This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Dhiraj Mishra"

From OWASP
Jump to: navigation, search
m (Dhiraj Mishra)
m (Dhiraj Mishra)
 
(37 intermediate revisions by the same user not shown)
Line 1: Line 1:
[[File:Dhiraj-Mishra-OWASP.jpg|right| Dhiraj Mishra]]
+
[[File:Dhiraj-Mishra.png|right|210px|Dhiraj Mishra]]
[[File:LinkedIn.gif|right|link=http://linkedin.com/in/mishradhiraj]]
 
 
==BIO==
 
==BIO==
Dhiraj Mishra [http://twitter.com/mishradhiraj_ @mishradhiraj_] is an Independent researcher and Information Security enthusiast.<br>
+
[http://twitter.com/RandomDhirah Dhiraj Mishra] is an active speaker and a bug hunter, discovered multiple zero days in modern web browsers, Metasploit Contributor. His work has been published on TheHackerNews, TheRegister & BleepingComputer. He works as a Security Consultant for Cognosec DMCC, former NotSoSecure and EY.<br>
Author of the Book '''The Modern Guide for XSS Evasion''' which will be published by Amazon in upcoming seasons.<br>
 
Demo Copy Available at [https://drive.google.com/file/d/0B9Y35ARaxu2KZExPQmRoempyWHE4U2xRQ2Nzek56VFRHSTNr/view?pref=2&pli=1 Blog.]<br>
 
 
==OWASP Contributions==
 
==OWASP Contributions==
I have been contributing to OWASP from more than a year,and would like to contribute more into it.<br>
+
He has been contributing to OWASP from more than a year, as a volunteer to the open community, he is or has been :<br>
As a volunteer to OWASP, Dhiraj is or has been:<br>
+
* [https://www.owasp.org/index.php/WASPY_Awards_2016 Nominated for WASPY 2016]
* [https://www.owasp.org/index.php/About_OWASP/Bug_Bounty/WOF '''OWASP Wall Of Fame''']
+
* [https://www.owasp.org/index.php/WASPY_Awards_2017 Nominated for WASPY 2017]
* Core Team Member in [https://www.owasp.org/index.php/Category:India AppSec India 2016]
+
* [https://www.owasp.org/index.php/Category:OWASP_Speakers_Project#tab=Available_Speakers Speaker of OWASP] for Mumbai, India with the area of Interest in OWASP Top 10 , EASPI , IoT , Dark Web.
* The [http://owasp.org/index.php/Mumbai_Student_Chapter Mumbai Student Chapter] Leader making student endorse in Information Security and Spreading Idea and Awareness via Chapter Meets.
 
 
* Helping and Speaking Initiatives in [https://www.owasp.org/index.php/Mumbai OWASP Local Chapter Meet Mumbai] with chapter leader Narenda Choyal.
 
* Helping and Speaking Initiatives in [https://www.owasp.org/index.php/Mumbai OWASP Local Chapter Meet Mumbai] with chapter leader Narenda Choyal.
 +
* [https://www.owasp.org/index.php/OWASP_Trainers_Database Call_For_Trainers] in OWASP Mumbai, India , being in Trainers DB.
 +
* As a Chapter leader for [http://owasp.org/index.php/Mumbai_Student_Chapter Mumbai Student Chapter] making student endorse in Information Security and Spreading Idea's and Awareness via Chapter Meets.
 +
* Authors and Primary Editor's in [https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet SQL Injection Prevention Cheat Sheet.]
 +
* Author's and Primary Editor's in [https://www.owasp.org/index.php/DOM_based_XSS_Prevention_Cheat_Sheet DOM Based XSS Prevention Cheat Sheet. ]
 
* Past Contributor in [http://owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet The Popular XSS Filter Evasion Cheat Sheet] where as ,this article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing.
 
* Past Contributor in [http://owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet The Popular XSS Filter Evasion Cheat Sheet] where as ,this article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing.
* Lead of [https://www.owasp.org/index.php/SQL_Injection_Bypassing_WAF SQLi WAF Bypass] a very helpful cheat sheet which consists of a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researcher's.  
+
* Lead of [https://www.owasp.org/index.php/SQL_Injection_Bypassing_WAF SQLi WAF Bypass] a very helpful cheat sheet which consists of a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researchers.  
* [https://www.owasp.org/index.php/OWASP_Trainers_Database Call_For_Trainers] in OWASP Mumbai, India , being in Trainers DB , Dhiraj have taken many of free Session's to '''Mumbai Cop's , Navi Mumbai Cyber Cell , Thane Cyber Cell''' and many other's.
+
* His contribution to [https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series OWASP Cheat Sheet Project] is the most.
* Contributor in [https://www.owasp.org/index.php/Benchmark OWASP Benchmark],contributed SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring. Many Thanks to [https://www.owasp.org/index.php/Benchmark#tab=Acknowledgements '''Dave Wichers''']
+
* Has a part of [https://sites.google.com/site/owaspmumbaichapter/ OWASP Mumbai Student Chapter] he as conducted a webinar for Bug Bounty as well.
* [https://www.owasp.org/index.php/WASPY_Awards_2016 2016 WASPY Nomination]
+
 
* Last but not lest Wiki Editor in [https://owasp.org OWASP].
+
== OWASP CWE Project Benchmark ==
 +
* Contributor in [https://www.owasp.org/index.php/Benchmark OWASP Benchmark],contributed SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring. Many thanks to [https://www.owasp.org/index.php/Benchmark#tab=Acknowledgements '''Dave Wichers''']
 
* Reach me on: [email protected] <br>
 
* Reach me on: [email protected] <br>
  
==Bug Bounty==
+
==Bug Bounties==
He Currently holds Bug Bounties in :
+
[https://www.linkedin.com/in/mishradhiraj/ Dhiraj] as also spoken to BugCrowd LevelUp Conference, his areas of expertise in Application Security have listed him in Hall of Fame for companies and organizations such like, Facebook, Oracle, Intel, Department Of Defense, Bugcrowd, Netgear etc.<br>
*Bug Hunter in [https://www.owasp.org/index.php/About_OWASP/Bug_Bounty/WOF OWASP].
+
Blog : https://datarift.blogspot.in/<br>
*Google VRP
 
*WikiPedia(WikiMedia)
 
*Python (Python Contributor)
 
*cPanel
 
*OWASP
 
*DLink [<span style="color:red">CVE in Process.</span>]
 
*RedHat
 
*Ubuntu
 
*Yahoo
 
*Intel
 
*Mcafee
 
*Lenovo
 
*Apache
 
*Appreciation from MIT
 
* Appreciation from Avast
 
*Appreciation from cPanel
 
*Appreciation from Amazon
 
*Appreciation from WarnerBros
 
and many more... [48/100]<br>
 
Blog : http://hackies.in/<br>
 
==Many Thanks==
 
I would gradually like to thanks BOD of OWASP , for always endorsing me and allowing me to contribute.
 
I would also like to thanks Kelly , Kate , Noreen Mam they helped me out a-lot and to Mr.Milan Singh Thakur.
 

Latest revision as of 19:20, 15 December 2019

Dhiraj Mishra

BIO

Dhiraj Mishra is an active speaker and a bug hunter, discovered multiple zero days in modern web browsers, Metasploit Contributor. His work has been published on TheHackerNews, TheRegister & BleepingComputer. He works as a Security Consultant for Cognosec DMCC, former NotSoSecure and EY.

OWASP Contributions

He has been contributing to OWASP from more than a year, as a volunteer to the open community, he is or has been :

OWASP CWE Project Benchmark

Bug Bounties

Dhiraj as also spoken to BugCrowd LevelUp Conference, his areas of expertise in Application Security have listed him in Hall of Fame for companies and organizations such like, Facebook, Oracle, Intel, Department Of Defense, Bugcrowd, Netgear etc.
Blog : https://datarift.blogspot.in/