Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the comprehensive history and evolution of cryptocurrency draining attacks across major blockchains including Ethereum, Solana, and TON in this interactive 21-minute conference talk from DEF CON 33. Witness live demonstrations of various draining techniques ranging from early ERC-20 approval abuse to sophisticated token spoofing methods. Learn to identify, trace, and defend against these blockchain exploits while examining popular money laundering techniques and current security countermeasures. Participate in a final group challenge that involves tracking an attacker's wallet and evaluating strategies for recovering stolen cryptocurrency funds.