hello everyone, I am trying to build red operations of 4 machines (vulnerable) our goal to reach is collect all the flags. breaking the all will require - OSINT - Local privilege escalation - Persistence techniques - enumeration & exploitation (windows , Linux) - lateral movement techniques - basic Exploit development - pivoting - Creative thinking our attacks will be - DDOS - ...
venta telefonica, empresa servicios informaticos para vender: • Servicio de monitoria/customer service ,para pymes • assessment tecnicos • pentest • etc 1. se requiere uso de email para ventas, 2. llamadas a diario a empresas para ofrecer el servicio (nosotros proveemos el servicio telefonico) 3. uso de linkedin de la empresa para contactar
Project will be developed with .Net and MVC using C# and SQL Server db. Admin panel will be password protected with different users which set role e...informations, company news, announcements, picture gallery, portfolio page, etc. theme is build on onepage structure. And the backend code must be written securely. they will make pentest on the site.
Hi! I need somebody with good and clear English to deliver online Ethical Hack/Pen test sessions for my team. This could be a long term ...some of my team members, but also participate into projects if needed. Some of the subjects I will be looking for are: Website security/security test, cloud infra security/pentest, wifi pen test, lab builidng, etc.
we need a security expert to pen-test and check the hardness and vulnerability of our websites security, database security, and over all security of some linux and windows hosted sites this will be a long-term project, we invite you to see our profile reviews BEST LUCK
The project consists of a full ethical hacking of a web application (website): owasp top10, vuln assessment, pentesting,.. Execute the test (automated and manual) Write a report Describe the finding Describe the way to correct the vulnerabilities Give advise, tips to improve and avoid the programming mistakes for the future. This project includes the signature of a NDA and to following o...
...dormant since 2012. Here's what I want you to do. 1. Setup, run, scan, enumerate, and create a report on the vulnerabilities on the system. There's definitely need to actually pentest it, You will get extra marks and you'll gain some very good experience. 2. Advise me what we need to do to secure the distribution. What needs to be updated, what needs to
...looking for company who can perform fast pentest of web-based mobile application developed for our internal needs. Some information about application: Full project developed in the core PHP, jQuery, css and HTML. For the database related operations is used mysqli functions The key for us is that pentest is perform very quickly, and we shall have
I need a monthly mission to manage 3 servers and perform the following funct...Give an opinion on the server architecture and documentation of the existing and how to improve it - Ability to urgently report / correct phising - Configuring gitlab - Pentest - Restriction by IP access to dev servers, preprod - Install a PLC monitoring tool (s), ..
We are looking for a pentest (pentest web application) owasp specialist for specific short missions of few days. It must be executed from a belgian office so only people who are living in Belgium or abroad (and come to belgium for execution of the work) are allowed to make a bit. Please describe your experience, only senior are needed (no junior/beginners)