Part 1 : Hunting Vulnerabilities in Smart contracts

  • Independent Information Security Consultant focusing on security assessments (applications, infrastructures and smart contracts)
  • Previously worked as bug bounty hunter with Multiple organizations like Microsoft (MSRC), Google, Zoho etc
  • here is my personal portfolio https://www.ad3sh.com

So first how smart contracts works ? 🤔

I am Adesh Nandkishor Kolte an Independent Security Resercher From India

and also working with SecureLayer7 as a Security Consultant

Talking about Microsoft bug bounty first point they only accept submission which is high impact. Big `NO` to low hanging fruits and big `NO` if you can not exploit the…

SQL Injection Vulnerability In University Of Cambridge

Hello

Introduction Of Author:

I am Adesh Nandkishor Kolte ,An Independent Security Resercher From India

Found a SQL Injection Vulnerability in University Of Cambridge

This is the most prevalent and most dangerous of web application vulnerabilities. Having this SQLi vulnerability in the application…

Adesh Kolte

Listed in Top 100 most respected hackers in the world by Microsoft at the BlackHat conference in America 2018

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store