Find Jobs
Hire Freelancers

Ethical Hacking

$10-30 USD

Cerrado
Publicado hace 10 meses

$10-30 USD

Pagado a la entrega
Task 1: Penetration Testing are essential for the security of organizations. It examines whether an organization's security policies, procedures and controls are genuinely effective or not. The penetration testing report provides a complete overview of the uncovered vulnerabilities with a POC (Proof of Concept) and recommendations to fix those vulnerabilities with priority details. The article “[login to view URL][login to view URL]” includes a penetration testing against the security controls within their information environment. It provides a practical demonstration on the effectiveness of the security controls and their susceptibility to be exploited. Analyse any five vulnerabilities that were identified in the report by studying the tools used to detect them and their risks. Critically evaluate any five of the suggested countermeasures. Task 2: As an Ethical Hacker, you have been given the mission of evaluating the security posture of the company’s systems, which will be identified to you by your instructor in the testbed environment. In this task, you are requested to select the appropriate tools for collecting the following information, apply them and create a well commented report in which you critically evaluate the findings: 1. Using footprinting tools, find the following details about the target company: a. Domain name, Top Level Domain and sub-domains b. Email list in the identified domain c. Web technologies d. Web server Operating System e. Branch and location details 2. Using scanning techniques, find the following details: a. Details on the live machine/machines b. List of open ports c. List of Operating Systems 3. Using Enumeration techniques, find the following details: a. List of shared folders b. system's valid usernames c. machine names d. IP tables 4. With reference to at least one popular Vulnerability Scoring Systems and Databases such as Common Weakness Enumeration (CWE), provide details on the following vulnerabilities: a. SQL Injection. b. Cross-Site Request Forgery (CSRF) c. Cross-Site Scripting (XSS) d. Session Fixation e. Local File Inclusion (LFI) 5. Gain access to the target’s web site in the virtual environment which is provided to you using: a. SQL injection b. Cross-Site Scripting (XSS) 6. Recommend the necessary security solutions for protecting against the following risks and vulnerabilities: a. SQL Injection. b. Cross-Site Request Forgery (CSRF) c. Cross-Site Scripting (XSS) d. Session Fixation e. Local File Inclusion (LFI)
ID del proyecto: 36643850

Información sobre el proyecto

13 propuestas
Proyecto remoto
Activo hace 9 meses

¿Buscas ganar dinero?

Beneficios de presentar ofertas en Freelancer

Fija tu plazo y presupuesto
Cobra por tu trabajo
Describe tu propuesta
Es gratis registrarse y presentar ofertas en los trabajos
13 freelancers están ofertando un promedio de $195 USD por este trabajo
Avatar del usuario
[✔] FIX EXPERT: You have received a 30% discount ($31) on Project 'Ethical Hacking '. (Recently finished a comparable work) - As a result, you should expect better outcomes in a shorter period (2 days). (Immediately available to begin) Hey, my name is Pablo (from Italy), and I am an English-speaking Freelance designer and developer with over 15 years of expertise (no subcontracting or outsourcing). (Google™ Sigma™ PMEC™ Udemy™ Hubspot™ LinkedIn™ Microsoft™ Certified, an AmoCRM™ Partner, and Amazon® Consumer Council, Amnesty International and Democratic Alliance member)
$73,50 USD en 2 días
4,8 (48 comentarios)
6,7
6,7
Avatar del usuario
Hi, Wednesday.. Gone through the requirements and like to assist you with the same. I will write code in Javascript, JQuery, Typescript, PHP, HTML, CSS, Bootstrap, and SQL for you. Features of this ✓ HTML5 & CSS3. ✓ Integration of JavaScript/ JQuery libraries. ✓ New features in Angular website. ✓ Javascript custom scripts. ✓ PHP custom scripts. ✓ Bootstrap Responsive. ✓ Cross-platform compatibility. ✓ HTML, CSS, and JavaScript coding in ClickFunnels. ✓ SQL issues and queries. ✓ JQuery Validation. ✓ Optimized and documented code. ✓ Speed optimization. ✓ Generic bug fixation. Service Categories: ✓ RESPONSIVE WEB. ✓ WEB DEVELOPMENT. ✓ SCRIPTING. ✓ CUSTOM WEBSITE. ✓ WEB PROGRAMMING. Please discuss the requirements before hiring. Thank you.
$20 USD en 7 días
5,0 (32 comentarios)
6,0
6,0
Avatar del usuario
Hello, my name is Randy, a skilled cybersecurity consultant based in Costa Rica. I believe that this project would be an excellent fit, and I would be honored to have the opportunity to work with your team. If you have any questions or would like to discuss this project further, please don't hesitate to contact me. I am writing to propose this cybersecurity project that I believe would be of great value to your organization. Thank you for considering my proposal, and I look forward to hearing from you soon. -Randy Varela
$100 USD en 7 días
5,0 (5 comentarios)
2,0
2,0
Avatar del usuario
hi dear I'm a Ethical Hacking developer i can update the text on your website's home page please open chat I can do all - Update the text on the home page - I have the new text content ready, so no need to create it from scratch - The main goal of the text update is to update information on the page Replies within an hour i'm here I need a new product Page on my Divi theme travel agency worpress website
$20 USD en 1 día
5,0 (2 comentarios)
1,2
1,2
Avatar del usuario
Previous experience with pentesting real life scenario. Will use state of art oper source activities and tools which will best suits the task. Will cover every aspect and send the report within a week
$220 USD en 7 días
0,0 (0 comentarios)
0,0
0,0
Avatar del usuario
Hello. I has strong experience over 10 years in cyber security. From past 8 years i am doing as head of penetration testing team. We use many global standard and methodology. If you want us to provide sample report please feel free to contact me.
$1.499 USD en 7 días
0,0 (0 comentarios)
0,0
0,0
Avatar del usuario
Based on OWASP I can complete this as you required......................................................................................
$28 USD en 7 días
0,0 (0 comentarios)
0,0
0,0
Avatar del usuario
I am writing to propose my services as a Certified Ethical Hacker (CEH) and Certified eWPTXv2 Pentester for your esteemed organization. With these certifications, I bring a comprehensive skill set and a deep understanding of security vulnerabilities, enabling me to provide effective penetration testing and contribute to the enhancement of your organization's cybersecurity posture. As a CEH and Certified eWPTXv2 professional, I have acquired extensive knowledge and practical expertise in identifying and exploiting vulnerabilities in various systems and networks. These certifications validate my proficiency in both traditional network penetration testing (CEH) and web application security (eWPTXv2). I have demonstrated my ability to perform comprehensive security assessments, deliver actionable reports, and recommend effective remediation measures. I am confident that I would be the best fit for this job as I possess the necessary skills and expertise to deliver quality results. Please feel free to reach out if you have any questions or would like more information about my services. Thank you for considering me!
$250 USD en 3 días
0,0 (0 comentarios)
0,0
0,0
Avatar del usuario
Hello there! My name is Ahmed and I am a Telecommunications Engineer with extensive experience in ethical hacking and red teaming. After completing my training in HCIA Datacom and CCNA, I possess a solid foundation in networking and data communication technologies. I have gained extensive experience in penetration testing and vulnerability analysis which will be extremely beneficial for your project. Specifically for this project, I would like to analyze any five vulnerabilities that were identified in the report by studying the tools used to detect them and provide recommendations on how to fix those vulnerabilities with priority details. Additionally, I would critically evaluate any five of the suggested countermeasures suggested within the report. I understand that ethical hacking requires thorough examination of security controls within an information environment, which requires a lot of effort. As such, I am confident that I can complete this task within the timeframe specified. Please feel free to contact me if you have any questions or would like to discuss further how I can contribute to your organization's success.
$20 USD en 7 días
0,0 (0 comentarios)
0,0
0,0

Sobre este cliente

Bandera de PAKISTAN
sargodha, Pakistan
4,8
70
Forma de pago verificada
Miembro desde dic 1, 2017

Verificación del cliente

¡Gracias! Te hemos enviado un enlace para reclamar tu crédito gratuito.
Algo salió mal al enviar tu correo electrónico. Por favor, intenta de nuevo.
Usuarios registrados Total de empleos publicados
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Cargando visualización previa
Permiso concedido para Geolocalización.
Tu sesión de acceso ha expirado y has sido desconectado. Por favor, inica sesión nuevamente.