Build an Information Gathering Pen Testing Website

  • Posted:
  • Proposals: 10
  • Remote
  • #1890202
  • Expired
Dileep C.Anshika D.Live Deftsoft Informatics P.Chris T.Priti U. + 5 others have already sent a proposal.
  • 9


Experience Level: Intermediate
Most of the details are still open for discussion. I'd like to help build a website used for pen testing.
The basics are:
¯ Starting out cheap and continuing to grow and improve.
¯ Allow me to participate in the creation and functions

The type of website being created for penetration testing with a type of cross between a product review allowing the customer to provide a review and it the manufacturer wants to reply and after a number of postings it will automatically be named and moved to a blog located within the site

○ Data feeds - I'm looking to automatically pull import information from 3-5 different websites the site can be a prebuild template site.

○ Bypassing paywalls may be needed

○ This site must be able to function completely security a type of animosity and privacy without having to run under the onion router but close.

○ Depending on how hard it would be will like to access the deep web

Secretly install hidden types of the following for data gathering only
1. Spyware "Mic,Cam,Location"
2. Trojan
3. Rootkit
4. Keyloggers
5. Bot
6. Backdoors
7. Rogue security software

Install to any most devices that connect to the internet such as
1. Smartphone
2. Wi-Fi
3. Routers
4. Modems
5. Computers
6. Servers

With that being said. What is a recommended starting point?

New Proposal

Create an account now and send a proposal now to get this job.

Sign up

Clarification Board Ask a Question

  • Tahir J.

    Well, this is generally a new idea. I have never seen any website or any software that can actually perform all of these tasks. As you have mentioned above tasks, can be attacked using some sort of active pentesting or with social engineering skills to send a file or something. There are framework available who can perform pentesting/audit of any servers etc. But they only do public available exploits and without bypassing firewalls etc. We as hackers need to bypass it manually by setting the logic etc. And those scripts or frameworks are not able to exploit. So I don't think that automate service can be developed in order to exploit everything.