Discover how attackers use vulnerabilities in off-chain components to achieve critical impact against on-chain systems.| NetSPI