Security audit your website or web application
$50
Delivery in
1 day
Rating
97%
(15 reviews)
(15 reviews)
Amount of days required to complete work for this Offer as set by the freelancer.
Rating of the Offer as calculated from other buyers' reviews.
Average time for the freelancer to first reply on the workstream after purchase or contact on this Offer.
Explore the marketplace!
What you get with this Offer
I am an experienced cyber-security and ethical hacker / penetration testing practitioner with a CEH qualification and have worked confidentially with a range of businesses, NGOs and individuals on a number of continents.
Broadly I will conduct the following stages with you and/or your business.
1. Introduction, Scoping, Non-Disclosure Agreements, Ethics and Legal Issues
2. Footprinting
3. Scanning
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Sniffers
8. Denial of Service
9. Social Engineering
10. Session Hijacking
11. Hacking Web Servers
12. Web Application Vulnerabilities
13. Web Based Password Cracking Techniques
14. SQL Injection
15. Hacking Wireless Networks
16. Virus and Worms
17. Hacking Novell
18. Hacking Linux
19. IDS, Firewalls, and Honeypots
20. Buffer Overflows
21. Cryptography
Using tools such as:
BackTrack and Kali Linux, NMAP, Nessus, Nexpose, ireshark, Snort, Metasploit, John the Ripper, Cain & Abel, OSSTMM, Sleuth Kit, DFF, etc.
Broadly I will conduct the following stages with you and/or your business.
1. Introduction, Scoping, Non-Disclosure Agreements, Ethics and Legal Issues
2. Footprinting
3. Scanning
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Sniffers
8. Denial of Service
9. Social Engineering
10. Session Hijacking
11. Hacking Web Servers
12. Web Application Vulnerabilities
13. Web Based Password Cracking Techniques
14. SQL Injection
15. Hacking Wireless Networks
16. Virus and Worms
17. Hacking Novell
18. Hacking Linux
19. IDS, Firewalls, and Honeypots
20. Buffer Overflows
21. Cryptography
Using tools such as:
BackTrack and Kali Linux, NMAP, Nessus, Nexpose, ireshark, Snort, Metasploit, John the Ripper, Cain & Abel, OSSTMM, Sleuth Kit, DFF, etc.
What the Freelancer needs to start the work
Site URL, Cpanel, FTP login
Reviews (15)
-
-
-
-
-
ADAM C.
London, United KingdomAhsan was really useful and carried out the task as specified - the report clearly highlighted areas of issue as well as his advice as how to remedy the areas of concern. He also has the skills to implement the code corrections in order to pass the areas of problem.
Ahsan A.
Thank you so much
9766296893967419648760455
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies