Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the comprehensive history and evolution of cryptocurrency draining attacks across major blockchains including Ethereum, Solana, and TON in this interactive 21-minute conference talk from DEF CON 33. Witness live demonstrations of various draining techniques ranging from early ERC-20 approval abuse to sophisticated token spoofing methods. Learn to identify, trace, and defend against these blockchain exploits while examining popular money laundering techniques and current security countermeasures. Participate in a final group challenge that involves tracking an attacker's wallet and evaluating strategies for recovering stolen cryptocurrency funds.