Vulnerability assessment Jobs

6 were found based on your criteria

  • Hourly – 1 to 3 months – 10-30 hrs/week – Posted
    Looking for Vulnerability Engineer to access one of our test servers to access database before we put system on network. - CEH certified - Understands NBNS "Net Bios Name Server exploit - Ability to provide reports after extraction of database - Assess information to prepare to solve problem - Provide Identification - TLSv1.2 exploit - password generator knowledge - Perl scripting knowledge to generate against passwd file - collect crackable hashes on network. **Must provide Full analysis on Servers before receiving payment Negotiate Percentage for Task / Contract Required ...
  • Hourly – More than 6 months – 10-30 hrs/week – Posted
    We're a cryptocurrencies exchange in Asia. It is running on a independently leased CentOS server. It was attacked by webshell (jpeg upload converted to php). The final usage of the webshell is as follows: 178.32.181.106 - - [25/Mar/2014:05:33:54 +0800] "POST /images/theme/en/images/z79.php?&cd=/var/www/html/www796com/www/Controllers/& HTTP/1.1" "200" 15570 "https://220.128.56.86/images/theme/en/images/z79.php?&cd=/var/www/html/www796com/www/Controllers/&cd=/usr/local/webserver/nginx/logs/" "Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20100101 Firefox/17.0" "-" "7.11" 0.358 15890 1413 The jpeg file uploaded before turning into php is as follows: https://www ...
  • Hourly – More than 6 months – 10-30 hrs/week – Posted
    We're a cryptocurrencies exchange in Asia. It is running on a independently leased CentOS server. It was attacked by webshell (jpeg upload converted to php). The final usage of the webshell is as follows: 178.32.181.106 - - [25/Mar/2014:05:33:54 +0800] "POST /images/theme/en/images/z79.php?&cd=/var/www/html/www796com/www/Controllers/& HTTP/1.1" "200" 15570 "https://220.128.56.86/images/theme/en/images/z79.php?&cd=/var/www/html/www796com/www/Controllers/&cd=/usr/local/webserver/nginx/logs/" "Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20100101 Firefox/17.0" "-" "7.11" 0.358 15890 1413 The jpeg file uploaded before turning into php is as follows: https://www ...
  • Fixed-Price – Est. Budget: $10.00 Posted
    I am in need of an ethical hacker to hack 15 of my website databases for membership emails vulnerability. This is ongoing. We will start with 2 sites. You show me proof that you know what you are doing. You will be hired for the other 13 and the other sites that we will are working on at at a rate of 30/hr. But once again, you must prove to me that you can do the job. Job MUST ...
  • Fixed-Price – Est. Budget: $100.00 Posted
    Hey, We have a Joomla site that has been hacked by our previous developer. The hacked site is a contest site where users can enter entries to the contests. The developer is able to add 10,000 tickets, 50,000 tickets and as many as he wants some how. There is some backdoor he is getting through and doing this. Maybe a script in our code? Maybe some remote SQL connection? We've already deleted all FTP accounts, changed all ...
loading