- /dev/null +++ b/Readme.md @@ -0,0 +1,29 @@ +# Ethernaut Capture the Flag (CTF) +The Ethernaut is a Web3/Solidity based wargame inspired by overthewire.org, played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players. + +# Assignments + +## Submission +Please create a pull request with: +- The instance address of the contract you submitted +- Your wallet address +- The testnet you are using +- Any code you wrote for your exploit + +## Ethernaut Level 3 CoinFlip +https://ethernaut.openzeppelin.com/ + +## Read through through audit report and + +Read through the following audit report and write a detailed description about one of the vulnerabilities as a comment on this issue: https://github.com/KITTLABS/web3-Q2-security-training/issues/12 + + +https://code4rena.com/reports/2023-01-numoen/ + + +# Optional Assignment +Hint: This level can be exploited with one of the attack vectors we went over in session 3. + +## Ethernaut Level 10 Re-entrancy +https://ethernaut.openzeppelin.com/ + From e59a9a3c7b8b79dcb0fd0dfa7411dfd58d2157fb Mon Sep 17 00:00:00 2001 From: Robert Leonard Date: Sat, 22 Apr 2023 08:41:40 -0400 Subject: [PATCH 2/4] session-3-assignment --- session-3-assignments/README.md | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 session-3-assignments/README.md diff --git a/session-3-assignments/README.md b/session-3-assignments/README.md new file mode 100644 index 0000000..2d84e53 --- /dev/null +++ b/session-3-assignments/README.md @@ -0,0 +1,29 @@ +# Ethernaut Capture the Flag (CTF) +The Ethernaut is a Web3/Solidity based wargame inspired by overthewire.org, played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players. + +# Assignments + +## Submission +Please create a pull request with: +- The instance address of the contract you submitted +- Your wallet address +- The testnet you are using +- Any code you wrote for your exploit + +## Ethernaut Level 3 CoinFlip +https://ethernaut.openzeppelin.com/ + +## Read through through audit report and + +Read through the following audit report and write a detailed description about one of the vulnerabilities as a comment on this issue: https://github.com/KITTLABS/web3-Q2-security-training/issues/12 + + +https://code4rena.com/reports/2023-01-numoen/ + + +# Optional Assignment +Hint: This level can be exploited with one of the attack vectors we went over in session 3. + +## Ethernaut Level 10 Re-entrancy +https://ethernaut.openzeppelin.com/ + From 72cadb7fa3f4e1e00f88889cf31530a60a6417e7 Mon Sep 17 00:00:00 2001 From: Robert Leonard <40375385+Robert-H-Leonard@users.noreply.github.com> Date: Sat, 22 Apr 2023 05:42:35 -0700 Subject: [PATCH 3/4] Delete Readme.md --- Readme.md | 29 ----------------------------- 1 file changed, 29 deletions(-) delete mode 100644 Readme.md diff --git a/Readme.md b/Readme.md deleted file mode 100644 index 2d84e53..0000000 --- a/Readme.md +++ /dev/null @@ -1,29 +0,0 @@ -# Ethernaut Capture the Flag (CTF) -The Ethernaut is a Web3/Solidity based wargame inspired by overthewire.org, played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players. - -# Assignments - -## Submission -Please create a pull request with: -- The instance address of the contract you submitted -- Your wallet address -- The testnet you are using -- Any code you wrote for your exploit - -## Ethernaut Level 3 CoinFlip -https://ethernaut.openzeppelin.com/ - -## Read through through audit report and - -Read through the following audit report and write a detailed description about one of the vulnerabilities as a comment on this issue: https://github.com/KITTLABS/web3-Q2-security-training/issues/12 - - -https://code4rena.com/reports/2023-01-numoen/ - - -# Optional Assignment -Hint: This level can be exploited with one of the attack vectors we went over in session 3. - -## Ethernaut Level 10 Re-entrancy -https://ethernaut.openzeppelin.com/ - From 2e073f0349e6d227a329dcd2d54632ac47574db3 Mon Sep 17 00:00:00 2001 From: Bryan Conklin <6412103+thor4@users.noreply.github.com> Date: Sun, 30 Apr 2023 15:08:23 -0400 Subject: [PATCH 4/4] Update README.md --- session-3-assignments/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/session-3-assignments/README.md b/session-3-assignments/README.md index 2d84e53..6428c8d 100644 --- a/session-3-assignments/README.md +++ b/session-3-assignments/README.md @@ -26,4 +26,4 @@ Hint: This level can be exploited with one of the attack vectors we went over in ## Ethernaut Level 10 Re-entrancy https://ethernaut.openzeppelin.com/ - +