Part 3: Novel Attacks
In the third part of this book, we will continue our journey into contemporary scenarios, focusing on applications moving from the web and cloud servers to endpoints and decentralized blockchains.
Still using our hands-on approach, we will analyze one of our CVEs (XSS, leading to RCE), found in an Electron JavaScript application, and one CTF we wrote as an Ethereum Smart Contract in Solidity (Business Logic, Reentrancy and Weak Sources of Randomness).
We will conclude by reflecting on the method we used to analyze vulnerabilities in the book and the well-known dilemma regarding vulnerability disclosure.
This part has the following chapters:
- Chapter 6, Attacking Electron JavaScript Applications – from Cross-Site Scripting (XSS) to Remote Command Execution (RCE)
- Chapter 7, Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic
- Chapter 8, Continuing the Journey of Vulnerability Discovery...