Freelancer logo
How It Works
Browse Jobs
Log In
Sign Up
Post a Project
EXPLORE
Computer Security
Internet Security
Linux
PHP
Web Security
4.8
(41 reviews)
You're now following .
Error following user.
Your membership plan only allows 0 follows. Upgrade
here.
Successfully unfollowed user.
Error unfollowing user.
You have successfully recommended
Error recommending user.
Email successfully verified.
User Avatar
$50 USD / hour
Flag of BDFlag of BD
banani,
bangladesh
$50 USD / hour
It's currently 8:53 pm here
Joined March 28, 2017
0 Recommendations

Md Shofiur R.

@srmukul2

monthly-level-two.svg
4.8
(41 reviews)
4.8
(41 reviews)
6.6
6.6
$50 USD / hour
Flag of BDFlag of BD
banani,
bangladesh
$50 USD / hour
96%
Jobs Completed
58%
On Budget
91%
On Time
18%
Repeat Hire Rate

Certified Ethical Hacker and Pen Tester

✔️Certified at Windows Security & Forensics ✔️Certified at Ethical Hacking ✔️Certified at WEB APP SECURITY FUNDAMENTALS ✔️Certified at Website Hacking / Penetration Testing Main Skills: Penetration Testing, Web Application Security. Social Engineering, Red team assessment, Ethical Hacking & Countermeasures, Vulnerability Assessment, Malware Analysis and server Security Hardening. My core competency lies in performing black and gray box testing, on the live web applications/networks or in lab environments.I am familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of my work is confidential I can share vulnerability assessment sample. I have experience in vulnerability assessment for PCI & HIPAA Compliance.
Freelancer
Web Security Experts
Bangladesh

Contact Md Shofiur R. about your job

Log in to discuss any details over chat.

Portfolio Items

The table below provides the mapping of the each identified vulnerability with respect to their severity and the number of instances occurred after first, second, third, and fourth rounds of assessment.
Website penetration testing
Fundamentals about the framework
Framework organization
How to install it
How to contribute

Usage
Msfconsole
Msfcli
Msfvenom
Resource Files

Scanning
Port scanning
Vulnerability scanning

Exploitation
Network based exploit
Client side exploit
Browser Autopwn
Local exploits

Post Exploitation
Meterpreter
Meterpreter scripts
Post exploitation modules
Pivoting
Privilege Escalation
Information Gathering
Avoiding Detection

Writing Metasploit Modules
Writing an exploit module
Writing an auxiliary module
Writing a post exploitation module
Meterpreter scripting
Railgun

 

Are you hoping to become a penetration tester? This course could take you one more step down your career path toward your goal. Sign up for Cybrary’s Career Path program today! 

 

What is Metasploit?
Metasploit Framework, created by the Metasploit Project, is the mot popular exploitation tool available for developing, testing, and performing exploits. It allows penetration testers, auditors, and vulnerability assessment
Metasploit Certification
Course Outline:

HTTP and HTTPS basics – these protocols are the foundation of communication for web apps and understanding the various requests, responses, and status codes are fundamental to the course. We also examine packet structure and how packets can be manipulated by attackers.
Why sites get hacked – sites get hack for a number of reasons. The main ones are because websites provide a large attack surface and the technologies that run on them are subject to common vulnerabilities such as SQLI, XSS, LFI, and RFI. These attack vectors are discussed in greater detail later in the course.
Hacker methodology – the steps followed by an attacker which consist of footprinting, scanning, enumeration, gaining access, maintaining access, and covering one’s tracks. A host of essential tools are presented throughout the course that should be in every pentester’s toolbox. Manual and automated approaches are presented for each type of process.
SQLI – structured query language injection is a co
Web Application Penetration Testing Certification
What is a web app?
A web app is a client-server software application in which the client (or user interface) runs in a web browser. Common web applications include webmail, online retail sales, online auctions, wikis, instant messaging services, and many other functions.

What will I learn?
Vega web vulnerability scanner.
BurpSuite web vulnerability scanner.
SQLMap automatic SQL injection and database enumeration tool.
Arachni web app attack and audit framework.
W3AF network fuzzer.
Nikto open- source web server scanner.
SearchSploit database exploit tool.
NMAP network discovery and mapping tool.
Web App Security Fundamentals Certification
This is a Penetration testing  result sample
PenTest Result

Reviews

Changes saved
Showing 1 - 5 out of 41 reviews
Filter reviews by: 5.0
$100.00 USD
Provided good, timely work.
PHP
Web Security
WordPress
MySQL
HTML
N
Flag of US Jorge Z. @NW122112
5 days ago
4.8
$250.00 USD
delivered as expected
User Avatar
Flag of PH Jerome D. @ajdel645
14 days ago
5.0
$305.00 USD
nice work, thank you!
Azure
Internet Security
Penetration Testing
Hardware Security Module
R
Flag of US Neeraj G. @radialInc
2 months ago
5.0
$1,100.00 USD
Very thorough and very professional work. managed to both diagnose AND fix many security vulnerabilities. will definitely be hiring again in the future.
PHP
Web Security
Node.js
Redis
Security
User Avatar
Flag of US William G. @hooleysolutions
2 months ago
5.0
$250.00 USD
working on the next phase...
Azure
Internet Security
Penetration Testing
Hardware Security Module
R
Flag of US Neeraj G. @radialInc
2 months ago

Experience

Security Engineers And Pentester

Assessment Systems
Mar 2010 - Aug 2018 (8 years, 5 months)
Main Skills: Penetration Testing, Web Application Security. Social Engineering, Red team assessment, Ethical Hacking & Countermeasures, Malware Analysis My core competency lies in performing black and gray box testing, on the live web applications/networks or in lab environments.

Education

Bachelor of Science in Information Technology

University of Information Technology and Sciences, Bangladesh 2006 - 2010
(4 years)

Qualifications

Ethical Hacking

Udemy, Inc.
2017
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab.

Website Hacking / Penetration Testing

Udemy, Inc.
2018
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine.

Contact Md Shofiur R. about your job

Log in to discuss any details over chat.

Verifications

Preferred Freelancer
Identity Verified
Payment Verified
Phone Verified
Email Verified
Facebook Connected

Certifications

preferredfreelancer-1.png Preferred Freelancer Program SLA 1 100% comp_sec.png Computer Security 1 87%

Top Skills

Web Security
24
Internet Security
18
Computer Security
14
PHP
12
Linux
8

Browse Similar Freelancers

Web Security Experts in Bangladesh
Web Security Experts
Internet Security Experts
Computer Security Consultants

Browse Similar Showcases

Web Security
Internet Security
Computer Security
PHP
Previous User
Next User
Invite sent successfully!
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 141 959 042)
Copyright © 2020 Freelancer Technology Pty Limited (ACN 141 959 042)
There is no internet connection