If playback doesn't begin shortly, try restarting your device.
•
You're signed out
Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.
CancelConfirm
Share
An error occurred while retrieving sharing information. Please try again later.
Join us in the Black Hills InfoSec Discord server here: / discord to keep the security conversation going!
Reach out to Black Hills Infosec if you need pentesting, threat hunting, ACTIVE SOC, incident response, or blue team services -- https://www.blackhillsinfosec.com00:00 - Demystifying Web3 Attack Vectors, with Beau Bullock and Steve Borosh
02:07 - About Us
03:05 - Topic Roadmap
04:44 - What is Web 3
08:04 - Web3 - Backend
10:41 - Repeat Offender
11:39 - Ethereum Name Service (ENS)
13:03 - Keys to the Kingdom
15:08 - Social Engineering
15:30 - Private Key and Seed Theft
17:20 - Token Approvals
20:21 - Malicious Token Airdrops
21:45 - Discord Hacks
26:45 - SIM Swaps
27:32 - Rugpulls
29:44 - Honey Contracts
31:21 - Offensive dApps
32:48 - Web 2 Attacks Affecting Web3 Apps
32:59 - WebApp Frontend Attacks
35:27 - Node Compromise
37:20 - Traditional Vulnerabilities
39:37 - Administrative Issues
41:57 - Centralized Exchange Attacks
43:06 - …...more