Devansh (⚡, 🥷) Profile picture
Sep 15, 2021 20 tweets 5 min read Read on X
My notes (actually a checklist ✅) for getting into Blockchain Security, a thread 🧵
Elementary Topics:
Basics of Internet:
Existing Authentication/Authorization models in Web2.0 applications:
Web 2.0 Security:
Basics of Blockchain:
Basics of Blockchain (cont..):
Basics of Ethereum:
Basics of Ethereum (cont..):
Understanding Solidity:
Frameworks for Ethereum development:
Visualization Tools:
Linters and formatters:
Common Vulnerabilities in Smart contracts:
Common Vulnerabilities in Smart contracts (cont..):
Static and Dynamic Analysis tools:
Blockchain CTFs:
Bug Bounty Platforms with Crypto Programs:
The future of Blockchain:
I have a detailed article (Genesis 0x001) coming v soon, the content will never be monetized, but if you wanna show some support I have a buy me a coffee page (or just buy some biscuits for street dogs, that will make me happy as well).

buymeacoffee.com/Asm0d3us

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Devansh (⚡, 🥷)

Devansh (⚡, 🥷) Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @0xAsm0d3us

Mar 31
If you, like many, think relying just on `cat` command's output is enough to be sure about the integrity of a bash file. Think twice, you could get hacked. Read below 👇 Image
(2/n) Reading the file using `cat` seems fine, right? Definitely, nothing suspicious there, right? Image
Let's run this `" file. Wait what? Why it is spitting out the contents of `/etc/passwd`? The trick here is "escape codes". innocent.sh
Image
Read 6 tweets
Jul 9, 2023
Foundational roadmap for Cyber Threat Intelligence (CTI) 🧵👇
1/n: Start with learning the basic concepts of cybersecurity such as types of cyber attacks, malware, phishing, social engineering, etc. This will give you a foundation to build upon.
2/n: Learn about CTI, its importance, and how it works. Understand the difference between tactical, operational, and strategic CTI.
Read 9 tweets
Apr 26, 2022
A thread of some of the most common, yet effective Solidity Gas Optimization Tips (taken from various sources) 🧵👇
1- Use of Bit shift operators
2- Public vs External (External is cheaper)
Read 34 tweets
Feb 19, 2022
A thread 🧵 on DNS misconfigurations/resources/articles/tools 👇

#hacking #cybersecurity #dns #bugbounty
The History of DNS Vulnerabilities and the Cloud (by Palo alto networks)

unit42.paloaltonetworks.com/dns-vulnerabil…
Dangling Domains: Security Threats, Detection and Prevalence (by Palo alto networks)

unit42.paloaltonetworks.com/dangling-domai…
Read 20 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(