# Blockchain Common Attack Techniques

Blockchain technology has revolutionized the way we think about data security, but it is not immune to attacks. In these documents, we will explore the most common attack techniques used against blockchain networks, including 51% attacks, double-spending, Sybil attacks, and more. We will also discuss the potential consequences of these attacks and provide recommendations for how to protect against them. This document is intended for blockchain security researchers, developers, and users who want to gain a deeper understanding of the security risks associated with blockchain technology

## Table of Contents

* [Protocol Layer](/l1-security/protocol-layer.md#protocol-layer)
  * [Consensus](/l1-security/protocol-layer.md#consensus)
    * [Long Range Attack](/l1-security/protocol-layer.md#long-range-attack)
    * [Race Attack](/l1-security/protocol-layer.md#race-attack)
    * [Liveness Denial](/l1-security/protocol-layer.md#liveness-denial)
    * [Finney Attack](/l1-security/protocol-layer.md#finney-attack)
    * [Vector76 Attack](/l1-security/protocol-layer.md#vector76-attack)
    * [Alternative Historical Attack](/l1-security/protocol-layer.md#alternative-historical-attack)
    * [51% Attack](/l1-security/protocol-layer.md#51-attack)
    * [Stake Grinding Attack](/l1-security/protocol-layer.md#stake-grinding-attack)
    * [Coin Age Accumulation Attack](/l1-security/protocol-layer.md#coin-age-accumulation-attack)
    * [Nothing-at-Stake Attack](/l1-security/protocol-layer.md#nothing-at-stake-attack)
    * [Block Double Production](/l1-security/protocol-layer.md#block-double-production)
* [Network Layer](/l1-security/network-layer.md#network-layer)
  * [P2P](/l1-security/network-layer.md#p2p)
    * [Sybil Attack](/l1-security/network-layer.md#sybil-attack)
    * [Eclipse Attack](/l1-security/network-layer.md#eclipse-attack)
    * [Eavesdropping Attack](/l1-security/network-layer.md#eavesdropping-attack)
    * [Denial of Service Attack](/l1-security/network-layer.md#denial-of-service-attack)
    * [BGP Hijack Attack](/l1-security/network-layer.md#bgp-hijack-attack)
    * [Alien Attack](/l1-security/network-layer.md#alien-attack)
    * [Timejacking](/l1-security/network-layer.md#timejacking)
    * [Network Partitioning Attack](/l1-security/network-layer.md#network-partitioning-attack)
  * [RPC](/l1-security/network-layer.md#rpc)
    * [Information Leakage ](/l1-security/network-layer.md#information-leakage)
    * [Denial of Service Attack ](/l1-security/network-layer.md#denial-of-service-attack-1)
    * [Cross-Domain Phishing Attack ](/l1-security/network-layer.md#cross-domain-phishing-attack)
    * [Man-in-the-middle Attack ](/l1-security/network-layer.md#man-in-the-middle-attack)
    * [Injection Attack](/l1-security/network-layer.md#injection-attack)
* [Data Layer](/l1-security/data-layer.md#data-layer)
  * [Encryption](/l1-security/data-layer.md#encryption)
    * [Cryptographic Attacks](/l1-security/data-layer.md#cryptographic-attacks)
    * [Private Key Prediction](/l1-security/data-layer.md#private-key-prediction)
    * [Length Extension Attack](/l1-security/data-layer.md#length-extension-attack)
    * [Hash collision attack](/l1-security/data-layer.md#hash-collision-attack)
  * [Transactions](/l1-security/data-layer.md#transactions)
    * [Transaction Replay Attack](/l1-security/data-layer.md#transaction-replay-attack)
    * [Transaction Malleability Attack](/l1-security/data-layer.md#transaction-malleability-attack)
    * [Time-Locked Transaction Attack](/l1-security/data-layer.md#time-locked-transaction-attack)
    * [False Top-Up Attack](/l1-security/data-layer.md#false-top-up-attack)
    * [Rug Pull Attack](/l1-security/data-layer.md#rug-pull-attack)
* [Infrastructure Layer](/l1-security/infrastructure-layer.md#infrastructure-layer)
  * [Mining Pools](/l1-security/infrastructure-layer.md#mining-pools)
    * [Selfish Mining](/l1-security/infrastructure-layer.md#selfish-mining)
    * [Bribery Attack](/l1-security/infrastructure-layer.md#bribery-attack)
    * [Block Withholding Attack](/l1-security/infrastructure-layer.md#block-withholding-attack)
    * [Pool Hopping Attack](/l1-security/infrastructure-layer.md#pool-hopping-attack)
    * [Block Discarding Attack](/l1-security/infrastructure-layer.md#block-discarding-attack)
    * [Fork After Withholding Attack](/l1-security/infrastructure-layer.md#fork-after-withholding-attack)
    * [Uncle-Block Attack](/l1-security/infrastructure-layer.md#uncle-block-attack)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://hackn.gitbook.io/l1-security/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
