Find Jobs
Hire Freelancers

Analyze log files in order to find security issues. (WP website was hacked)

$8-15 USD / hour

Lukket
Slået op over 9 år siden

$8-15 USD / hour

My WordPress Website was hacked and used for Phishing. I deleted the injected Securepay files, but I would like to know where the weak points are that made this possible. I have security meassures on place like secret admin url, no "admin" user, etc. But now I need somebody that can look at the log files and detect where the attack came through (where are the security holes) so I can prevent it for the future. Thanks, Demian
Projekt-ID: 6682860

Om projektet

6 forslag
Projekt på afstand
Aktiv 9 år siden

Leder du efter muligheder for at tjene penge?

Fordele ved budafgivning på Freelancer

Fastsæt dit budget og din tidsramme
Bliv betalt for dit arbejde
Oprids dit forslag
Det er gratis at skrive sig op og byde på jobs
6 freelancere byder i gennemsnit $21 USD/time på dette job
Brug Avatar.
Dear Sir, I have read your Project Description and can you provide me URL of your WordPress website or access to the source code? After reviewing the files, we can give you our estimated Man-Hours. Look forward to hearing from you. Regards, YK LEADconcept
$20 USD på 40 dage
5,0 (25 anmeldelser)
7,8
7,8
Brug Avatar.
share ur file as i am a licenced peniteration tester certified from USA with ec- council with ceh,esca,chfi . share me the details we can do patches of loopholes too.
$33 USD på 68 dage
0,0 (0 anmeldelser)
0,0
0,0
Brug Avatar.
We are group of highly qualified verified web developers and security analysts. We will carry penetration test in a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system vulnerabilities, including OS, service and application flaws, improper configurations, and even risky end-user behavior. Our three way security audit follow following steps 1: Determining the feasibility of a particular set of attack vectors 2:Identifying higher-risk vulnerabilities that result from a combination of lower-risk vulnerabilities exploited in a particular sequence 3:Identifying vulnerabilities that may be difficult or impossible to detect with automated network or application vulnerability scanning software 4: Testing the ability of network defenders to successfully detect and respond to the attacks A fully documented report will be complied and handed over at end of project
$12 USD på 3 dage
0,0 (0 anmeldelser)
0,0
0,0

Om klienten

Flag for ECUADOR
Ecuador
0,0
0
Medlem siden aug. 3, 2014

Klientverificering

Tak! Vi har sendt dig en e-mail med et link, så du kan modtage din kredit.
Noget gik galt, da vi forsøgte at sende din mail. Prøv venligst igen.
Registrerede brugere Oprettede jobs i alt
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Indlæser forhåndsvisning
Geolokalisering er tilladt.
Din session er udløbet, og du er blevet logget ud. Log venligst ind igen.