Find site vulnerability jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,946 find site vulnerability jobs found, pricing in USD

    ...shall allow Paula Reyes (owner/site admin) to limit the number of devices (cellphone, tablet, computer, etc.) allowed per account. This custom code shall: 1. restrict the number of devices associated with each membership. 2. allow the member to manage (add or remove) specific devices from their membership 3. Allow Owner/site admin to review the device history

    $550 (Avg Bid)
    NDA
    $550 Avg Bid
    1 bids

    Want to develop a piece of software that clients can pay for access to operate via web browser or mobile devices. Software would walk clients through all hazards, risk, vulnerability, and threat assessments. For Cyber and Physical Security. Clients would pay via credit card and would set up logins to use it. User management interface to close accounts

    $2126 (Avg Bid)
    $2126 Avg Bid
    36 bids
    Generation of Web Log Data 5 days left
    VERIFIED

    Name - 2 types of log dataset creation Description - Type -1 = Crawlers, bots, spiders or robots data Type -2 = Malicious users data using automated web vulnerability scanners i.e. (TypAcunetix/Netsparker/W3AF) Type-1 traffic - An external traffic that is open to the internet is needed. In detail, log files should contain crawling data collected

    $76 (Avg Bid)
    $76 Avg Bid
    1 bids

    Please bid only...and generate a report for the same. namely heyi .. in how much can you provide a website that checks for these Website Fingerprinting version based vulnerability detection SQL injection Cross-site scripting Remote command execution Discover sensitive files Have a look at [login to view URL] . Need to build something like that.

    $124 (Avg Bid)
    $124 Avg Bid
    4 bids

    We want to implement the below security for sessions on our website. (Vb.net,ASP.net) User Session Recreation Vulnerability Regenerate session tokens after a period of time, after certain number of requests, prior to any significant transactions. Application should only issue session ID’s of newly generated sessions to users after they have successfully

    $193 (Avg Bid)
    $193 Avg Bid
    14 bids
    Dreamhost fix hacked server 10 hours left
    VERIFIED

    ...server has been hacked, and multiple sites affected. We need the entire server cleaned, the vulnerability identified and removed from the server and all the wordpress websites. All sites, are currently on ONE USERNAME on the Dreamhost Shared Server. We need each site to be to moved onto their own username accounts on the server to mitigate risk. Will pay

    $106 (Avg Bid)
    $106 Avg Bid
    19 bids

    ...settings only from the specified perimeter. 2. check the hardening and the permissions of the operating system user and the container environment (Linux SE) 3. use of a vulnerability scanner on the IP address of [login to view URL] 4. checking the malware detection (Watering Hole / HIDS) 5. segmentation of the application according to the DMZ scheme

    min $41 / hr
    Sealed NDA
    min $41 / hr
    8 bids

    Vulnerability research project

    $106 (Avg Bid)
    $106 Avg Bid
    11 bids

    ...need you to develop an analytics platform/application using AWS stack - the platform must be highly integrable with other common technologies such as Cisco firewall and vulnerability management solutions such as Qualys and must be able to ingest logs from other cloud platform or enterprises using API. The platform must be highly restricted and secure

    $2956 (Avg Bid)
    $2956 Avg Bid
    9 bids

    Hi Mudassar, I would like offer a new project, it is about a vulnerability assessment for my website [login to view URL] before it lauched. We can talk about details by chat. Thanks!

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    1 bids

    ...cause to the website, its visitors and other customers until the cause of the issue has been identified and resolved How has this happened? Often this is caused by a vulnerability somewhere in your website's code which has allowed an attacker to inject malicious scripts into your website. Normally this is possible via exploitable vulnerabilities in

    $158 (Avg Bid)
    $158 Avg Bid
    26 bids

    Customer reporting portal Purpose Present customer with vulnerability information about their infrastructure in a delicate and easy user web interface with options for exporting raw data and access governed by roles. Function Some examples of views that shall be available: Pie chart distributing vulnerabilities by severity, critical/high/medium

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    5 bids

    Want to develop a piece of software that clients can pay for access to operate via web browser or mobile devices. Software would walk clients through all hazards, risk, vulnerability, and threat assessments. Clients would pay via credit card and would set up logins to use it. User management interface to close accounts or block access needed Storage

    $1660 (Avg Bid)
    $1660 Avg Bid
    39 bids

    Me and my team are currently working on a website vulnerability tester and are looking for people to find any bugs in our program. We currently have tested it on Windows 10, but no other operating systems.

    $152 (Avg Bid)
    $152 Avg Bid
    9 bids

    ... 1) To detect vulnerability by examining web log files 2) To develop methodology in R to detect and accurately distinguish normal user, crawlers (or bots, spiders or robots), and malicious users using automated web vulnerability scanners (TypAcunetix/Netsparker/W3AF) 3) Real-time detection 4) Other than SQLI and XSS vulnerability such as CSRF should

    $649 (Avg Bid)
    $649 Avg Bid
    10 bids

    Hello, I have a Wordpress website which has been quarantined because its was compromised and 'hacks' due to vulnerability in the website software hosted on the account or a weak CMS password. Simply, I want to clean and secure it and back to live again and make sure that issue doesn't happen again in the future You'll work directly on the website

    $36 (Avg Bid)
    $36 Avg Bid
    28 bids

    Have one word press website, vulnerability report. I need a a 2 page writing on the same. Can some one help ? Should complete in 2 hours.

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    2 bids

    ...traffic being sent to the target of the DoS attack (in this case, Google IP addresses were the targets of the DoS, and your EC2 Instances were remotely used to DoS them). The vulnerability is caused by allowing *Inbound Traffic* from anywhere in the world (0.0.0.0/0) to all ports (0 - 65535) in your security groups configuration (which are attached to your

    $75 (Avg Bid)
    $75 Avg Bid
    10 bids

    Patching PHP software with vulnerability

    $23 (Avg Bid)
    $23 Avg Bid
    17 bids

    Identify and explain the significance o...family Describe the risk and protective factors in the scenario Supported by research, discuss how the risk factors could impact on parenting capacity and increase the vulnerability of children to risk of harm Outline the concept of resilience, and how this could be supported for each family member Case study:

    $28 (Avg Bid)
    $28 Avg Bid
    22 bids

    ...Flask/Django that does the following: Definitions: Operator - the individual performing the actions on the site. userid/username(full name) - the staff member /object being handled by the site. 1) Requires an operator to log in before accessing the site. There will only be one username/password, and the credentials can be hard coded. 2) Once an operator

    $582 (Avg Bid)
    $582 Avg Bid
    39 bids

    HI , i am building an app and i want to evaluate the security of the features based on...A V Comparatives report of how vulnerable my app will be in comparison to other known security phone apps i need to evaluate the score based on criteria of phone device vulnerability such as microphone access permission can be used for attack on phone for instance

    $137 (Avg Bid)
    $137 Avg Bid
    7 bids

    The below are the errors my site have Critical Errors Canonical link check: Canonical link point on page with http status code: 0 Alternate link check: Alternate link point on page with http status code: 0 Alternate link check: Alternate link point on page with http status code: 301 Alternate link check: Alternate link point on page with http status

    $257 (Avg Bid)
    $257 Avg Bid
    17 bids

    ...spectrum of people, process and technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Audit, Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Expert Witness Services Industrial Control Systems

    $40 (Avg Bid)
    Urgent Guaranteed
    $40
    53 entries

    ...the full spectrum of people, process and technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Industrial Control Systems Security Incident Response

    $60 (Avg Bid)
    Urgent Guaranteed
    $60
    232 entries

    ...recipients who share the folder. *Script must remain secure. Basically a script or tool inside Google apps (GSuite) that does not expose it to any outside third party vulnerability, of course, but does the following: Allows us to enable/disable Google Drive folder/file change notifications. So if a file is created, added or changed in a particular

    $130 (Avg Bid)
    $130 Avg Bid
    7 bids

    ...txt or upload a Word/PDF/etc and send it to the third party system via API. PHP or other code must be built using bank-grade methodologies and pass Acunetix or similar vulnerability scan. This includes designing the main website, the user interface as well as the backend code. Basically, everything to make this a fully operational business. Programmer

    $1361 (Avg Bid)
    $1361 Avg Bid
    39 bids

    ...implementation of security concepts in the MS environment o Experience in the connection to HP SM and SIEM o Experience in the area of security of standard technologies and vulnerability elimination on web servers o Knowledge in MS Hyper-V/VM-Ware architecture/application, as well as Domain Controller, Exchange and Citrix o Conception and operation of

    $43 / hr (Avg Bid)
    $43 / hr Avg Bid
    2 bids

    Using kali Linux and VM, need to do surface attack and vulnerability check. Must have good knowledge in kali Linus and other computer security related softwares.

    $98 (Avg Bid)
    $98 Avg Bid
    3 bids

    We need a tester to test our AWS hosting through the console and generate report.

    $40 (Avg Bid)
    $40 Avg Bid
    11 bids

    ...Mainframe SRG and/or STIGs as updates are released, and report changes with the potential to have significant impact. • Analyze DoD and DISA directives and orders, and provide vulnerability reports • Review and validate the installation and configuration of cyber tools on UNISYS assets and report deficiencies. • Participate in A&A process activities, including

    $39 / hr (Avg Bid)
    $39 / hr Avg Bid
    12 bids

    we need a website content will cover the below: IT Support: Business, Home Website desig...content will cover the below: IT Support: Business, Home Website design Cloud solution: Office 365, Microsoft Azure and Amazone aws Security: Penetration test, Forensic, Vulnerability assessment ERP solution: Accounting, invoicing, Purchase, Inventory, HR, POS

    $138 (Avg Bid)
    $138 Avg Bid
    46 bids

    Hi We are looking for a long term contract (renewed annually based on quality of service) for 4 times an year VAPT penetration testing i..e. report every 3 months for our web application. Below are the quick details: - 12-15 dynamic pages - Web based custom developed application (Ngnix, Phython, MySql, Linux) • Single installation on a server if hosted on Cloud (It is 3 tier architecture We...

    $396 (Avg Bid)
    $396 Avg Bid
    34 bids

    Hi Mudassar, good day!. I need your help for a project, it consists of a new Vulnerability Assessment of my website [login to view URL], which I changed its hosting provider. In addition to this I need a security analysis for 3 landing pages that are in the same hosting, one of them is built in Wordpress, but the other two are built in html (AMP) The landing

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    1 bids

    I want one win...which is able to scan URL and find vulnerabilities and generate report after penetration testing. I want it for black box security audit which will be able to categorized vulnerabilities from OWASP top 10, also it will able to update its vulnerability database from OWASP, For reference, you can check Acuntix web vulnerability scanner.

    $113 (Avg Bid)
    $113 Avg Bid
    12 bids

    ...these versions should be compared to the CVE database to see if there are any Critical or vulnerabilities with the version Output of this should be, if there is a Critical vulnerability, to the PCI-notification slack channel (channel needs to be created) Each month a new Jira ticket is automatically created with this task. I would like this task to be able

    $20 (Avg Bid)
    $20 Avg Bid
    1 bids

    We are a s...and we are looking for a technical writer to provide content for the corporate documentation, mainly: - Description and Methodology of the services ( Penetration tests, vulnerability assessments, Wireless and Mobile app Assessment, etc) - Proposal documents and SOW. - Content for the corporate brochure . Knowledge of IT security services

    $889 (Avg Bid)
    $889 Avg Bid
    42 bids

    ...nosql, app engine), Google Earth Engine, Google Map, - Paypal for payments of storage hosting, capacity upgrades, renewals subscription - OWASP top 10 web application vulnerability scanning e.g. github - JSON for multi language website (initially just English and Spanish) - Developer is overall responsible for configuring Google Cloud Platform to

    $765 (Avg Bid)
    $765 Avg Bid
    25 bids

    Hi Risky Pathak, I am Andrew. We worked together years ago with a C+ project ... I need a to combine a number of scripts i have to work together. This project is for me and my friends to have a private website that will have a number of IP tools, vulnerability Testing tools and more. Are you interested? IF SO_ lets talk a price. Thanks in advance.

    $35 / hr (Avg Bid)
    $35 / hr Avg Bid
    1 bids

    ...testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress/woocommerce site so likely to be vulnerable. This is for a site in testing stage. You will secure the whole website and prepare for the pentest. If all succeed you will give all possible support you can in terms of making the site safe

    $199 (Avg Bid)
    $199 Avg Bid
    6 bids

    Check Website for vulnerability and potential Risk Inspect Codes for flaws and vulnerability Fix vulnerability and potential risks and secure website

    $141 (Avg Bid)
    $141 Avg Bid
    20 bids

    I already have a on page php code which is vulnerable and only uploads 1 image. I need 1) for it to upload up to three images 2) max files size limit and err message 3)...it to upload up to three images 2) max files size limit and err message 3) file type limit and err message 4) reCAPTCHA integration and verification of any other basic vulnerability

    $29 (Avg Bid)
    $29 Avg Bid
    11 bids

    Penetration Testing and Vulnerability Assessment for our university network.

    $534 (Avg Bid)
    $534 Avg Bid
    34 bids

    ...vulnerabilities, and what is the causes and impact. is there a work around solution? you need to explain and write. It would be good if you can attach screenshot If you can find different kind of vulnerabilities from different vulnerabilities assessment tool. please help to write. because this is a bonus for me. **Do not Copy anything from the internet**

    $112 (Avg Bid)
    $112 Avg Bid
    13 bids

    I had some list of exposed public Ip addresses I need to run Nmap on those to find vulnerabilities on this address any thoughts Note: I am authorized to explore them

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    25 bids

    I have a vulnable prolog file that has structures. Create at least five queries from the feature lists and make sure the tables & sample data match...have a vulnable prolog file that has structures. Create at least five queries from the feature lists and make sure the tables & sample data match what the existing Prolog vulnerability database contains.

    $25 (Avg Bid)
    $25 Avg Bid
    22 bids

    ...issues coming to it while uploading it to playstore ... Read below issues or may be few more are there, you need to resolve them all. 1. Hostname verifier. 2. Security Vulnerability Issues. Check for other issues & send us back the working codes. 5 star guaranteed & we want you to get this done by tomorrow 1pm MAX... BID only when you can do it on

    $25 (Avg Bid)
    $25 Avg Bid
    5 bids

    I have a site that was hacked with this exploit: [login to view URL] There's a wordpress, a magento, and a vbulletin site on this host. I just restored from a backup, and was hacked again. I restored from yet another backup, and want someone to go through and let me know if there

    $423 (Avg Bid)
    $423 Avg Bid
    14 bids

    Vulnerability Assessment tool: Nessus Operating System: Debian 6(Squeeze) Scope of the Paper (Why you need to do this scan?)explain A world global leading energy sector...(Please help to write with your experience and creativity, base on vulnerability assessing the client) Summary of Finding We will be performing three type of vulnerabilities assessment

    $104 (Avg Bid)
    $104 Avg Bid
    23 bids