REENTRANCY ATTACK PART 1 : INTRODUCTION TO REENTRANCY PART 2 : SETTING UP REENTRANT PIRATES PART 3 : EXPLOITING THE DAPP