BuggerBag Team

Results 7 comments of BuggerBag Team

the attacker or Eve must wait until the first transaction is mined, after that Eve watches the internal transaction of ```oddevent ``` contract and choose wise data for getting profit....

Hi, thanks for your response, I think, if the first number was encrypted, the attacker can't decrypt it. if the number encrypts with CBC (cipher block chaining) then attacker can't...

Note that smart contracts at reentrancy folder of etherscan was HoneyPot, becareful !! My Question: is 0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839.sol vulnerable? if yes what is attack scenario?

> Saya hnya membutuhkan 200 goerli untuk tes alamat dompet saya 0xDCFDe83F1e707851A3Ed67FBaca95B557051b487 Halo. Saya tidak tahu bahasa Indonesia, tapi Mereka tidak menyetor untuk saya. Ini mungkin akan sama untuk Anda.

Note that smart contracts at reentrancy folder of etherscan was HoneyPot, becareful !! My Question: is 0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839.sol vulnerable? if yes what is attack scenario?

the attacker or Eve must wait until the first transaction is mined, after that Eve watches the internal transaction of ```oddevent ``` contract and choose wise data for getting profit....

Hi, thanks for your response, I think, if the first number was encrypted, the attacker can't decrypt it. if the number encrypts with CBC (cipher block chaining) then attacker can't...