I am looking for a penetration tester for periodic assessments against company networks. The person should be very familiar with Metasploit CLI interface (MSFConsole). If you are familiar with additional tools that is great. The tests will be performed using MSFConsole over a WebEx for observation and assistance. You must be able to create reports of
...enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Audit, Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Expert Witness Services Industrial Control Systems Security Incident Response & Remediation
... 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to
We are a software company that have a web app that we need to have some PEN tests carried out on. This is a web only system and we need software testing not server security. We want to arrange an independent test to see if the web software system security is good, bad, or ugly and find weaknesses and vulnerabilities. We can give login name and passwords
...levels of speed and data integrity. 6. Security: Experience implementing security considerations to protect sensitive user data. Experience with server hardening and penetration testing. If you don't meet at least 4 of the requirements listed above, don't apply. Please don't send a cover letter. Just make sure your profile is updated with relevant
I need a researcher from Pakistan. Who can assist me in writing up my paper. She will be responsible for research related work such as paper gathering, consolidating and searching up for references and should prompt on timely basis. Chances of meeting are very realistic so the candidate should be well aware of that. She should respond on time and payment will be done as per the work load based o...
...technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Industrial Control Systems Security Incident Response & Remediation Cyber Security
...given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system. The coursework is to apply the
We have a client-server software with web app + mobile app as front end and looking for good hacker to break into it and find all the loopholes. A detailed report is required for each iteration. Thanks!
Hi, I am looking for a program that can check Socks4/Socks5 validity from a [log ind for at se URL] and then expose port 5566 as a proxy to be used by other penetration testing tools. and change proxy each 1min. So now i can run [log ind for at se URL] with different socks4/5 each 1min a new one.
...(LTE-A) release 10 standard [7, 8, 9]. Indeed, using Mobile Relays (MRs) within the highspeed railway enhances the cellular coverage and overcome the moderate to high vehicle penetration loss (VPL)[10, 11] and also help to group handover procedures of (UE) devices, mobile relay also suffer from frequent handover. For example assume the train travailing with
...one-off infrastructure to test website that is currently in beta - and allow on-going testing as various changes occur. End to end testing of responsive website is required for desktop, tablet and mobile on various popular browsers: Should be familiar with automated testing and tools ( eg from amongst the usual suspects such as GhostInspector, Selenium
Web Security and Penetration Test I am looking for a great team to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is a very very difficult project. Challenge it , you
Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to you, but you must give a brief rationale as to why you have selected it. The scope of the test is limited to the IP address of the VM, and to any discovered open ports.
we need a website content will cover the below: IT Support: Business, Home Website design Cloud solution: Office 365, Microsoft Azure and Amazone aws Security: Penetration test, Forensic, Vulnerability assessment ERP solution: Accounting, invoicing, Purchase, Inventory, HR, POS
Hi We are looking for a long term contract (renewed annually based on quality of service) for 4 times an year VAPT penetration testing i..e. report every 3 months for our web application. Below are the quick details: - 12-15 dynamic pages - Web based custom developed application (Ngnix, Phython, MySql, Linux) • Single installation on a server if hosted
I want one windows application which is able to scan URL and find vulnerabilities and generate report after penetration testing. I want it for black box security audit which will be able to categorized vulnerabilities from OWASP top 10, also it will able to update its vulnerability database from OWASP, For reference, you can check Acuntix web vulnerability
I need someone to Audit and also Optimize my Google Ad-words account. Looking for someone preferably in Karachi
...security provider startup and we are looking for a technical writer to provide content for the corporate documentation, mainly: - Description and Methodology of the services ( Penetration tests, vulnerability assessments, Wireless and Mobile app Assessment, etc) - Proposal documents and SOW. - Content for the corporate brochure . Knowledge of IT security
Required points - 1. Alternate Data connection with Credit Underwriting 2. Financial Results of NBFC's and their improvement in Credit Penetration due to Alternate Data and Impact on Micro & Small Enterprises in India. Must be minimum 15-20 pages. need it in a week
...malware and give all possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress/woocommerce site so likely to be vulnerable. This is for a site in testing stage. You will secure the whole website and prepare for the pentest. If
We are looking for Facebook marketing campaign for our newly opened "Kitchen cum resturnat" in Karachi, Pakistan. We cook to order vast variety of traditional Pakistani meals namely Biryani, Chicken Qourma, Haleem, Bar B Que, Sweet dishes etc for different events including marriages, parties, in house functions etc. We also sell traditional Pakistani
We have a product, Live chat, that needs Penetration Testing (Pen Test) and GDPR compliance/data security testing. The product is written in MS .Net and MVC, Angular with SQL server database. We are looking to work with UK based company, purely for the ease of working business hours etc. Please only apply if you have demonstrable experience in this
I am looking for free-lancers to do a simple WAPT and provide report with mitigation for my web-application. I don't want newbies, share a sample report with your budget. The web-application is of a consultation firm made on Laravel Framework. It also has login page for students as well as staff. We might also make it a bug-bounty private program based on the responses.
...commodity Sales. Acquisition of De-mat / Trading account from open market and leads (Offline & Online). Achieving monthly targets. Conduct lead generation activities for sales penetration Providing service to the prospects. Undertaking prospects servicing of clients through various avenue. Generate Equity Business and maintain strong client relationship Get
You need to remove malware and give all possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress site so likely to be [log ind for at se URL] will give all possible support you can in terms of making the site safe from future attacks.
Looking for penetration tester / ethical hacker for a Enterprise-level SaaS solution with multiple access points. This is a long-term partnership with multiple projects in the pipeline. Experience with cybersecurity audits and SOC 2 compliance is a plus.
We have multiple application for both mobile and web running on the same backend. We want to test these applications and APIs to find any security issues. A...and 1 windows application consuming these APIs. Important Note: While providing the quote, you must explain the following:- 1. The tools you are using for testing beforehand 2. Method of testing
...elements, - Landing Page -- Landing Page slider -- Our Services brief -- About Us -- Contact Us These are the three main services that we are offering: - Penetration Testing - Incident Response - Managed Security Solutions The logo is attached. You may request access to copywriting, which you MUST include in your entry. The accepted
Product :- Nihar hair oil Problem statement :- Market penetration strategy of Marico in rural india for Hair oil segment( NIhar) Objectives:- 1- Accessing the Market share of Nihar in rural areas. 2- Perception mapping of Customers.(Survey of consumers as well as retailers to assess the brand recall, affordability and utility 3- Recommendations based
We are a leading Digital Marketing Agency and Consultancy with many customer acquisition and penetration topics. Partly ad hoc, partly with a week's notice we need support to "beautify" or build slides in English and German. Pls reach out if that works with you.
The company is a IT/Cyber Security services company that provides solutions/consultings in Vulnerability assessment, IT infrastructure Security , Penetration Testing etc I have rough idea for the logo in my mind and I'm uploading a rough sketch of it
I have a Server hosted with Digital Ocean with a Magento store installed and CWP Panel in...Digital Ocean with a Magento store installed and CWP Panel installed. We have been compliant for a year, and now need to renew our PCI Compliance I need someone to do a penetration test and fix any issues, it looks like apache, mysql etc needs updating. thanks
I want a video ad which I will be running on Facebook and YouTube to attract new visitors on my website. I own a watch store. The add needs to a...Facebook and YouTube to attract new visitors on my website. I own a watch store. The add needs to attract a Demographic of 16-40 yaer old men and women from Pakistan cities like Karachi Lahore and Islamabad
Hello, I need a penetration tester and unique network admin for my jobs,please apply only if you are comfortable with any hats.
We wish to have a Penetration test of two websites conducted and a report on the findings created. We would ask the selected Freelancer to be careful, these are active websites and we would wish to minimize any disruption to users. If an exploit will cause disruption (e.g. changing an existing user password) then tell us how you could have done this
Print 1000 Black and White A4 flyers on your own, and post it on locations at your city according to our instruction (Computer Shopping Centers, IT Centers). The flyers will be related to computer product/service sales.