# Blockchain Common Attack Techniques

Blockchain technology has revolutionized the way we think about data security, but it is not immune to attacks. In these documents, we will explore the most common attack techniques used against blockchain networks, including 51% attacks, double-spending, Sybil attacks, and more. We will also discuss the potential consequences of these attacks and provide recommendations for how to protect against them. This document is intended for blockchain security researchers, developers, and users who want to gain a deeper understanding of the security risks associated with blockchain technology

## Table of Contents

* [Protocol Layer](https://hackn.gitbook.io/l1-security/protocol-layer#protocol-layer)
  * [Consensus](https://hackn.gitbook.io/l1-security/protocol-layer#consensus)
    * [Long Range Attack](https://hackn.gitbook.io/l1-security/protocol-layer#long-range-attack)
    * [Race Attack](https://hackn.gitbook.io/l1-security/protocol-layer#race-attack)
    * [Liveness Denial](https://hackn.gitbook.io/l1-security/protocol-layer#liveness-denial)
    * [Finney Attack](https://hackn.gitbook.io/l1-security/protocol-layer#finney-attack)
    * [Vector76 Attack](https://hackn.gitbook.io/l1-security/protocol-layer#vector76-attack)
    * [Alternative Historical Attack](https://hackn.gitbook.io/l1-security/protocol-layer#alternative-historical-attack)
    * [51% Attack](https://hackn.gitbook.io/l1-security/protocol-layer#51-attack)
    * [Stake Grinding Attack](https://hackn.gitbook.io/l1-security/protocol-layer#stake-grinding-attack)
    * [Coin Age Accumulation Attack](https://hackn.gitbook.io/l1-security/protocol-layer#coin-age-accumulation-attack)
    * [Nothing-at-Stake Attack](https://hackn.gitbook.io/l1-security/protocol-layer#nothing-at-stake-attack)
    * [Block Double Production](https://hackn.gitbook.io/l1-security/protocol-layer#block-double-production)
* [Network Layer](https://hackn.gitbook.io/l1-security/network-layer#network-layer)
  * [P2P](https://hackn.gitbook.io/l1-security/network-layer#p2p)
    * [Sybil Attack](https://hackn.gitbook.io/l1-security/network-layer#sybil-attack)
    * [Eclipse Attack](https://hackn.gitbook.io/l1-security/network-layer#eclipse-attack)
    * [Eavesdropping Attack](https://hackn.gitbook.io/l1-security/network-layer#eavesdropping-attack)
    * [Denial of Service Attack](https://hackn.gitbook.io/l1-security/network-layer#denial-of-service-attack)
    * [BGP Hijack Attack](https://hackn.gitbook.io/l1-security/network-layer#bgp-hijack-attack)
    * [Alien Attack](https://hackn.gitbook.io/l1-security/network-layer#alien-attack)
    * [Timejacking](https://hackn.gitbook.io/l1-security/network-layer#timejacking)
    * [Network Partitioning Attack](https://hackn.gitbook.io/l1-security/network-layer#network-partitioning-attack)
  * [RPC](https://hackn.gitbook.io/l1-security/network-layer#rpc)
    * [Information Leakage ](https://hackn.gitbook.io/l1-security/network-layer#information-leakage)
    * [Denial of Service Attack ](https://hackn.gitbook.io/l1-security/network-layer#denial-of-service-attack-1)
    * [Cross-Domain Phishing Attack ](https://hackn.gitbook.io/l1-security/network-layer#cross-domain-phishing-attack)
    * [Man-in-the-middle Attack ](https://hackn.gitbook.io/l1-security/network-layer#man-in-the-middle-attack)
    * [Injection Attack](https://hackn.gitbook.io/l1-security/network-layer#injection-attack)
* [Data Layer](https://hackn.gitbook.io/l1-security/data-layer#data-layer)
  * [Encryption](https://hackn.gitbook.io/l1-security/data-layer#encryption)
    * [Cryptographic Attacks](https://hackn.gitbook.io/l1-security/data-layer#cryptographic-attacks)
    * [Private Key Prediction](https://hackn.gitbook.io/l1-security/data-layer#private-key-prediction)
    * [Length Extension Attack](https://hackn.gitbook.io/l1-security/data-layer#length-extension-attack)
    * [Hash collision attack](https://hackn.gitbook.io/l1-security/data-layer#hash-collision-attack)
  * [Transactions](https://hackn.gitbook.io/l1-security/data-layer#transactions)
    * [Transaction Replay Attack](https://hackn.gitbook.io/l1-security/data-layer#transaction-replay-attack)
    * [Transaction Malleability Attack](https://hackn.gitbook.io/l1-security/data-layer#transaction-malleability-attack)
    * [Time-Locked Transaction Attack](https://hackn.gitbook.io/l1-security/data-layer#time-locked-transaction-attack)
    * [False Top-Up Attack](https://hackn.gitbook.io/l1-security/data-layer#false-top-up-attack)
    * [Rug Pull Attack](https://hackn.gitbook.io/l1-security/data-layer#rug-pull-attack)
* [Infrastructure Layer](https://hackn.gitbook.io/l1-security/infrastructure-layer#infrastructure-layer)
  * [Mining Pools](https://hackn.gitbook.io/l1-security/infrastructure-layer#mining-pools)
    * [Selfish Mining](https://hackn.gitbook.io/l1-security/infrastructure-layer#selfish-mining)
    * [Bribery Attack](https://hackn.gitbook.io/l1-security/infrastructure-layer#bribery-attack)
    * [Block Withholding Attack](https://hackn.gitbook.io/l1-security/infrastructure-layer#block-withholding-attack)
    * [Pool Hopping Attack](https://hackn.gitbook.io/l1-security/infrastructure-layer#pool-hopping-attack)
    * [Block Discarding Attack](https://hackn.gitbook.io/l1-security/infrastructure-layer#block-discarding-attack)
    * [Fork After Withholding Attack](https://hackn.gitbook.io/l1-security/infrastructure-layer#fork-after-withholding-attack)
    * [Uncle-Block Attack](https://hackn.gitbook.io/l1-security/infrastructure-layer#uncle-block-attack)
