SlideShare a Scribd company logo
Web3 + scams =


HiTB Singapore, 2022


Zoltan Balazs, CUJO AI
Head of Vulnerability Research Lab @ CUJO AI
Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit

https://github.com/Z6543/ZombieBrowserPack
Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit

https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP


https://github.com/Z6543/hwfwbypass
Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit

https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP


https://github.com/Z6543/hwfwbypass
Malware Analysis Sandbox Tester tool


https://github.com/Z6543/Sandbox_tester
Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit

https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP


https://github.com/Z6543/hwfwbypass
Malware Analysis Sandbox Tester tool


https://github.com/Z6543/Sandbox_tester
Played with crappy IoT devices – my RCE exploit code running on ~600 000 IP cameras via Persirai


https://jumpespjump.blogspot.hu/2015/09/how-i-hacked-my-ip-camera-and-found.html


https://jumpespjump.blogspot.hu/2015/08/how-to-secure-your-home-against.html
Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit

https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP


https://github.com/Z6543/hwfwbypass
Malware Analysis Sandbox Tester tool


https://github.com/Z6543/Sandbox_tester
Played with crappy IoT devices – my RCE exploit code running on ~600 000 IP cameras via Persirai


https://jumpespjump.blogspot.hu/2015/09/how-i-hacked-my-ip-camera-and-found.html


https://jumpespjump.blogspot.hu/2015/08/how-to-secure-your-home-against.html
Invented the idea of encrypted exploit delivery via Dif
fi
e-Hellman key exchange, to bypass exploit
detection appliances


https://www.mrg-ef
fi
tas.com/generic-bypass-of-next-gen-intrusion-threat-breach-detection-systems/
Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit

https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP


https://github.com/Z6543/hwfwbypass
Malware Analysis Sandbox Tester tool


https://github.com/Z6543/Sandbox_tester
Played with crappy IoT devices – my RCE exploit code running on ~600 000 IP cameras via Persirai


https://jumpespjump.blogspot.hu/2015/09/how-i-hacked-my-ip-camera-and-found.html


https://jumpespjump.blogspot.hu/2015/08/how-to-secure-your-home-against.html
Invented the idea of encrypted exploit delivery via Dif
fi
e-Hellman key exchange, to bypass exploit
detection appliances


https://www.mrg-ef
fi
tas.com/generic-bypass-of-next-gen-intrusion-threat-breach-detection-systems/
Co-organizer of the Hackersuli meetup

Programme committee member of the Hacktivity conference

Volunteer at IoTVillage
I ❤ Singapore
I ❤ Singapore
I ❤ Singapore
I ❤ Singapore
What and why
What and why
This is a 2 hour presentation compressed into 25 minutes
What and why
This is a 2 hour presentation compressed into 25 minutes
Fasten your seatbelts
What and why
This is a 2 hour presentation compressed into 25 minutes
Fasten your seatbelts
I love playing with new technologies
What and why
This is a 2 hour presentation compressed into 25 minutes
Fasten your seatbelts
I love playing with new technologies
I
fi
nd blockchain + Web3 fascinating
This presentation is NOT about/for
This presentation is NOT about/for
WHOLE CRYPTO WORLD IS A SCAM!!!!
This presentation is NOT about/for
WHOLE CRYPTO WORLD IS A SCAM!!!!
Smart contract developers
This presentation is NOT about/for
WHOLE CRYPTO WORLD IS A SCAM!!!!
Smart contract developers
Financial advise on which shitcoin to invest in
This presentation is NOT about/for
WHOLE CRYPTO WORLD IS A SCAM!!!!
Smart contract developers
Financial advise on which shitcoin to invest in
Crypto exchange hacks - see six/David's presentation
This presentation is NOT about/for
WHOLE CRYPTO WORLD IS A SCAM!!!!
Smart contract developers
Financial advise on which shitcoin to invest in
Crypto exchange hacks - see six/David's presentation
Cryptocurrency is used as a form of payment, e.g. ransomware
How did we get here?
How did we get here?
Lot of people got rich from cryptocurrencies
How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
Total market capitalisation is around 2 1 trillion USD
How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
Total market capitalisation is around 2 1 trillion USD
2 1,000,000,000,000
How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
Total market capitalisation is around 2 1 trillion USD
2 1,000,000,000,000
New complex technology with crappy UI
How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
Total market capitalisation is around 2 1 trillion USD
2 1,000,000,000,000
New complex technology with crappy UI
What could possibly go wrong?
What is Bitcoin anyway?
Let’s hear it from a trusted,


3 Grammy award winner Blockchain expert!
What is Bitcoin anyway?
Let’s hear it from a trusted,


3 Grammy award winner Blockchain expert!
What is Bitcoin anyway?
https://youtu.be/5AN5veSPfY4
Let’s hear it from a trusted,


3 Grammy award winner Blockchain expert!
Introducing the lamb-o-meter
Step 1: Buy a lot from something what is
cheap and has low volume
Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
Step 3: Sell on top
Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
Step 3: Sell on top
Step 4: PROFIT
Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
Step 3: Sell on top
Step 4: PROFIT
Optional Step 5: Short on top
Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
Step 3: Sell on top
Step 4: PROFIT
Optional Step 5: Short on top
Rug pull
Rug pull
Similar to pump and
dump
Rug pull
Similar to pump and
dump
But you are the owner/
developer of the
cryptocurrency/token/
whatever
Rug pull
Similar to pump and
dump
But you are the owner/
developer of the
cryptocurrency/token/
whatever
Even Conti ransomware
group knew about
SQUID
Rug pull
Similar to pump and
dump
But you are the owner/
developer of the
cryptocurrency/token/
whatever
Even Conti ransomware
group knew about
SQUID
Rug pull
Similar to pump and
dump
But you are the owner/
developer of the
cryptocurrency/token/
whatever
Even Conti ransomware
group knew about
SQUID
Giveaway scam
Giveaway scam
Giveaway scam
Giveaway scam
Giveaway scam
Giveaway scam
Advance fee fraud
https://www.proofpoint.com/us/blog/threat-insight/
advance-fee-fraud-emergence-elaborate-crypto-
schemes
Advance fee fraud
https://www.proofpoint.com/us/blog/threat-insight/
advance-fee-fraud-emergence-elaborate-crypto-
schemes
Advance fee fraud
https://www.proofpoint.com/us/blog/threat-insight/
advance-fee-fraud-emergence-elaborate-crypto-
schemes
Advance fee fraud
https://www.proofpoint.com/us/blog/threat-insight/
advance-fee-fraud-emergence-elaborate-crypto-
schemes
Advance fee fraud
https://www.proofpoint.com/us/blog/threat-insight/
advance-fee-fraud-emergence-elaborate-crypto-
schemes
What is an NFT anyway?
https://twitter.com/zh4ck/nft


https://etherscan.io/nft/0x06012c8cf97bead5deae237070f9587f8e7a266d/634517


https://etherscan.io/tx/
0xfe21bd24d7748890c4deb2453bcd22ab451349fdacb5e812422e16772a664723#eventlog


https://etherscan.io/address/0xb77feddb7e627a78140a2a32cac65a49ed1dba8e#code
The “magical” world of NFTs …
1 ETH = 1700 USD
The “magical” world of NFTs …
1 ETH = 1700 USD
The “magical” world of NFTs …
1 ETH = 1700 USD
The “magical” world of NFTs …
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
The “magical” world of NFTs …
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
The “magical” world of NFTs …
Justin Bieber - 500 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
The “magical” world of NFTs …
Justin Bieber - 500 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
The “magical” world of NFTs …
Snoop Dog - 2500 ETH
Justin Bieber - 500 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
The “magical” world of NFTs …
Snoop Dog - 2500 ETH
Justin Bieber - 500 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
The “magical” world of NFTs …
Snoop Dog - 2500 ETH
Justin Bieber - 500 ETH
Eminem - 123.45 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
The “magical” world of NFTs …
Snoop Dog - 2500 ETH
Justin Bieber - 500 ETH
Eminem - 123.45 ETH
Paris Hilton BAYC - 119 ETH
https://etherscan.io/token/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d#readContract


https://ipfs.io/ipfs/QmeSjSinHpPnmXmspMjwiXyN6zS4E9zccariGR3jxcaWtq/9055


https://cid.ipfs.io/#QmTHcV6mGxHGeeXCnYtV129eRiR8Exni4sT8dDikBWBgzY
1 ETH = 1700 USD
https://www.youtube.com/watch?
v=IjtPe1h4Ca0
https://www.youtube.com/watch?
v=IjtPe1h4Ca0
https://www.youtube.com/watch?
v=IjtPe1h4Ca0
https://www.youtube.com/watch?
v=IjtPe1h4Ca0
https://www.youtube.com/watch?
v=IjtPe1h4Ca0
https://www.youtube.com/watch?
v=IjtPe1h4Ca0
https://www.youtube.com/watch?
v=IjtPe1h4Ca0
Discord scam
Discord scam
Discord servers hacked via bookmarklets
Discord scam
Discord servers hacked via bookmarklets
Discord scam
Discord servers hacked via bookmarklets
Discord scam
Discord servers hacked via bookmarklets
Discord scam
HW wallets - Ledger, Trezor
https://whotookmycrypto.com/
ledger-wallet-scams/
HW wallets - Ledger, Trezor
https://whotookmycrypto.com/
ledger-wallet-scams/
HW wallets - Ledger, Trezor
https://whotookmycrypto.com/
ledger-wallet-scams/
HW wallets - Ledger, Trezor
https://whotookmycrypto.com/
ledger-wallet-scams/
HW wallets - Ledger, Trezor
https://whotookmycrypto.com/
ledger-wallet-scams/
HW wallets - Ledger, Trezor
https://whotookmycrypto.com/
ledger-wallet-scams/
HW wallets - Ledger, Trezor
HW wallets - Ledger, Trezor
HW wallets - Ledger, Trezor
Best practices
Best practices
don’t trust random people (or celebrities) on social media
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
keep PC free of malware
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
keep PC free of malware
cold wallet for valuables - like you don’t store your life savings in your pocket wallet
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
keep PC free of malware
cold wallet for valuables - like you don’t store your life savings in your pocket wallet
take time, don’t rush
Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
keep PC free of malware
cold wallet for valuables - like you don’t store your life savings in your pocket wallet
take time, don’t rush
install security extensions like "Wallet Guard" or "Sunrise: NFT scam protector"
Conclusion
I can send white-paper if you want
Hack the planet
One computer at a time
zoltan.balazs@cujo.com
https://hu.linkedin.com/in/zbalazs


Twitter – @zh4ck


www.slideshare.net/bz98


JumpESPJump.blogspot.com

More Related Content

Similar to Web3 + scams = It's a match

Befargo
Befargo   Befargo
Befargo
Naeem Shah
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless Future
Ruben Merre
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
EC-Council
 
Crypto currency secrets
Crypto currency secretsCrypto currency secrets
Crypto currency secrets
Sahir
 
Using Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain TransparencyUsing Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain Transparency
Horea Porutiu
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
Zoltan Balazs
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
Case IQ
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
What is future of Cryptocurrency | Omega Prime Group
What is future of Cryptocurrency | Omega Prime GroupWhat is future of Cryptocurrency | Omega Prime Group
What is future of Cryptocurrency | Omega Prime Group
Omega Prime Group Hashtechz
 
Dylan Butler & Oliver Hager - Building a cross platform cryptocurrency app
Dylan Butler & Oliver Hager - Building a cross platform cryptocurrency appDylan Butler & Oliver Hager - Building a cross platform cryptocurrency app
Dylan Butler & Oliver Hager - Building a cross platform cryptocurrency app
DevCamp Campinas
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
Sabrina Kirrane
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Nipun Jaswal
 
Cryptocurrency a-quick-guide-to-understanding-cryptocurrencies
Cryptocurrency a-quick-guide-to-understanding-cryptocurrenciesCryptocurrency a-quick-guide-to-understanding-cryptocurrencies
Cryptocurrency a-quick-guide-to-understanding-cryptocurrencies
Sahir
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
alihaider191777
 
Crypto Future
Crypto FutureCrypto Future
Crypto Future
Mark Underdahl
 
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
Casey Ellis
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
Mohammed Adam
 
Country domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havocCountry domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havoc
Tiago Henriques
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
Haydn Johnson
 
Crypto Quantum Leap book
Crypto Quantum Leap bookCrypto Quantum Leap book
Crypto Quantum Leap book
Raguvaran22
 

Similar to Web3 + scams = It's a match (20)

Befargo
Befargo   Befargo
Befargo
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless Future
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Crypto currency secrets
Crypto currency secretsCrypto currency secrets
Crypto currency secrets
 
Using Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain TransparencyUsing Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain Transparency
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
 
What is future of Cryptocurrency | Omega Prime Group
What is future of Cryptocurrency | Omega Prime GroupWhat is future of Cryptocurrency | Omega Prime Group
What is future of Cryptocurrency | Omega Prime Group
 
Dylan Butler & Oliver Hager - Building a cross platform cryptocurrency app
Dylan Butler & Oliver Hager - Building a cross platform cryptocurrency appDylan Butler & Oliver Hager - Building a cross platform cryptocurrency app
Dylan Butler & Oliver Hager - Building a cross platform cryptocurrency app
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
Cryptocurrency a-quick-guide-to-understanding-cryptocurrencies
Cryptocurrency a-quick-guide-to-understanding-cryptocurrenciesCryptocurrency a-quick-guide-to-understanding-cryptocurrencies
Cryptocurrency a-quick-guide-to-understanding-cryptocurrencies
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Crypto Future
Crypto FutureCrypto Future
Crypto Future
 
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Country domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havocCountry domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havoc
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
Crypto Quantum Leap book
Crypto Quantum Leap bookCrypto Quantum Leap book
Crypto Quantum Leap book
 

More from Zoltan Balazs

[ Hackersuli ] Privacy on the blockchain
[ Hackersuli ] Privacy on the blockchain[ Hackersuli ] Privacy on the blockchain
[ Hackersuli ] Privacy on the blockchain
Zoltan Balazs
 
MLSEC 2020
MLSEC 2020MLSEC 2020
MLSEC 2020
Zoltan Balazs
 
MIPS-X
MIPS-XMIPS-X
How to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ DisobeyHow to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ Disobey
Zoltan Balazs
 
Explain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a fiveExplain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a five
Zoltan Balazs
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-days
Zoltan Balazs
 
Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
Zoltan Balazs
 
Hacking Windows 95 #33c3
Hacking Windows 95 #33c3Hacking Windows 95 #33c3
Hacking Windows 95 #33c3
Zoltan Balazs
 
Sandboxes
SandboxesSandboxes
Sandboxes
Zoltan Balazs
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
Zoltan Balazs
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Zoltan Balazs
 
Hacking with Remote Admin Tools (RAT)
 Hacking with Remote Admin Tools (RAT) Hacking with Remote Admin Tools (RAT)
Hacking with Remote Admin Tools (RAT)
Zoltan Balazs
 
[ENG] Hacktivity 2013 - Alice in eXploitland
[ENG] Hacktivity 2013 - Alice in eXploitland[ENG] Hacktivity 2013 - Alice in eXploitland
[ENG] Hacktivity 2013 - Alice in eXploitland
Zoltan Balazs
 
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - [ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - Zoltan Balazs
 
[HUN] Védtelen böngészők - Ethical Hacking
[HUN] Védtelen böngészők - Ethical Hacking [HUN] Védtelen böngészők - Ethical Hacking
[HUN] Védtelen böngészők - Ethical Hacking Zoltan Balazs
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensionsZoltan Balazs
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012Zoltan Balazs
 
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
Zoltan Balazs
 
[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] IPv6 shipworm + My little Windows domain pwnie[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] IPv6 shipworm + My little Windows domain pwnie
Zoltan Balazs
 
[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s
[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s
[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s
Zoltan Balazs
 

More from Zoltan Balazs (20)

[ Hackersuli ] Privacy on the blockchain
[ Hackersuli ] Privacy on the blockchain[ Hackersuli ] Privacy on the blockchain
[ Hackersuli ] Privacy on the blockchain
 
MLSEC 2020
MLSEC 2020MLSEC 2020
MLSEC 2020
 
MIPS-X
MIPS-XMIPS-X
MIPS-X
 
How to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ DisobeyHow to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ Disobey
 
Explain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a fiveExplain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a five
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-days
 
Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
 
Hacking Windows 95 #33c3
Hacking Windows 95 #33c3Hacking Windows 95 #33c3
Hacking Windows 95 #33c3
 
Sandboxes
SandboxesSandboxes
Sandboxes
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
 
Hacking with Remote Admin Tools (RAT)
 Hacking with Remote Admin Tools (RAT) Hacking with Remote Admin Tools (RAT)
Hacking with Remote Admin Tools (RAT)
 
[ENG] Hacktivity 2013 - Alice in eXploitland
[ENG] Hacktivity 2013 - Alice in eXploitland[ENG] Hacktivity 2013 - Alice in eXploitland
[ENG] Hacktivity 2013 - Alice in eXploitland
 
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - [ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
 
[HUN] Védtelen böngészők - Ethical Hacking
[HUN] Védtelen böngészők - Ethical Hacking [HUN] Védtelen böngészők - Ethical Hacking
[HUN] Védtelen böngészők - Ethical Hacking
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
 
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
 
[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] IPv6 shipworm + My little Windows domain pwnie[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] IPv6 shipworm + My little Windows domain pwnie
 
[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s
[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s
[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s
 

Recently uploaded

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 

Recently uploaded (16)

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 

Web3 + scams = It's a match

  • 1. Web3 + scams = HiTB Singapore, 2022 Zoltan Balazs, CUJO AI
  • 2.
  • 3. Head of Vulnerability Research Lab @ CUJO AI
  • 4. Head of Vulnerability Research Lab @ CUJO AI Zombie Browser Toolkit
 https://github.com/Z6543/ZombieBrowserPack
  • 5. Head of Vulnerability Research Lab @ CUJO AI Zombie Browser Toolkit
 https://github.com/Z6543/ZombieBrowserPack HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP 
 https://github.com/Z6543/hwfwbypass
  • 6. Head of Vulnerability Research Lab @ CUJO AI Zombie Browser Toolkit
 https://github.com/Z6543/ZombieBrowserPack HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP 
 https://github.com/Z6543/hwfwbypass Malware Analysis Sandbox Tester tool 
 https://github.com/Z6543/Sandbox_tester
  • 7. Head of Vulnerability Research Lab @ CUJO AI Zombie Browser Toolkit
 https://github.com/Z6543/ZombieBrowserPack HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP 
 https://github.com/Z6543/hwfwbypass Malware Analysis Sandbox Tester tool 
 https://github.com/Z6543/Sandbox_tester Played with crappy IoT devices – my RCE exploit code running on ~600 000 IP cameras via Persirai 
 https://jumpespjump.blogspot.hu/2015/09/how-i-hacked-my-ip-camera-and-found.html 
 https://jumpespjump.blogspot.hu/2015/08/how-to-secure-your-home-against.html
  • 8. Head of Vulnerability Research Lab @ CUJO AI Zombie Browser Toolkit
 https://github.com/Z6543/ZombieBrowserPack HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP 
 https://github.com/Z6543/hwfwbypass Malware Analysis Sandbox Tester tool 
 https://github.com/Z6543/Sandbox_tester Played with crappy IoT devices – my RCE exploit code running on ~600 000 IP cameras via Persirai 
 https://jumpespjump.blogspot.hu/2015/09/how-i-hacked-my-ip-camera-and-found.html 
 https://jumpespjump.blogspot.hu/2015/08/how-to-secure-your-home-against.html Invented the idea of encrypted exploit delivery via Dif fi e-Hellman key exchange, to bypass exploit detection appliances 
 https://www.mrg-ef fi tas.com/generic-bypass-of-next-gen-intrusion-threat-breach-detection-systems/
  • 9. Head of Vulnerability Research Lab @ CUJO AI Zombie Browser Toolkit
 https://github.com/Z6543/ZombieBrowserPack HWFW Bypass tool   Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP 
 https://github.com/Z6543/hwfwbypass Malware Analysis Sandbox Tester tool 
 https://github.com/Z6543/Sandbox_tester Played with crappy IoT devices – my RCE exploit code running on ~600 000 IP cameras via Persirai 
 https://jumpespjump.blogspot.hu/2015/09/how-i-hacked-my-ip-camera-and-found.html 
 https://jumpespjump.blogspot.hu/2015/08/how-to-secure-your-home-against.html Invented the idea of encrypted exploit delivery via Dif fi e-Hellman key exchange, to bypass exploit detection appliances 
 https://www.mrg-ef fi tas.com/generic-bypass-of-next-gen-intrusion-threat-breach-detection-systems/ Co-organizer of the Hackersuli meetup
 Programme committee member of the Hacktivity conference
 Volunteer at IoTVillage
  • 10.
  • 16. What and why This is a 2 hour presentation compressed into 25 minutes
  • 17. What and why This is a 2 hour presentation compressed into 25 minutes Fasten your seatbelts
  • 18. What and why This is a 2 hour presentation compressed into 25 minutes Fasten your seatbelts I love playing with new technologies
  • 19. What and why This is a 2 hour presentation compressed into 25 minutes Fasten your seatbelts I love playing with new technologies I fi nd blockchain + Web3 fascinating
  • 20. This presentation is NOT about/for
  • 21. This presentation is NOT about/for WHOLE CRYPTO WORLD IS A SCAM!!!!
  • 22. This presentation is NOT about/for WHOLE CRYPTO WORLD IS A SCAM!!!! Smart contract developers
  • 23. This presentation is NOT about/for WHOLE CRYPTO WORLD IS A SCAM!!!! Smart contract developers Financial advise on which shitcoin to invest in
  • 24. This presentation is NOT about/for WHOLE CRYPTO WORLD IS A SCAM!!!! Smart contract developers Financial advise on which shitcoin to invest in Crypto exchange hacks - see six/David's presentation
  • 25. This presentation is NOT about/for WHOLE CRYPTO WORLD IS A SCAM!!!! Smart contract developers Financial advise on which shitcoin to invest in Crypto exchange hacks - see six/David's presentation Cryptocurrency is used as a form of payment, e.g. ransomware
  • 26. How did we get here?
  • 27. How did we get here? Lot of people got rich from cryptocurrencies
  • 28. How did we get here? Lot of people got rich from cryptocurrencies Lot of people want to get rich from cryptocurrencies
  • 29. How did we get here? Lot of people got rich from cryptocurrencies Lot of people want to get rich from cryptocurrencies Total market capitalisation is around 2 1 trillion USD
  • 30. How did we get here? Lot of people got rich from cryptocurrencies Lot of people want to get rich from cryptocurrencies Total market capitalisation is around 2 1 trillion USD 2 1,000,000,000,000
  • 31. How did we get here? Lot of people got rich from cryptocurrencies Lot of people want to get rich from cryptocurrencies Total market capitalisation is around 2 1 trillion USD 2 1,000,000,000,000 New complex technology with crappy UI
  • 32. How did we get here? Lot of people got rich from cryptocurrencies Lot of people want to get rich from cryptocurrencies Total market capitalisation is around 2 1 trillion USD 2 1,000,000,000,000 New complex technology with crappy UI What could possibly go wrong?
  • 33.
  • 34.
  • 35. What is Bitcoin anyway? Let’s hear it from a trusted, 3 Grammy award winner Blockchain expert!
  • 36. What is Bitcoin anyway? Let’s hear it from a trusted, 3 Grammy award winner Blockchain expert!
  • 37. What is Bitcoin anyway? https://youtu.be/5AN5veSPfY4 Let’s hear it from a trusted, 3 Grammy award winner Blockchain expert!
  • 38.
  • 39.
  • 41.
  • 42. Step 1: Buy a lot from something what is cheap and has low volume
  • 43. Step 1: Buy a lot from something what is cheap and has low volume Step 2: Advertise as the NEXT BIG THING
  • 44. Step 1: Buy a lot from something what is cheap and has low volume Step 2: Advertise as the NEXT BIG THING Step 3: Sell on top
  • 45. Step 1: Buy a lot from something what is cheap and has low volume Step 2: Advertise as the NEXT BIG THING Step 3: Sell on top Step 4: PROFIT
  • 46. Step 1: Buy a lot from something what is cheap and has low volume Step 2: Advertise as the NEXT BIG THING Step 3: Sell on top Step 4: PROFIT Optional Step 5: Short on top
  • 47. Step 1: Buy a lot from something what is cheap and has low volume Step 2: Advertise as the NEXT BIG THING Step 3: Sell on top Step 4: PROFIT Optional Step 5: Short on top
  • 49. Rug pull Similar to pump and dump
  • 50. Rug pull Similar to pump and dump But you are the owner/ developer of the cryptocurrency/token/ whatever
  • 51. Rug pull Similar to pump and dump But you are the owner/ developer of the cryptocurrency/token/ whatever Even Conti ransomware group knew about SQUID
  • 52. Rug pull Similar to pump and dump But you are the owner/ developer of the cryptocurrency/token/ whatever Even Conti ransomware group knew about SQUID
  • 53. Rug pull Similar to pump and dump But you are the owner/ developer of the cryptocurrency/token/ whatever Even Conti ransomware group knew about SQUID
  • 65. What is an NFT anyway? https://twitter.com/zh4ck/nft https://etherscan.io/nft/0x06012c8cf97bead5deae237070f9587f8e7a266d/634517 https://etherscan.io/tx/ 0xfe21bd24d7748890c4deb2453bcd22ab451349fdacb5e812422e16772a664723#eventlog https://etherscan.io/address/0xb77feddb7e627a78140a2a32cac65a49ed1dba8e#code
  • 66. The “magical” world of NFTs … 1 ETH = 1700 USD
  • 67. The “magical” world of NFTs … 1 ETH = 1700 USD
  • 68. The “magical” world of NFTs … 1 ETH = 1700 USD
  • 69. The “magical” world of NFTs … Paris Hilton BAYC - 119 ETH 1 ETH = 1700 USD
  • 70. The “magical” world of NFTs … Paris Hilton BAYC - 119 ETH 1 ETH = 1700 USD
  • 71. The “magical” world of NFTs … Justin Bieber - 500 ETH Paris Hilton BAYC - 119 ETH 1 ETH = 1700 USD
  • 72. The “magical” world of NFTs … Justin Bieber - 500 ETH Paris Hilton BAYC - 119 ETH 1 ETH = 1700 USD
  • 73. The “magical” world of NFTs … Snoop Dog - 2500 ETH Justin Bieber - 500 ETH Paris Hilton BAYC - 119 ETH 1 ETH = 1700 USD
  • 74. The “magical” world of NFTs … Snoop Dog - 2500 ETH Justin Bieber - 500 ETH Paris Hilton BAYC - 119 ETH 1 ETH = 1700 USD
  • 75. The “magical” world of NFTs … Snoop Dog - 2500 ETH Justin Bieber - 500 ETH Eminem - 123.45 ETH Paris Hilton BAYC - 119 ETH 1 ETH = 1700 USD
  • 76. The “magical” world of NFTs … Snoop Dog - 2500 ETH Justin Bieber - 500 ETH Eminem - 123.45 ETH Paris Hilton BAYC - 119 ETH https://etherscan.io/token/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d#readContract https://ipfs.io/ipfs/QmeSjSinHpPnmXmspMjwiXyN6zS4E9zccariGR3jxcaWtq/9055 
 https://cid.ipfs.io/#QmTHcV6mGxHGeeXCnYtV129eRiR8Exni4sT8dDikBWBgzY 1 ETH = 1700 USD
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 105. Discord servers hacked via bookmarklets Discord scam
  • 106. Discord servers hacked via bookmarklets Discord scam
  • 107. Discord servers hacked via bookmarklets Discord scam
  • 108. Discord servers hacked via bookmarklets Discord scam
  • 109.
  • 110. HW wallets - Ledger, Trezor https://whotookmycrypto.com/ ledger-wallet-scams/
  • 111. HW wallets - Ledger, Trezor https://whotookmycrypto.com/ ledger-wallet-scams/
  • 112. HW wallets - Ledger, Trezor https://whotookmycrypto.com/ ledger-wallet-scams/
  • 113. HW wallets - Ledger, Trezor https://whotookmycrypto.com/ ledger-wallet-scams/
  • 114. HW wallets - Ledger, Trezor https://whotookmycrypto.com/ ledger-wallet-scams/
  • 115. HW wallets - Ledger, Trezor https://whotookmycrypto.com/ ledger-wallet-scams/
  • 116. HW wallets - Ledger, Trezor
  • 117. HW wallets - Ledger, Trezor
  • 118. HW wallets - Ledger, Trezor
  • 120. Best practices don’t trust random people (or celebrities) on social media
  • 121. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp
  • 122. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone
  • 123. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone block people/email sharing login, password, private key, seed phrase, backup phrase
  • 124. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone block people/email sharing login, password, private key, seed phrase, backup phrase extra careful to interact with KNOWN and unknown smart contracts
  • 125. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone block people/email sharing login, password, private key, seed phrase, backup phrase extra careful to interact with KNOWN and unknown smart contracts use password manager
  • 126. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone block people/email sharing login, password, private key, seed phrase, backup phrase extra careful to interact with KNOWN and unknown smart contracts use password manager enable 2fa, don’t use SMS based
  • 127. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone block people/email sharing login, password, private key, seed phrase, backup phrase extra careful to interact with KNOWN and unknown smart contracts use password manager enable 2fa, don’t use SMS based use HW wallet if you have a lot to protect
  • 128. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone block people/email sharing login, password, private key, seed phrase, backup phrase extra careful to interact with KNOWN and unknown smart contracts use password manager enable 2fa, don’t use SMS based use HW wallet if you have a lot to protect keep PC free of malware
  • 129. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone block people/email sharing login, password, private key, seed phrase, backup phrase extra careful to interact with KNOWN and unknown smart contracts use password manager enable 2fa, don’t use SMS based use HW wallet if you have a lot to protect keep PC free of malware cold wallet for valuables - like you don’t store your life savings in your pocket wallet
  • 130. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone block people/email sharing login, password, private key, seed phrase, backup phrase extra careful to interact with KNOWN and unknown smart contracts use password manager enable 2fa, don’t use SMS based use HW wallet if you have a lot to protect keep PC free of malware cold wallet for valuables - like you don’t store your life savings in your pocket wallet take time, don’t rush
  • 131. Best practices don’t trust random people (or celebrities) on social media check source of the app/dapp don’t send funds to someone you don't trust, or verify via phone block people/email sharing login, password, private key, seed phrase, backup phrase extra careful to interact with KNOWN and unknown smart contracts use password manager enable 2fa, don’t use SMS based use HW wallet if you have a lot to protect keep PC free of malware cold wallet for valuables - like you don’t store your life savings in your pocket wallet take time, don’t rush install security extensions like "Wallet Guard" or "Sunrise: NFT scam protector"
  • 132. Conclusion I can send white-paper if you want
  • 133. Hack the planet One computer at a time zoltan.balazs@cujo.com https://hu.linkedin.com/in/zbalazs Twitter – @zh4ck www.slideshare.net/bz98 JumpESPJump.blogspot.com