My notes (actually a checklist ✅) for getting into Blockchain Security, a thread 🧵
Elementary Topics:
Basics of Internet:
Existing Authentication/Authorization models in Web2.0 applications:
Web 2.0 Security:
Basics of Blockchain:
Basics of Blockchain (cont..):
Basics of Ethereum:
Basics of Ethereum (cont..):
Understanding Solidity:
Frameworks for Ethereum development:
Visualization Tools:
Linters and formatters:
Common Vulnerabilities in Smart contracts:
Common Vulnerabilities in Smart contracts (cont..):
Static and Dynamic Analysis tools:
Blockchain CTFs:
Bug Bounty Platforms with Crypto Programs:
The future of Blockchain:
I have a detailed article (Genesis 0x001) coming v soon, the content will never be monetized, but if you wanna show some support I have a buy me a coffee page (or just buy some biscuits for street dogs, that will make me happy as well).
If you, like many, think relying just on `cat` command's output is enough to be sure about the integrity of a bash file. Think twice, you could get hacked. Read below 👇
(2/n) Reading the file using `cat` seems fine, right? Definitely, nothing suspicious there, right?
Let's run this `" file. Wait what? Why it is spitting out the contents of `/etc/passwd`? The trick here is "escape codes". innocent.sh
Foundational roadmap for Cyber Threat Intelligence (CTI) 🧵👇
1/n: Start with learning the basic concepts of cybersecurity such as types of cyber attacks, malware, phishing, social engineering, etc. This will give you a foundation to build upon.
2/n: Learn about CTI, its importance, and how it works. Understand the difference between tactical, operational, and strategic CTI.