paint-brush
Practical Smart Contract Security Analysis and Exploitation— Part 1by@muellerberndt
4,856 reads
4,856 reads

Practical Smart Contract Security Analysis and Exploitation— Part 1

by Bernhard Mueller6mNovember 14th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

<em>In this article I explain how to use </em><a href="https://github.com/ConsenSys/mythril-classic" target="_blank"><em>Mythril</em></a><em> to find and exploit security bugs in Ethereum smart contracts. The articles will cover basic principles and advanced techniques, such as testing security properties, proving invariants, analyzing multi-contract systems and auto-looting ETH from vulnerable contracts on the Ethereum network.</em>

Company Mentioned

Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Practical Smart Contract Security Analysis and Exploitation— Part 1
Bernhard Mueller HackerNoon profile picture
Bernhard Mueller

Bernhard Mueller

@muellerberndt

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite