This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Dhiraj Mishra"

From OWASP
Jump to: navigation, search
m (OWASP Contributions)
m (OWASP Contributions)
Line 15: Line 15:
 
* [https://www.owasp.org/index.php/OWASP_Trainers_Database Call_For_Trainers] in OWASP Mumbai, India , being in Trainers DB , Dhiraj has taken many of free Sessions to '''Mumbai Cops , Navi Mumbai Cyber Cell , Thane Cyber Cell''' and many others.
 
* [https://www.owasp.org/index.php/OWASP_Trainers_Database Call_For_Trainers] in OWASP Mumbai, India , being in Trainers DB , Dhiraj has taken many of free Sessions to '''Mumbai Cops , Navi Mumbai Cyber Cell , Thane Cyber Cell''' and many others.
 
* The [http://owasp.org/index.php/Mumbai_Student_Chapter Mumbai Student Chapter] Leader making student endorse in Information Security and Spreading Idea and Awareness via Chapter Meets.
 
* The [http://owasp.org/index.php/Mumbai_Student_Chapter Mumbai Student Chapter] Leader making student endorse in Information Security and Spreading Idea and Awareness via Chapter Meets.
 +
* Authors and Primary Editor's in [https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet SQL Injection Prevention Cheat Sheet.]
 
* Past Contributor in [http://owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet The Popular XSS Filter Evasion Cheat Sheet] where as ,this article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing.
 
* Past Contributor in [http://owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet The Popular XSS Filter Evasion Cheat Sheet] where as ,this article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing.
 
* Lead of [https://www.owasp.org/index.php/SQL_Injection_Bypassing_WAF SQLi WAF Bypass] a very helpful cheat sheet which consists of a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researchers.  
 
* Lead of [https://www.owasp.org/index.php/SQL_Injection_Bypassing_WAF SQLi WAF Bypass] a very helpful cheat sheet which consists of a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researchers.  

Revision as of 04:52, 8 August 2016

Dhiraj Mishra
LinkedIn.gif

BIO

Dhiraj Mishra @mishradhiraj_ is an Independent researcher and Information Security enthusiast.
Author of the Book The Modern Guide for XSS Evasion which will be published by Amazon in upcoming seasons.
Demo Copy Available at Blog.

OWASP Contributions

I have been contributing to OWASP from more than a year and would like to contribute more into it.
As a volunteer to OWASP, Dhiraj is or has been:

Bug Bounty

He Currently holds Bug Bounties in :

  • Bug Hunter in OWASP.
  • Google VRP
  • WikiPedia(WikiMedia)
  • Python (Python Contributor)
  • cPanel
  • OWASP
  • DLink [CVE in Process.]
  • RedHat
  • Ubuntu
  • Yahoo
  • Intel
  • Mcafee
  • Lenovo
  • Apache
  • Appreciation from MIT
  • Appreciation from Avast
  • Appreciation from cPanel
  • Appreciation from Amazon
  • Appreciation from WarnerBros

and many more... [48/100]
Blog : http://hackies.in/

Many Thanks

I would gradually like to thanks BOD of OWASP , for always endorsing me and allowing me to contribute. I would also like to thanks Kelly , Kate , Noreen Mam they helped me out a-lot and to Mr.Milan Singh Thakur.