blockchainPromedium
[Blackbox] Web3_Lending
caplag
Task: DeFi lending platform on Anvil devnet with AMM, LendingVault, and FlashLoanProvider contracts. Solution: Reverse engineered EVM bytecode to extract flag from PUSH32 string literals; intended path was spot oracle price manipulation via flash loan attack.
$ ls tags/ techniques/
evm_bytecode_reverse_engineeringpush32_string_extractionspot_oracle_price_manipulationflash_loan_attackdefi_oracle_exploit
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [blockchain][Pro][Blackbox] Web3_Bridge— caplag
- [blockchain][Pro][Blackbox] Web3_VIP— caplag
- [blockchain][Pro][Blackbox] Web3_Staking— caplag
- [blockchain][Pro][Blackbox] Web3_Governance— caplag
- [blockchain][free]Magic Vault— hackthebox