<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Utkarsh Mishra</title>
    <description>The latest articles on DEV Community by Utkarsh Mishra (@iutkarsh).</description>
    <link>https://dev.to/iutkarsh</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1163868%2Fe1bc4b0c-a7b8-4935-9199-1677279de117.png</url>
      <title>DEV Community: Utkarsh Mishra</title>
      <link>https://dev.to/iutkarsh</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/iutkarsh"/>
    <language>en</language>
    <item>
      <title>Exploring the Future of Innovation at Solana Hacker House Mumbai</title>
      <dc:creator>Utkarsh Mishra</dc:creator>
      <pubDate>Thu, 05 Oct 2023 08:39:29 +0000</pubDate>
      <link>https://dev.to/iutkarsh/exploring-the-future-of-innovation-at-solana-hacker-house-mumbai-44gi</link>
      <guid>https://dev.to/iutkarsh/exploring-the-future-of-innovation-at-solana-hacker-house-mumbai-44gi</guid>
      <description>&lt;p&gt;The Solana Hacker House Mumbai, held from September 20th to September 24th, 2023, was an immersive journey into the world of blockchain technology, Solana, and the boundless potential of innovation. This exceptional event, hosted at the prestigious JW Marriott Mumbai Sahar, brought together blockchain enthusiasts, developers, and visionaries for a series of thought-provoking sessions, workshops, and networking opportunities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Day 1: A Strong Start&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The event commenced with the Hacker House Kick-Off, setting the tone for the days ahead. Attendees were welcomed by the minds behind Solana, Jump, and Circle, including Akshay, Kash, and Asia. They provided insights into the event's agenda, setting the stage for what promised to be an enlightening experience.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--EszQ54m4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vcjawsoms099w70ymsgy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--EszQ54m4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vcjawsoms099w70ymsgy.png" alt="Image day 1" width="800" height="392"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;One of the highlights of Day 1 was "The State of Solana" presented by Akshay BD from the Solana Foundation. This session offered an overview of Solana's current state and its exciting future. It laid the foundation for the knowledge that attendees would need to explore deeper into the world of Solana. Balaji Srinivasan's keynote on building network states was truly inspiring.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Day 2: Diving Deeper&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Day 2 delved into various aspects of Solana and its applications. "All Things Solana: How to Get Started" by Ayush Chauhan provided a rapid-fire introduction to the resources necessary for building on Solana. This session equipped attendees with the knowledge they needed to embark on their journey into the Solana ecosystem.&lt;/p&gt;

&lt;p&gt;Understanding the inner workings of Solana was crucial, and Abhishek Basu's session on "How Solana (and Blockchains in General) Work" provided invaluable insights. As blockchain technology continues to reshape industries, grasping the fundamentals is essential.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Day 3: The Creator Economy and More&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The third day focused on themes like the creator economy and traditional media challenges. "Solana is for Everyone" by 0xBanana, offered practical advice for builders and creators, emphasizing the inclusivity of the Solana ecosystem.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DPhurVvq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/x2ov3dcuo3wx47gscwrv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DPhurVvq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/x2ov3dcuo3wx47gscwrv.png" alt="Image Day 3" width="800" height="392"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A standout moment was the creator panel moderated by Tanmay Bhat, featuring Viraj Seth and Finance With Sharan. It showcased the immense potential for creators and artists within the Solana blockchain.&lt;/p&gt;

&lt;p&gt;The day concluded with a captivating keynote by Prateek Aurora on "Minimum Viable Superhero" and Chase Guo's insights on "Real World Applications in Web3."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Day 4: Towards Innovation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Day 4 was dedicated to venture capital pitches, funding in Solana, and an exciting demo day. Entrepreneurs and innovators had the chance to present their groundbreaking projects. It was inspiring to witness the innovative solutions that are being built on Solana, from decentralized finance to cross-chain initiatives.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--n4nRWRb2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9xllalskp8ly72wl8jc2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--n4nRWRb2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9xllalskp8ly72wl8jc2.png" alt="Image Day 4" width="800" height="392"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The closing celebration at Dragonfly Experience Mumbai provided a perfect ending to this remarkable event. Attendees had the opportunity to unwind and reflect on the knowledge gained and connections made over the past four days.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Looking Ahead&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Solana Hacker House Mumbai was not just an event; it was an experience that opened doors to new possibilities. Attendees left with a deep appreciation for the potential of blockchain technology, a network of like-minded individuals, and a strong sense of excitement for what lies ahead in the Solana ecosystem.&lt;/p&gt;

&lt;p&gt;As the world continues to embrace blockchain and decentralized technologies, events like the Solana Hacker House are invaluable for fostering innovation, collaboration, and learning. They serve as a reminder that the future is being built right now, and it's full of promise.&lt;/p&gt;

&lt;p&gt;Whether you're an aspiring developer, a blockchain enthusiast, or simply curious about the future of technology, events like the Solana Hacker House provide a unique platform to explore, connect, and be inspired. Stay tuned for more updates, as the Solana ecosystem continues to evolve, and the future of innovation unfolds.&lt;/p&gt;

&lt;p&gt;And, let's not forget to mention that the food provided throughout the event was nothing short of exceptional. It fueled our minds and conversations, adding an extra layer of enjoyment to the entire experience.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--X_f0QL8R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/578eqioh5wdpv324iw50.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--X_f0QL8R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/578eqioh5wdpv324iw50.png" alt="Image Food" width="752" height="416"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Disclaimer: The event details and agenda are based on information available as of September 2023, and the information provided are based on my personal experience at the event.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>web3</category>
      <category>blockchain</category>
      <category>nft</category>
      <category>cryptocurrency</category>
    </item>
    <item>
      <title>📝Unveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks</title>
      <dc:creator>Utkarsh Mishra</dc:creator>
      <pubDate>Mon, 18 Sep 2023 11:00:23 +0000</pubDate>
      <link>https://dev.to/iutkarsh/unveiling-the-owasp-top-10-2021-your-epic-journey-into-the-abyss-of-web-app-security-risks-305k</link>
      <guid>https://dev.to/iutkarsh/unveiling-the-owasp-top-10-2021-your-epic-journey-into-the-abyss-of-web-app-security-risks-305k</guid>
      <description>&lt;p&gt;Hey there, my fellow cybersecurity adventurer! I've just returned from an exhilarating expedition through the treacherous terrain of the OWASP Top 10 2021, and I'm here to take you on a deep dive into the world of web application security. Buckle up, because this is no ordinary journey; this is a quest to uncover the most cunning villains of the digital realm!&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Broken Access Control🔐
&lt;/h2&gt;

&lt;p&gt;Imagine you're on an online shopping spree, filling your cart with goodies. But then, a daring thought crosses your mind - what if you could manipulate the order ID in the URL and gain access to someone else's shopping cart?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--nMzQaMi_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dgs4kugn9nz370bh9mlt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--nMzQaMi_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dgs4kugn9nz370bh9mlt.png" alt="Broken Access Control" width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That's Broken Access Control, my friend! It's like infiltrating the VIP section of a concert without an invitation, all thanks to a glitch in the security system.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Cryptographic Failures🔒
&lt;/h2&gt;

&lt;p&gt;Ever heard of a website storing your precious password with encryption that's as fragile as a glass slipper?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--S2hRNFyK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/73rf47etb5x1u8yqaniq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--S2hRNFyK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/73rf47etb5x1u8yqaniq.png" alt="Cryptographic Failure" width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If malicious hackers lay their hands on it, they could waltz into your account, wreak havoc, and leave you counting the cost. It's like locking your front door with a paper-thin key; you might as well leave it wide open!&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Injection 💉
&lt;/h2&gt;

&lt;p&gt;Imagine you're on a website with a search bar, innocently looking for a product. But then, you stumble upon a secret passage - the search bar allows you to enter a specific term that magically reveals all customer data!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;// Try putting this in the search bar of the website!
&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That's Injection in action. It's like discovering a hidden door at a theme park that takes you behind the scenes, all because the gatekeepers didn't check your ticket.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Insecure Design🚧
&lt;/h2&gt;

&lt;p&gt;You're chatting on a messaging app, and all seems well until you realize they forgot to check the files you're sharing.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iawi6QR5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l9c7sxi4v5x2gwm9ouxd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iawi6QR5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l9c7sxi4v5x2gwm9ouxd.png" alt="Insecure Design" width="800" height="571"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;An attacker uploads a file that seizes control of your device - that's an Insecure Design right there! It's like opening an unmarked package that arrives at your doorstep without bothering to check what's inside. Surprise, it's a digital Trojan horse!&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Security Misconfiguration🔐
&lt;/h2&gt;

&lt;p&gt;Picture this: You're using a cloud storage service, and suddenly, you realize that everything you put there is accessible to the entire world! That's Security Misconfiguration at play.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--88sIM2_w--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yar0qaj8xbvyc5o1ta2o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--88sIM2_w--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yar0qaj8xbvyc5o1ta2o.png" alt="Security Misconfiguration" width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's like leaving your diary out in the open for anyone who passes by to read. Oops!&lt;/p&gt;

&lt;h2&gt;
  
  
  6. Vulnerable and Outdated Components📦
&lt;/h2&gt;

&lt;p&gt;Now, imagine constructing a website with building blocks that are outdated and known to have structural issues.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8HxN0g5l--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xqnq8aq4c975339k7i0g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8HxN0g5l--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xqnq8aq4c975339k7i0g.png" alt="Outdated Components" width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Attackers can knock your digital masterpiece down, much like a game of digital Jenga with wobbly blocks.&lt;/p&gt;

&lt;h2&gt;
  
  
  7. Identification and Authentication Failures🔑
&lt;/h2&gt;

&lt;p&gt;Ever created an account with a password like "123456"? That's a failure in Identification and Authentication.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--n0Lg7RoY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hdyci8wd2v6s59lcw3jk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--n0Lg7RoY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hdyci8wd2v6s59lcw3jk.png" alt="Authentication Failures" width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's like having a key that opens every door in the neighborhood - not exactly a paragon of security.&lt;/p&gt;

&lt;h2&gt;
  
  
  8. Software and Data Integrity Failures🔍
&lt;/h2&gt;

&lt;p&gt;Visualize downloading an update for your favorite app, only to discover that it's been tampered with by hackers. Your app goes haywire, and your data is at risk. That's Software and Data Integrity Failures in Action. It's like buying a brand-new car and realizing it's rigged to explode when you turn the key. Not a pleasant surprise!&lt;/p&gt;

&lt;p&gt;I can't find a photo for it so, &lt;a href="https://www.youtube.com/watch?v=D4iQg4V7GmY"&gt;Watch a video explanation&lt;/a&gt;!&lt;/p&gt;

&lt;h2&gt;
  
  
  9. Security Logging and Monitoring Failures📋
&lt;/h2&gt;

&lt;p&gt;Picture your house getting burglarized, but you have no security cameras or alarms. You only find out a week later when you notice your TV is gone. That's what happens when you have Security Logging and Monitoring Failures.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CsFD9TeF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sbjf8cvt6eqgtn7rnibe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CsFD9TeF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sbjf8cvt6eqgtn7rnibe.png" alt="Security Failures" width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's like living in a neighborhood with no police force, and the criminals are throwing block parties every night.&lt;/p&gt;

&lt;h2&gt;
  
  
  10. Server-Side Request Forgery (SSRF)🌐
&lt;/h2&gt;

&lt;p&gt;Ever visited a website that allows you to fetch content from any URL, and you realize you can access the company's internal servers? That's like being handed a map to the secret treasure room without anyone noticing. It's like going on a treasure hunt and finding the chest wide open with nobody guarding it!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hzR-8X5r--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jd4pk1e3ywqvvl3z4v7v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hzR-8X5r--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jd4pk1e3ywqvvl3z4v7v.png" alt="SSRF" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;So, there you have it - our grand tour through the OWASP Top 10 2021, complete with thrilling tales of digital peril and derring-do. These vulnerabilities are like the hidden traps and secret passages in the world of web applications. But remember, dear explorer, staying vigilant and implementing robust security measures is your trusty compass on this adventure. Keep the flames of curiosity alive, and stay secure out there! 🔒🌟&lt;/p&gt;




&lt;p&gt;Learn More about OWASP Top 10 at &lt;a href="https://www.hacksplaining.com/owasp"&gt;OWASP Top 10 (hacksplaining.com)&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>productivity</category>
      <category>testing</category>
    </item>
  </channel>
</rss>
