Freelancer logo
How It Works
Browse Jobs
Log In
Sign Up
Post a Project
EXPLORE
Certified Information Systems Security Professional (CISSP)
Computer Security
Internet Security
Network Security
Penetration Testing
You're now following .
Error following user.
Your membership plan only allows 0 follows. Upgrade
here.
Successfully unfollowed user.
Error unfollowing user.
You have successfully recommended
Error recommending user.
Email successfully verified.
User Avatar
$40 USD / hour
Flag of BDFlag of BD
kishoreganj,
bangladesh
$40 USD / hour
It's currently 9:14 AM here
Joined April 22, 2012
1 Recommendation

Delwar A.

@delwaralam

annual-level-three.svg
5.0
(2 reviews)
5.0
(2 reviews)
3.6
3.6
$40 USD / hour
Flag of BDFlag of BD
kishoreganj,
bangladesh
$40 USD / hour
100%
Jobs Completed
100%
On Budget
100%
On Time
N/A
Repeat Hire Rate

Cyber Security and Penetration Testing Expert

I am Cyber and information security expert. I invest my time and skills to help people protect their business from Cybercriminals. Specialties/ 10-years experience: Information Security and Assurance, Vulnerability Assessment, Cyber Security, Penetration Testing, IT security, Cyber Security Consultant, API Security, Mobile Application Security, Source Code Audit, Web Server Pen-testing. I started my journey in the information security domain in 2010. I have a team to collaborate with on different Cyber Security projects.
Freelancer
Computer Security Consultants
Bangladesh

Contact Delwar A. about your job

Log in to discuss any details over chat.

Portfolio Items

Drupal CMS vulnerability find and all dir find and check all point..
Drupal CMS vulnerability and dir search
Drupal CMS vulnerability find and all dir find and check all point..
Drupal CMS vulnerability and dir search
Find OWASP 10 ten vulnerability and CMS vulnerability...
Sql injection, XSS, broken authentication bypass and cms
Find OWASP 10 ten vulnerability and CMS vulnerability...
Sql injection, XSS, broken authentication bypass and cms
Find OWASP 10 ten vulnerability and CMS vulnerability...
Sql injection, XSS, broken authentication bypass and cms
Find OWASP 10 ten vulnerability and CMS vulnerability...
Sql injection, XSS, broken authentication bypass and cms
Check your joomla CMS vulnerability
Joomla vulnerability scanner and report
Find your wordpress site vulnerability...
WordPress vulnerability scanner
Huge dictionary file, which of course can be changed to anything you want.
Progress tracking, if connection drops and the script has to stop for one reason or another, it'll give you the links that it could find and a progress parameter that you can provide the next time you run the program so you don't have to start from the beginning again.
User can specify the website page extension (.asp, .php etc) to narrow down the search options.
Results can be saved to a text file for future reference, and the user may choose to silence the script so that it doesn't show every link as it tests it.
Ability to pull robots.txt which sometimes might save you having to search the dictionary file as it often contains the link to the panel. The script attempts to parse robots.txt.
self changing user-agent that (a) keeps changing itself so that you don't end up getting blocked and (b) mimics a browser's user-agent to further minimize the chance that you get locked outside
Admin Panel finder using python script

Reviews

Changes saved
Showing 1 - 2 out of 2 reviews
Filter reviews by: 5.0
$225.00 USD
A++++. GREAT WORK! Thank you!
Computer Security
Hire me
Internet Security
Penetration Testing
Certified Information Systems Security Professional (CISSP)
Network Security
User Avatar
Flag of US William T. @illustra
2 months ago
5.0
$50.00 USD
Delwar is well experienced in penetration testing, identified issues very quickly . Delivered the project with in a day.I am happy that i met with a well experienced multitalented person like delwar. I recommended him. I would like to offer my further projects .
Computer Security
Hire me
Internet Security
Penetration Testing
Certified Information Systems Security Professional (CISSP)
Network Security
User Avatar
Flag of AE Shaik B. @mubarak112233
3 months ago

Experience

Cyber Security Specialist

BugsBD limited
Cyber Security research, Pentester

Education

BSc in software engineering

Daffodil International University, Bangladesh 2010 - 2014
(4 years)

Qualifications

Certified Ethical Hacker

EC-Council
2019
Certified Ethical Hacker is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems

Cyber Security

OWASP
2013

Publications

Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF

2016 Sixth International Conference on Digital Information and Communication Technology and its
In a sophisticated and coordinated cyber-attack $100 million has been stolen from Bangladesh's account. At­tackers introduced malicious code remotely into the Bangladesh Bank's server, which allowed them to process and authorize the transactions. Advanced attack techniques poses threats to all web application systems. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF)

A Study of the Effects of Heartbleed Vulnerability in Bangladesh

The Fourth International Conference on Computer Science
One of the most critical and talked about Open Secure Socket Layer (SSL) and Transport Layer Security (TLS) threats is Heartbleed vulnerability. This vulnerability affects the " Heartbeat protocol " of the open SSL library. HeartBleed manipulates the Heartbeat protocol to get access and read the memory of the vulnerable web servers. OpenSSL is used in HTTPS for internet security.

Study of the Dirty Copy On Write, A Linux Kernel Memory Allocation Vulnerability

EasyChair for CEEIT 2017
Dirty Copy On Write also known as Dirty COW is a Linux based server vulnerability. This vulnerability allows attackers to escalate the file system protection of Linux Kernel, get root privilege and thus compromise the whole system. Linux kernel version 2.6.22 and higher are affected by this vulnerability. The patch for this vulnerability has been released very recently.

Study of Race Condition: A Privilege Escalation Vulnerability

WMSCI 2017 Secretariat
The Race condition is a privilege vulnerability that manipulates the small window of time between appliance of a security control and use of services in a system. This vulnerability is a result of interferences caused by multiple threads running in the system and sharing the same resources. These processes might include trusted process such as operating system files and un-trusted processes.

Contact Delwar A. about your job

Log in to discuss any details over chat.

Verifications

Preferred Freelancer
Identity Verified
Payment Verified
Phone Verified
Email Verified
Facebook Connected

Certifications

preferredfreelancer-1.png Preferred Freelancer Program SLA 1 89%

Top Skills

Computer Security
4
Internet Security
4
Penetration Testing
4
Certified Information Systems Security Professional (CISSP)
3
Network Security
3

Browse Similar Freelancers

Computer Security Consultants in Bangladesh
Computer Security Consultants
Internet Security Experts
Penetration Testers

Browse Similar Showcases

Computer Security
Internet Security
Penetration Testing
Certified Information Systems Security Professional (CISSP)
Previous User
Next User
Invite sent successfully!
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 141 959 042)
Copyright © 2021 Freelancer Technology Pty Limited (ACN 141 959 042)
There is no internet connection