Skip to content

Conversation

@AshiqAmien
Copy link

The aim of this level is to teach the user how to decompile EVM bytecode, as well as call functions without an ABI. The instance contract uses the ABI of untampered source code, while the backdoored source code is deployed. The steps to complete the level is as follows:

  • Decompile the contract to find the backdoor function, and notice that it's linked to the ERC20 transfer function.
  • Activate the backdoor by calling the function with the function signature, along with the encoded secret string as a parameter.
  • Call the now-backdoored transfer function to drain the owner's tokens.

I'd appreciate any feedback - I'm open to any suggestions for changes and improvements to the level.

@AshiqAmien AshiqAmien changed the title Added SafeToken level Add SafeToken level Dec 23, 2020
JithinKS97 added a commit to JithinKS97/ethernaut that referenced this pull request Jan 10, 2023
moved files

upgraded solidity levels

upgraded contracts

corrected the tests

changed bytecode decompiler

added review comment changes

added images
JithinKS97 added a commit to JithinKS97/ethernaut that referenced this pull request Jan 10, 2023
moved files

upgraded solidity levels

upgraded contracts

corrected the tests

changed bytecode decompiler

added review comment changes

added images
@JithinKS97 JithinKS97 mentioned this pull request Jan 10, 2023
JithinKS97 added a commit to JithinKS97/ethernaut that referenced this pull request Jan 10, 2023
moved files

upgraded solidity levels

upgraded contracts

corrected the tests

changed bytecode decompiler

added review comment changes

added images
@xaler5
Copy link
Collaborator

xaler5 commented Jan 12, 2023

Rebased in here
#547

@xaler5 xaler5 closed this Jan 12, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

2 participants