Somos una empresa de desarrollo de software que estamos finalizando el armado de un sitio web en tecnología .Net con SQL Server, y el cliente nos pide que un tercero realice un análisis de seguridad y vulnerabilidades del mismo para aprobar su instalación. Se esperan reportes de análisis con herramientas automaticas y sobre todo un ataque/análisis de vulnerabili...
Tenemos escrito un informe técnico sobre un análisis de vulnerabilidades sobre una red empresarial (Informe técnico de Penetration Test). Necesitamos hacerle modificaciones de forma que quede redactado de forma profesional, con palabras adecuadas, con buen formato y estética. Todo esto en formato Word. El informe actual tiene unas 8 paginas aproximanda...
...alguna de las siguientes Certificaciones:•Certificación CISSP (Certified Information Systems Security Professional) o•Certificación CISM (Certified Information Security Manager) o•Certificación CEH (Certified ethical Hacking) o •CPTE (Certified Penetration Testing Engineer)Si no cumple con los anteriores requerimientos, abstén...
...Internacionales.?Desarrollo de Scripts Linux/Windows?Análisis de Datos/Log Manager?Gestión de Incidentes de Seguridad?Apoyo para Auditorias de Seguridad PCI/ ISO 27000.?Hetical Haking?Penetration Testing?Vulnerability Assessment?Identificar los problemas técnicos.?Apoyo a preventa en lenguaje técnico.?Establecer y mantener relaciones sólidas en todo el ...
Your ability determines how much you can earn！！ Web Security and Penetration Test I am looking for a great person to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is
...It may help to explain the required input and the desired output: - Input - We would be using the app to log samples recovered during a standard penetration test boring procedure. A standard penetration test is a drilling procedure where we log the encountered soil type, color, consistency and density at each depth we drill. The borings we drill range
Hello! I’m looking for someone to help penetrate test my web app (desktop, App Store, android store). We’re building a Software product for healthcare, I require the data and use information secure. The app is about to run into a pilot and would like to have a penetration test run prior to going live on 19 November. Is this something you can help me
explore and evaluate the vulnerabilities of wireless devices through researching existing literature articles, journals, white papers, and practical experiments with use of screenshots. once experiments complete explore mitigation techniques that can be employed.
Hello Folks, We are information security startup who provide following services 1. Web application penetration testing 2. Mobile application penetration testing 3. Network va pt 4. Thick client penetration testing We follow following methodologies 1. Sans 2. Owasp top 10 we require unique content for our new website.
We would like a penetration test and report (including recommendations) for an installation of our media asset management system on one of our public facing servers. The system manages videos, stills, audio and other files for its customers. Metadata associated with these files is also stored in the system. It would be useful to see if these media
We run an e-commerce website, and now we want to find a big cow with experience in information security to do system security work for us. Need to have experience in website penetration testing. The freelancer should be an information security practitioner 我们经营着一个电商网站，现在我们想寻找一名在信息安全方面有经验的大牛为我们做系统安全工作。需要有网站渗透测试经验。
Project Theme/ Project Title: FRAPPE: DETECTING M...such as Facebook, twitter, Instagram etc has however led to the increase in privacy and security concerns. Main Deliverable: Java or Python programming for penetration testing Secondary Deliverable: Theoretical studies of password protection, data & app security and understanding of data encryption
Looking for a professional penetration tester to test my server in order to determine if it's vulnerable to any attack
I am looking for someone who can a) Perform penetration testing of our crypto exchange b) Provide long term support & maintenance of the exchange - Regular health checks - Providing assistance and fixing bugs in case of any issues Skills required: Experience with Laravel 5.6, CSS, MySQL 5.7, Web Sockets, PHP & Event sourcing If
I am looking for a penetration tester for periodic assessments against company networks. The person should be very familiar with Metasploit CLI interface (MSFConsole). If you are familiar with additional tools that is great. The tests will be performed using MSFConsole over a WebEx for observation and assistance. You must be able to create reports of
I need a brochure (in english and french) for my cyber security company. Company name: Elliptic Cyber website: [iniciar sesión para ver URL] email: contact@[iniciar sesión para ver URL] Phone: xxxxxxxxxxx Slogan: "Your Digital Shield" (english) "Votre bouclier numerique" (french) Attached is the logo .......................Content ...
...summarizing your penetration testing processes and findings. Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to you, but you must give a brief rationale as to why you have selected it. The scope of the test is limited to
...have a web app that we need to have some PEN tests carried out on. This is a web only system and we need software testing not server security. We want to arrange an independent test to see if the web software system security is good, bad, or ugly and find weaknesses and vulnerabilities. We can give login name and passwords so that tests can be carried
...development skills? I am looking to hire for a project that starts next week, and you will work minimum of 20 hours per week. Experience with Laravel and TDD will be useful. Skills required are: 1. API development: Strong experience creating a new API and integrating with existing APIs 2. TDD: Strong experience with test-driven development 3. Trading
I need a logo for my cyber security company and a flyer that will outline our services. The name of the company is elliptic Cyber ("Votre assurance en ligne") Website: [iniciar sesión para ver URL] Who we are! Elliptic Security is an experienced and talented team of cyber security professionals whose primary mission is to provide our clients with
...given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system. The coursework is to apply
We have a client-server software with web app + mobile app as front end and looking for good hacker to break into it and find all the loopholes. A detailed report is required for each iteration. Thanks!
Hi, I am looking for a program that can check Socks4/Socks5 validity from a [iniciar sesión para ver URL] and then expose port 5566 as a proxy to be used by other penetration testing tools. and change proxy each 1min. So now i can run [iniciar sesión para ver URL] with different socks4/5 each 1min a new one.
...(LTE-A) release 10 standard [7, 8, 9]. Indeed, using Mobile Relays (MRs) within the highspeed railway enhances the cellular coverage and overcome the moderate to high vehicle penetration loss (VPL)[10, 11] and also help to group handover procedures of (UE) devices, mobile relay also suffer from frequent handover. For example assume the train travailing with
Experienced tester required to help us setup one-off infrastructure to test website that is currently in beta - and allow on-going testing as various changes occur. End to end testing of responsive website is required for desktop, tablet and mobile on various popular browsers: Should be familiar with automated testing and tools ( eg from amongst the
Web Security and Penetration Test I am looking for a great team to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is a very very difficult project. Challenge it , you
Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to you, but you must give a brief rationale as to why you have selected it. The scope of the test is limited to the IP address of the VM, and to any discovered open ports.
we need a website content will cover the below: IT Support: Business, Home Website design Cloud solution: Office 365, Microsoft Azure and Amazone aws Security: Penetration test, Forensic, Vulnerability assessment ERP solution: Accounting, invoicing, Purchase, Inventory, HR, POS
Hi We are looking for a long term contract (renewed annually based on quality of service) for 4 times an year VAPT penetration testing i..e. report every 3 months for our web application. Below are the quick details: - 12-15 dynamic pages - Web based custom developed application (Ngnix, Phython, MySql, Linux) • Single installation on a server if hosted
I want one windows application which is able to scan URL and find vulnerabilities and generate report after penetration testing. I want it for black box security audit which will be able to categorized vulnerabilities from OWASP top 10, also it will able to update its vulnerability database from OWASP, For reference, you can check Acuntix web vulnerability
We are a small an IT security provider startup and we are looking for a technical writer to provide content for the corporate documentation, mainly: - Description and Methodology of the services ( Penetration tests, vulnerability assessments, Wireless and Mobile app Assessment, etc) - Proposal documents and SOW. - Content for the corporate brochure
Required points - 1. Alternate Data connection with Credit Underwriting 2. Financial Results of NBFC's and their improvement in Credit Penetration due to Alternate Data and Impact on Micro & Small Enterprises in India. Must be minimum 15-20 pages. need it in a week
You need to remove malware and give all possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress/woocommerce site so likely to be vulnerable. This is for a site in testing stage. You will secure the whole website and prepare
Hello. Are u a freelance penetration tester? I am looking to form a team of pen testers to take on a project. Pay is negotiable. Are u based in singapore? Pls whatsapp me at 97731397 to connect
We hav...needs Penetration Testing (Pen Test) and GDPR compliance/data security testing. The product is written in MS .Net and MVC, Angular with SQL server database. We are looking to work with UK based company, purely for the ease of working business hours etc. Please only apply if you have demonstrable experience in this are. Thanks for looking.
I am looking for free-lancers to do a simple WAPT and provide report with mitigation for my web-application. I don't want newbies, share a sample report with your budget. The web-application is of a consultation firm made on Laravel Framework. It also has login page for students as well as staff. We might also make it a bug-bounty private program based
...commodity Sales. Acquisition of De-mat / Trading account from open market and leads (Offline & Online). Achieving monthly targets. Conduct lead generation activities for sales penetration Providing service to the prospects. Undertaking prospects servicing of clients through various avenue. Generate Equity Business and maintain strong client relationship Get