This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Dhiraj Mishra"

From OWASP
Jump to: navigation, search
m (Dhiraj Mishra)
m (Dhiraj Mishra)
Line 16: Line 16:
 
* Lead of [https://www.owasp.org/index.php/SQL_Injection_Bypassing_WAF SQLi WAF Bypass] a very helpful cheat sheet which consists of a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researchers.  
 
* Lead of [https://www.owasp.org/index.php/SQL_Injection_Bypassing_WAF SQLi WAF Bypass] a very helpful cheat sheet which consists of a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researchers.  
 
* His contribution to [https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series OWASP Cheat Sheet Project] is the most.
 
* His contribution to [https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series OWASP Cheat Sheet Project] is the most.
 +
* Has a part of [https://sites.google.com/site/owaspmumbaichapter/ OWASP Mumbai Student Chapter] he as conducted a webinar for [https://youtu.be/fvILdMY-LTQ Bug Bounty] as well.
  
 
== OWASP CWE Project Benchmark ==
 
== OWASP CWE Project Benchmark ==

Revision as of 14:32, 8 July 2017

Dhiraj Mishra

BIO

Dhiraj Mishra is an Cyber Security enthusiast, working with Ernst and Young as an Analyst.

OWASP Contributions

He has been contributing to OWASP from more than a year, as a volunteer to the open community, he is or has been :

OWASP CWE Project Benchmark

Bug Bounties

Dhiraj is also a bug hunter, his areas of expertise in Application Security have listed him in Hall of Fame for companies and orginizations such like, Facebook, Oracle, Intel, DoD, Bugcrowd, Netgear etc.
Blog : https://datarift.blogspot.in/