ctfnote
search
⌘Ctrlk
ctfnote
  • /home/ret2basic.eth
  • Web3 Security Research
    • πŸ‘‘Web3 Security Research Trivia
    • DeFi
    • πŸ‘‘Secureum
      • βœ…Epoch 0
        • βœ…Slot 1: Ethereum 101
        • βœ…Slot 2: Solidity 101
        • βœ…Slot 3: Solidity 201
        • βœ…Slot 4: Pitfalls and Best Practices 101
        • βœ…Slot 5: Pitfalls and Best Practices 201
          • βœ…Notes
          • So you want to use a price oracle
          • The Dangers of Surprising Code
          • βœ…Quiz
        • βœ…Slot 6: Auditing Techniques & Tools 101
        • βœ…Slot 7: Audit Findings 101
        • βœ…Slot 8: Audit Findings 201
      • πŸ‘‘Epoch ∞
    • βœ…Solidity
    • βœ…Foundry
    • EVM
    • Vulnerabilities
  • Game Hacking
    • βœ…C++
    • Ghidra
    • Cheat Engine
    • Proxy
    • DLL injection
    • Keygen
    • Aimbot
  • Red Teaming
    • βœ…Enumeration
    • βœ…Exploitation
    • βœ…Buffer Overflow
    • βœ…Privilege Escalation
    • βœ…Post Exploitation
    • βœ…Pivoting
    • Active Directory (AD)
    • Command & Control (C2)
    • Malware Development
  • Cryptography
    • Hash Functions
    • MAC
    • AES
    • Diffie-Hellman
    • RSA
    • ECC
    • Digital Signature
    • JWT
    • PRNG
    • SSL/TLS
    • Research
  • Computer Science
    • Linux
    • Python
    • HTML, CSS, JavaScript, and React
    • Data Structures and Algorithms
    • The Linux Programming Interface
    • Computer Systems
    • Databases
    • Distributed Systems
    • Static Analysis
  • Web
    • βœ…Prerequisites
    • File Upload
    • SQL Injection (SQLi)
    • Cross-Site Scripting (XSS)
    • CSRF and SSRF
    • XML External Entities (XXE)
    • Insecure Deserialization
    • HTTP Request Smuggling
    • OS Command Injection
    • βœ…Directory Traversal
    • HTTP Parameter Pollution
    • Server-Side Template Injection (SSTI)
    • LDAP Injection
    • Redis
  • Pwn
    • Linux Exploitation
    • Windows Exploitation
    • Fuzzing
  • Reverse
    • Bytecode
    • πŸ‘‘Z3 solver
    • angr
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Web3 Security Researchchevron-right
  2. πŸ‘‘Secureumchevron-right
  3. βœ…Epoch 0

βœ…Slot 5: Pitfalls and Best Practices 201

hashtag
Blog

Article on "Security Pitfalls & Best Practices 201"arrow-up-right

hashtag
Youtube Videos

  1. Block 1arrow-up-right

  2. Block 2arrow-up-right

  3. Block 3arrow-up-right

  4. Block 4arrow-up-right

  5. Block 5arrow-up-right

hashtag
Participant Created Content

  • Security Pitfalls & Best Practices 101 and 201 - D-Squaredarrow-up-right

hashtag
Assignment

hashtag
Quiz

  • Slot 5 quizarrow-up-right

hashtag
Quiz Writeups

  • https://ventral.digital/posts/2021/11/14/secureum-bootcamp-security-pitfalls-amp-best-practices-201-quizarrow-up-right

PreviousQuizchevron-leftNextNoteschevron-right

Last updated 2 years ago