Capture the Ether Part 1: what is it and how to start

If you want to learn how to develop secure smart contracts you should definitely start to complete Solidity challenges like Capture the ether.

There are tons out there going from easy/medium to hard difficulty.

Capture the Ether is a good start for novice solidity developers. In this blog post, I’m going to explain what it is and how to set up a Hardhat project to test all the challenges both locally and on the Ropsten network.

Introduction to Capture the Ether

What is Capture the Ether?

Capture the Ether is a game in which you hack Ethereum smart contracts to learn about security.

It’s meant to be both fun and educational.

This game is brought to you by @smarx, who blogs about smart contract development at Program the Blockchain.

How do you win?

The game consists of a series of challenges in different categories. You earn points for every challenge you complete. Harder challenges are worth more points.

Each challenge is in the form of a smart contract with an isComplete function (or public state variable). The goal is always to make isComplete() return true.

If you’re into that sort of thing, there’s a leaderboard.

What do you need to know first?

The warmup category is designed to introduce the basic tools you need, but if you’re brand new to Ethereum smart contract development, head over to Program the Blockchain first and do some background reading.

If you find you’re missing some tools or knowledge, check out the resources page or consider asking for help.

My personal setup

Credits

First of all, I would like to thank Christoph Michel, I’ve forked his own capture-the-ether repository to bootstrap my repository with its task to use burn wallet accounts.

Project setup instructions

What’s next

Part 2 of the series will be all about solving the Lotteries challenges of Capture the Ether so stay tuned!

Did you like this content? Follow me for more!

--

--

--

Full-stack engineer at @Soplaya with a lot of love for everything around technology https://ericci.dev

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Top 3 Broad Objections of Cloud Deniers

From Excel to Python

Alpha Casper FFG Testnet Instructions

Five Tips For Eliminating a Technical Debt

Java Version 8 Update 311 MSI Installers

Why Use Docker? 4 Real-life Docker Use Cases Examples & Takeaways

Full Stack Development is Definitely Worth Learning- Here’s Why.

Integration and Scaling of Micro Services using Redis and UJQ

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
StErMi

StErMi

Full-stack engineer at @Soplaya with a lot of love for everything around technology https://ericci.dev

More from Medium

Ethernaut — Level 15 — Naught Coin

How to switch network on Metamask programmatically

Detailed explanation of Ethereum smart contract vulnerabilities — — On-Chain Vulnerability…

Public | Internal | External | Private Functions in Solidity