Dynamo
@AnonDynamo
Followers
103
Following
311
Media
17
Statuses
297
Just some Hacker from Luxembourg! π±πΊπΈπ³π²π«π©πͺπ¬π§π¨π΄π΅πΉ
127.0.0.1
Joined June 2019
Hey. You! YES You! If you're reading this its because you clicked on my profile. Click follow if you're interested in: - Bug Bounty - Red Teaming - Pentesting - Anything Infosec Join me on this journey! #BugBounty #Hacking #WebAppPentesting
1
2
7
As part of my transition from Web2 Pentesting to Web3, The first achievement is in. Completed the Smart Contract Hackers Course by @RealJohnnyTime π₯ Exam was quite a bit harder than I anticipated to be fair. And 30 minutes time limit also adds a lot of stress! #web3Audit
1
1
7
@CodeHawks Second Takeaway: Check Implementations. If the contract uses some libraries like for example this one used the UUPS upgradeable contracts, check that they are implemented correctly as per documentation. #Web2toWeb3 #Web3Audit
0
0
0
First First Flight by @CodeHawks done and with that my first massive takeaway that I've put into my notes. Start the Audit with Invariants testing. In simple terms, check that what the documentation says should absolutely happen, actually does happen in the code. #Web2ToWeb3
1
0
0
Done with the Intermediate topics on @RareSkills_io. On to Defi primitives. Slowly but surely starting to level up in complexity and understanding. #Web2toWeb3 #Pentesting #to #Auditing
0
0
0
The herd is saying the tech market is dying. No need for new developers, software engineers etc... One thing my few years have taught me is "The Herd is often wrong!" Follow your plan with conviction. Herd mentality often loses! Did you make a plan though? #Web2toWeb3
0
0
0
ERC-721Enumerable is such an elegant showcase of why some standards need extensions. Fun read by @RareSkills_io
https://t.co/pTEG92coDC
#Web2 #Pentesting #To #Web3Auditing
rareskills.io
How ERC721 Enumerable Works An Enumerable ERC721 is an ERC721 with added functionality that enables a smart contract to list all the NFTs an address owns. This article describes how ERC721Enumerable...
0
0
1
As I continue my journey from Web2 Pentesting to Web3 Auditing, I can't help but be fascinated by the bright minds that have come up with the different Smart Contract standards over the years. The more I dive into the technicalities of Web3, the more I get excited! #Web2ToWeb3
0
0
1
Been working on @RareSkills_io 's learn-solidity articles on the side to @RealJohnnyTime's SCH course. SCH all day and the last hour of the day, I dive into 1 article. Super nice change of pace and deep dive into another topic to maximise learning! #Web2PentestertoWeb3Auditor
0
0
1
Another one bites the dust! @RareSkills_io OverMint2 challenge solved! Reentrancy gone but not the vulnerabilities - Max mint per Address should be implemented! Wrote an exploit and test to verify my solution works. https://t.co/BClUrmXgOK
#SmartContractSecurity #Web2toWeb3
github.com
Learning journey through the rareskills resource. Contribute to 0xDynamo/Rareskills-exercises development by creating an account on GitHub.
0
0
1
Just solved the @RareSkills_io OverMint1 challenge! Classic ERC721 reentrancy vulnerability where the contract updates state after calling _safeMint() Wrote an exploit and test to verify my solution works. https://t.co/JliCkf1BXA
#SmartContractSecurity #Web2toWeb3
github.com
Learning journey through the rareskills resource. Contribute to 0xDynamo/Rareskills-exercises development by creating an account on GitHub.
0
0
3
Just finished the puzzles at the end of this amazing article by @RareSkills_io. The article discusses 3 methods that one may (or may not) use to detect whether an address is a smart contract or not. The Puzzle at the end was particularly fun! #Web3
https://t.co/36pF1Jmx43
rareskills.io
Three ways to detect if an address is a smart contract This article describes three methods in Solidity for determining if an address is a smart contract: Check if msg.sender == tx.origin. This is...
1
0
1
@MattWallace888 This is how our Solar system is.. β€οΈπ₯ https://t.co/zOXqT87Hob
88
156
997
I just completed module Cross-Site Scripting (XSS) in HTB Academy and WOW!!! Now That was fun, the Phishing chapter was really really good! https://t.co/V14134akQO
#hackthebox #htbacademy #cybersecurity
academy.hackthebox.com
Cross-Site Scripting (XSS) vulnerabilities are among the most common web application vulnerabilities. An XSS vulnerability may allow an attacker to execute arbitrary JavaScript code within the...
0
0
0
Finally I can say I have fully understood SQL Injections! What a great module! Thank you #HackTheBox
https://t.co/ygFyICk9kH
#hackthebox #htbacademy #cybersecurity
academy.hackthebox.com
Databases are an important part of web application infrastructure and SQL (Structured Query Language) to store, retrieve, and manipulate information stored in them. SQL injection is a code injection...
0
0
0
Wow, this was a journey! Such a great course on all things Active Directory! Thanks a million #hackthebox
https://t.co/mo9Ykwy1Ru
#hackthebox #htbacademy #cybersecurity
academy.hackthebox.com
Active Directory (AD) is the leading enterprise domain management suite, providing identity and access management, centralized domain administration, authentication, and much more. Due to the many...
0
0
0
Another banger by #HackTheBox done and dusted! Onto the next one. https://t.co/nTJ44o3ElL
#hackthebox #htbacademy #cybersecurity
academy.hackthebox.com
This module covers the fundamental enumeration skills of web fuzzing and directory brute forcing using the Ffuf tool. The techniques learned in this module will help us in locating hidden pages,...
0
0
1
I successfully used AI it to re-create missing source code components from Vault 7 and subsequently compiled and use the CIA's Marble framework... ;-)
So I started pasting REDACTED documents into AI and asking it to estimate what the contents could be given events at the time with LLM's... Its a worthwhile past time, AI's pretty good at predictive text and reading historical data.
14
92
431
Another one bites the dust! This one was super super interesting and the Skills Assessment yet again killed it! Great job #hackthebox I just completed module Pivoting, Tunneling, and Port Forwarding in HTB Academy! https://t.co/dBiBeR73HZ
#hackthebox #htbacademy #cybersecurity
academy.hackthebox.com
Once a foothold is gained during an assessment, it may be in scope to move laterally and vertically within a target network. Using one compromised machine to access another is called pivoting and...
0
0
0
Me: Can you draw a very normal image? ChatGPT: Here is a very normal image depicting a tranquil suburban street scene during the daytime. Me: Not bad, but can you go more normal than that? (cont.)
2K
4K
34K