This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Dhiraj Mishra"

From OWASP
Jump to: navigation, search
m (OWASP Contributions)
m (Dhiraj Mishra)
Line 12: Line 12:
 
* The [http://owasp.org/index.php/Mumbai_Student_Chapter Mumbai Student Chapter] Leader making student endorse in Information Security and Spreading Idea and Awareness via Chapter Meets.
 
* The [http://owasp.org/index.php/Mumbai_Student_Chapter Mumbai Student Chapter] Leader making student endorse in Information Security and Spreading Idea and Awareness via Chapter Meets.
 
* Helping and Speaking Initiatives in [https://www.owasp.org/index.php/Mumbai OWASP Local Chapter Meet Mumbai] with chapter leader Narenda Choyal.
 
* Helping and Speaking Initiatives in [https://www.owasp.org/index.php/Mumbai OWASP Local Chapter Meet Mumbai] with chapter leader Narenda Choyal.
* Past Contributor in [http://owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet The Popular XSS Filter Evasion Cheat Sheet] where as ,This article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing.
+
* Past Contributor in [http://owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet The Popular XSS Filter Evasion Cheat Sheet] where as ,this article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing.
* Lead of [https://www.owasp.org/index.php/SQL_Injection_Bypassing_WAF SQLi WAF Bypass] a very helpful cheat sheet which consists of A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researcher's.  
+
* Lead of [https://www.owasp.org/index.php/SQL_Injection_Bypassing_WAF SQLi WAF Bypass] a very helpful cheat sheet which consists of a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researcher's.  
* [https://www.owasp.org/index.php/OWASP_Trainers_Database Call_For_Trainers] in OWASP Mumbai, India , being in Trainers DB , Dhiraj have taken ton's of free Session's to '''Mumbai Cop's , Navi Mumbai Cyber Cell , Thane Cyber Cell''' and many other's.
+
* [https://www.owasp.org/index.php/OWASP_Trainers_Database Call_For_Trainers] in OWASP Mumbai, India , being in Trainers DB , Dhiraj have taken many of free Session's to '''Mumbai Cop's , Navi Mumbai Cyber Cell , Thane Cyber Cell''' and many other's.
 
* Contributor in [https://www.owasp.org/index.php/Benchmark OWASP Benchmark],contributed SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring. Many Thanks to [https://www.owasp.org/index.php/Benchmark#tab=Acknowledgements '''Dave Wichers''']
 
* Contributor in [https://www.owasp.org/index.php/Benchmark OWASP Benchmark],contributed SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring. Many Thanks to [https://www.owasp.org/index.php/Benchmark#tab=Acknowledgements '''Dave Wichers''']
 
* [https://www.owasp.org/index.php/WASPY_Awards_2016 2016 WASPY Nomination]
 
* [https://www.owasp.org/index.php/WASPY_Awards_2016 2016 WASPY Nomination]
Line 24: Line 24:
 
*Bug Hunter in [https://www.owasp.org/index.php/About_OWASP/Bug_Bounty/WOF OWASP].
 
*Bug Hunter in [https://www.owasp.org/index.php/About_OWASP/Bug_Bounty/WOF OWASP].
 
*Google VRP
 
*Google VRP
*WikiPiedia(WikiMedia)
+
*WikiPedia(WikiMedia)
 
*Python (Python Contributor)
 
*Python (Python Contributor)
 
*cPanel
 
*cPanel

Revision as of 16:28, 30 July 2016

Dhiraj Mishra
LinkedIn.gif

BIO

Dhiraj Mishra @mishradhiraj_ is an Independent researcher and Information Security enthusiast.
Author of the Book The Modern Guide for XSS Evasion which will be published by Amazon in upcoming seasons.
Demo Copy Available at Blog.

OWASP Contributions

I have been contributing to OWASP from more than a year,and would like to contribute more into it.
As a volunteer to OWASP, Dhiraj is or has been:

  • OWASP Wall Of Fame
  • Core Team Member in AppSec India 2016
  • The Mumbai Student Chapter Leader making student endorse in Information Security and Spreading Idea and Awareness via Chapter Meets.
  • Helping and Speaking Initiatives in OWASP Local Chapter Meet Mumbai with chapter leader Narenda Choyal.
  • Past Contributor in The Popular XSS Filter Evasion Cheat Sheet where as ,this article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing.
  • Lead of SQLi WAF Bypass a very helpful cheat sheet which consists of a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researcher's.
  • Call_For_Trainers in OWASP Mumbai, India , being in Trainers DB , Dhiraj have taken many of free Session's to Mumbai Cop's , Navi Mumbai Cyber Cell , Thane Cyber Cell and many other's.
  • Contributor in OWASP Benchmark,contributed SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring. Many Thanks to Dave Wichers
  • 2016 WASPY Nomination
  • Last but not lest Wiki Editor in OWASP.
  • Reach me on: [email protected]

Bug Bounty

He Currently holds Bug Bounties in :

  • Bug Hunter in OWASP.
  • Google VRP
  • WikiPedia(WikiMedia)
  • Python (Python Contributor)
  • cPanel
  • OWASP
  • DLink [CVE in Process.]
  • RedHat
  • Ubuntu
  • Yahoo
  • Intel
  • Mcafee
  • Lenovo
  • Apache
  • Appreciation from MIT
  • Appreciation from Avast
  • Appreciation from cPanel
  • Appreciation from Amazon
  • Appreciation from WarnerBros

and many more... [48/100]
Blog : http://hackies.in/

Many Thanks

I would gradually like to thanks BOD of OWASP , for always endorsing me and allowing me to contribute. I would also like to thanks Kelly , Kate , Noreen Mam they helped me out a-lot and to Mr.Milan Singh Thakur.