...page to its original state - as obtained from the original JSON object. Handling of CORS is necessary. All code should be written to current web security standards. (no XSS, no SQL Injection, or any other major known vulnerability). All code should use dependencies that are not known to be vulnerable (no known CVEs et al). This is a work for hire
HI , i am building an app and i want to evaluate the security of the features based on...A V Comparatives report of how vulnerable my app will be in comparison to other known security phone apps i need to evaluate the score based on criteria of phone device vulnerability such as microphone access permission can be used for attack on phone for instance
...page with http status code: 0 Alternate link check: Alternate link point on page with http status code: 0 Alternate link check: Alternate link point on page with http status code: 301 Alternate link check: Alternate link point on page with http status code: 0 Alternate link check: Alternate link point on page with http status code: 301 Speed: Google
...spectrum of people, process and technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Audit, Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Expert Witness Services Industrial Control Systems
Required: .Net, SQL, C#, Web Security, SQL Injection, XSS etc, Proficiency in English in an academic level. Two basic websites need to be tested and compared in terms of security vulnerabilities. And a short report required for findings. . Project: Source files and DB .bak file and testing guidance document will be provided (needed: Visual Studio
...the full spectrum of people, process and technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Industrial Control Systems Security Incident Response
...recipients who share the folder. *Script must remain secure. Basically a script or tool inside Google apps (GSuite) that does not expose it to any outside third party vulnerability, of course, but does the following: Allows us to enable/disable Google Drive folder/file change notifications. So if a file is created, added or changed in a particular
...or upload a Word/PDF/etc and send it to the third party system via API. PHP or other code must be built using bank-grade methodologies and pass Acunetix or similar vulnerability scan. This includes designing the main website, the user interface as well as the backend code. Basically, everything to make this a fully operational business. Programmer
...implementation of security concepts in the MS environment o Experience in the connection to HP SM and SIEM o Experience in the area of security of standard technologies and vulnerability elimination on web servers o Knowledge in MS Hyper-V/VM-Ware architecture/application, as well as Domain Controller, Exchange and Citrix o Conception and operation of
...Mainframe SRG and/or STIGs as updates are released, and report changes with the potential to have significant impact. • Analyze DoD and DISA directives and orders, and provide vulnerability reports • Review and validate the installation and configuration of cyber tools on UNISYS assets and report deficiencies. • Participate in A&A process activities, including
we need a website content will cover the below: IT Support: Business, Home Website desig...content will cover the below: IT Support: Business, Home Website design Cloud solution: Office 365, Microsoft Azure and Amazone aws Security: Penetration test, Forensic, Vulnerability assessment ERP solution: Accounting, invoicing, Purchase, Inventory, HR, POS
Hi We are looking for a long term contract (renewed annually based on quality of service) for 4 times an year VAPT penetration testing i..e. report every 3 months for our web application. Below are the quick details: - 12-15 dynamic pages - Web based custom developed application (Ngnix, Phython, MySql, Linux) • Single installation on a server if hosted on Cloud (It is 3 tier architecture We...
Hi Mudassar, good day!. I need your help for a project, it consists of a new Vulnerability Assessment of my website [login to view URL], which I changed its hosting provider. In addition to this I need a security analysis for 3 landing pages that are in the same hosting, one of them is built in Wordpress, but the other two are built in html (AMP) The landing
I want one windows application which is able to scan URL and find vulnerabilities and generate report after penetration te...for black box security audit which will be able to categorized vulnerabilities from OWASP top 10, also it will able to update its vulnerability database from OWASP, For reference, you can check Acuntix web vulnerability scanner.
...these versions should be compared to the CVE database to see if there are any Critical or vulnerabilities with the version Output of this should be, if there is a Critical vulnerability, to the PCI-notification slack channel (channel needs to be created) Each month a new Jira ticket is automatically created with this task. I would like this task to be able
We are a s...and we are looking for a technical writer to provide content for the corporate documentation, mainly: - Description and Methodology of the services ( Penetration tests, vulnerability assessments, Wireless and Mobile app Assessment, etc) - Proposal documents and SOW. - Content for the corporate brochure . Knowledge of IT security services
...nosql, app engine), Google Earth Engine, Google Map, - Paypal for payments of storage hosting, capacity upgrades, renewals subscription - OWASP top 10 web application vulnerability scanning e.g. github - JSON for multi language website (initially just English and Spanish) - Developer is overall responsible for configuring Google Cloud Platform to
Hi Risky Pathak, I am Andrew. We worked together years ago with a C+ project ... I need a to combine a number of scripts i have to work together. This project is for me and my friends to have a private website that will have a number of IP tools, vulnerability Testing tools and more. Are you interested? IF SO_ lets talk a price. Thanks in advance.
You need to remove malware and give all possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress/woocommerce site so likely to be vulnerable. This is for a site in testing stage. You will secure the whole website and prepare
More detail i will share one to one.
I already have a on page php code which is vulnerable and only uploads 1 image. I need 1) for it to upload up to three images 2) max files size limit and err message 3) file type limit and err message 4) reCAPTCHA integration and verification of any other basic vulnerability
...objective and assist me to start the project. You must help me write about the follow vul 1. CRITICAL 10.0 77823 Bash Remote Code Execution (Shellshock) 2. CRITICAL 10.0 78385 Bash Incomplete Fix Remote Code Execution Vulnerability (Shellshock) 3. MEDIUM 4.3 90317 SSH Weak Algorithms Supported 4. HIGH 7.8 82101 Debian DLA-118-1 : linux-2.6 security update
I have a vulnable prolog file that has structures. Create at least five queries from the feature lists and make sure the tables & sample data match...have a vulnable prolog file that has structures. Create at least five queries from the feature lists and make sure the tables & sample data match what the existing Prolog vulnerability database contains.
...issues coming to it while uploading it to playstore ... Read below issues or may be few more are there, you need to resolve them all. 1. Hostname verifier. 2. Security Vulnerability Issues. Check for other issues & send us back the working codes. 5 star guaranteed & we want you to get this done by tomorrow 1pm MAX... BID only when you can do it on
...com/article/thousands-of-wordpress-sites-backdoored-with-malicious-code/ There's a wordpress, a magento, and a vbulletin site on this host. I just restored from a backup, and was hacked again. I restored from yet another backup, and want someone to go through and let me know if there is any vulnerability and fix it before it is hacked again. Thank you!
Vulnerability Assessment tool: Nessus Operating System: Debian 6(Squeeze) Scope of the Paper (Why you need to do this scan?)explain A world global leading energy sector...(Please help to write with your experience and creativity, base on vulnerability assessing the client) Summary of Finding We will be performing three type of vulnerabilities assessment
I am looking for an individual that can support technical aspects of a planned Network Security audit. Required competencies are k...technical aspects of a planned Network Security audit. Required competencies are knowledge of Network architecture and Virtual environments, as well as hands-on use of vulnerability scanning tools like Nessus and Qualys.
You need to remove malware and give all possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress site so likely to be [login to view URL] will give all possible support you can in terms of making the site safe from future attacks.
I have a wordpress website which is infected. You have to do following tasks: Remove ...a wordpress website which is infected. You have to do following tasks: Remove Malware from website Server Harding Using Malware Scan Logging and Monitoring Vulnerability Assessment Vulnerability Scanner You should have significant previous experience in this area.
*NOTE* THE ACTUAL REWARD I...ACTUAL REWARD IS HIGHER, WE ARE PAYING $500+ BUT FREELANCER IS HAVING ISSUES *NOTE* Hello! We are looking for people to find XSS / SQL vulnerabilities across our website. Our website is : [login to view URL] If the XSS allows for cookie theft, or you are able to SQL in game items the reward given will be higher.
The company is a IT/Cyber Security services company that provides solutions/consultings in Vulnerability assessment, IT infrastructure Security , Penetration Testing etc I have rough idea for the logo in my mind and I'm uploading a rough sketch of it
...server, due to the high vulnerability it has. Its running under: PHP Version 5.3.9 Windows NT HWC-HWP-3509510 6.2 build 9200 (Unknow Windows version Standard Edition) i586 Database Version 5.5.60-log Database Collation utf8_general_ci PHP Version 5.3.9 Web Server Apache/2.4.34 (Win64) mod_fcgid/2.3.9 WebServer to PHP Interface cgi-fcgi Joomla
Develop algorithms for interactive digital maps including key hydrogeological and groundwater quality data as well as the groundwater potential and groundwater vulnerability map. Digital maps should be able to zoom to a scale of 1:25,000 or a better scale as proposed in liaison with the client.
I have a blog site active since November 2017. I have issues regarding hosting and current theme. It lacks SSL certification. Need a professional pop up subscription form. User profile creation over the website.
I need a website security specialist to help me fix my website vulnerabilities. me website keeps getting uploaded with malware and I need to first understand how the hackers are able to upload and put malware into my site and additionally how I can defend against this. maybe there are vulnerabilities in some plugins or permissions are set incorrectly
I want to fix the Clickjacking and Missing Security headers on the website. Strict-Transport-Security Content-Security-Policy X-Frame-Options X-XSS-Protection Referrer-Policy Feature-Policy I need it to be fixed ASAP. Let me know if you have any questions. Thank you Rahul
...& a few minor fixes, details are below. - Add a small unobtrusive cookie warning popup along the bottom of the screen. - Fix the FAQ page (slight CSS/formatting error) - Optimise site ([login to view URL] shows some problems, fix these). - "Features" in footer should be "Overview" and link to the same place as "Overview" on the nav bar. - Overv...
...net/kb/issues/00200300_cross-site-scripting-reflected [login to view URL] combine this 3 types of cross-site scripting vulnerability and write one [login to view URL]: 1000-2000 3)Broken Authentication and Session Management [login to view URL] length 500-800
...the most important requirement and therefore experience in Infusionsoft and iFrames is very beneficial. Here is an example: [login to view URL] - Remove vulnerability by not allowing access to listing of files on website (We have 3 brochures which are currently available on the website. At the moment anyone can view and download them