Penetration testing work
- or -
Post a project like this1677
£140(approx. $176)
- Posted:
- Proposals: 6
- Remote
- #2527841
- Awarded
Freelance Information & Network Security Consultant, Trainer | Penetration Testing | Malware Remove | Website Security
Abu Dhabi
Wordpress Developer *Full Stack Web Developer * Shopify Developer*PHP* REACT JS
Islamabad
The Digital Exposure - A full fledged Web Development company providing wide range of services in Logo Design, Web Development, Mobile App Development, Digital Marketing
Kolkata
308971013918331537355241923728381793092877
Description
Experience Level: Entry
Estimated project duration: 1 - 2 weeks
Requirement is to build three Virtual Machines (VM): 1. A Server :E.g. you could use CentOS or Ubuntu Server o Minimum configuration required ▪ Two services of your own choice (e.g. DNS, HTTP, DHCP, FTP, SMTP, etc) 2. A Client :Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc) o You could create multiple copies of the client’s VM if you require more clients to demonstrate an attack 3. Attacker machine ( Kali Linux)
Provide a summary of the configuration steps on the server and client. Include screenshots to evident functionality at the client-side. Explain the rationale behind service selection and configuration. • Demonstrate a minimum of 2 attacks against each of the two services configured.Log all the important and offensive events against your target including attacks detected, services’ logs nature, origin of the attack and damage caused. Support your demonstration with screenshots. Critically reflect on countermeasures and prevention mechanisms applied to mitigate against your attacks.
Provide a summary of the configuration steps on the server and client. Include screenshots to evident functionality at the client-side. Explain the rationale behind service selection and configuration. • Demonstrate a minimum of 2 attacks against each of the two services configured.Log all the important and offensive events against your target including attacks detected, services’ logs nature, origin of the attack and damage caused. Support your demonstration with screenshots. Critically reflect on countermeasures and prevention mechanisms applied to mitigate against your attacks.
Patrick O.
100% (8)Projects Completed
8
Freelancers worked with
6
Projects awarded
38%
Last project
29 Jan 2021
United Kingdom
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
There are no clarification messages.
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies