Seekshell
Signature Reply Attack - Printable Version

+- Seekshell (https://seekshell.com)
+-- Forum: General (https://seekshell.com/forumdisplay.php?fid=1)
+--- Forum: Web3 & Blockchain (https://seekshell.com/forumdisplay.php?fid=26)
+--- Thread: Signature Reply Attack (/showthread.php?tid=452)



Signature Reply Attack - _blockchainer_ - 02-06-2023

Please login or register to view this content




RE: Signature Reply Attack - PENTESTER - 02-06-2023

awesome


RE: Signature Reply Attack - theguilty - 02-07-2023

(02-06-2023, 02:50 PM)_blockchainer_ Wrote: Signature vulnerablities on solidity are tricky to discover but attacker can make a devastating attack once discovered.
[Image: FI-mak4WYAM5DyL?format=jpg&name=large]

the code on the above snippet looks alright? no. You can reply signatures since both parameters on the messageHash/_to and _amount/ are in control of the user and there is nothing hidden/unique for the variable messageHash. when we study about Signature attacks we get to know that randomness, which is really a hot issue for the blockchain. since everything is transparent there is not true randomness here. and this core blockchain problem was a problem for signature verification too. With no randomness, how is that possible to make unique signature? looks impossible but there is a concept and also an implementation called "Oracle" with that you can feed datas, like price data, numbers and other. with a oracle this data comes from outside of blockchain. this fails blockchain from being decentralized ,huh? yes. but there is a way to make oracle network decentralized. soon we may get a chance to study possible vulnerablities when using oracle chains.



Wormhole bridge exploit(the second biggest ETH hack up to the date) was performed by malicious use of signatures.

Bonus: If you want to become good with solidity security, read the official solidity Documentation. that will help you a lot.


thanks