Bluekeep metasploit trabalhos

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    226 bluekeep metasploit trabalhos encontrados, preços em USD

    ...implement and test your proposed techniques. With this environment you should then be able to demonstrate the detection of an exploitation of the vulnerability and the mitigation of the vulnerability. The test environment should be saved as one or more Virtual Box VM image(s) that are self-contained and need to be submitted. To execute the vulnerability, you can use any existing code including Metasploit. However, the solutions for detection and mitigation must be your own. In general, your setup must include a vulnerable system that can be exploited. In some cases where this is not practical as a vulnerable system cannot be obtained (e.g. the vulnerable software is no longer available) and only with permission of the unit coordinator, this requirement can be waived. 2. D...

    $73 (Avg Bid)
    $73 Média
    2 ofertas

    ...governance, risk analysis, compliance, and business continuity planning. Familiarity with Linux and Windows server configuration, Active Directory, network architecture, operations, and security. Experience in areas such as Wireshark, email security, wireless security, cryptography, port scanning, cloud security, and virtualization. Proficiency with tools like Splunk, Burp Suite, Metasploit, Zenmap, etc. Certification experience in Security+ and CEH. Additional Assets: Knowledge and experience with Google Cloud Platform. Responsibilities: Setting realistic schedules, deadlines, and engagement plans. Conducting check-in meetings, tracking progress, and facilitating topic-specific discussions. Mentoring the student through cybersecu...

    $11 - $18 / hr
    Destacado Secreto
    $11 - $18 / hr
    9 ofertas

    ...Internal and external penetration tests against systems to identify vulnerabilities. • Collaborate with the application development teams and develop test cases, which can check the security of applications, databases and authentication mechanisms. • Experience using a wide variety of security tools to include Kali-Linux, Checkmarx CxSAST, CxIAST, Burp Suite Pro, Wireshark, Nmap, Nessus, Metasploit, and Nexpose. • Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications. • Automation of security scan...

    $25 / hr (Avg Bid)
    $25 / hr Média
    29 ofertas

    I require a proficient Vulnerability Assessment and Penetration Testing (VAPT) expert to join my team. Your task will involv...require a proficient Vulnerability Assessment and Penetration Testing (VAPT) expert to join my team. Your task will involve a comprehensive examination of all our systems. With no less than three years of hands-on experience, you will have; • Extensive knowledge in Network security, Web application security, and Mobile application security. • Demonstrated experience with Nessus, Burp Suite, and Metasploit tools. Your in-depth knowledge and skills in these areas will help my team in strengthening our system's reliability and resilience. If you have a keen eye for identifying system vulnerabilities and setting up strong security measures, I w...

    $100 (Avg Bid)
    $100 Média
    14 ofertas

    Access an Ubuntu virtual machine, it is necessary to have knowledge of LINUX and Metasploit

    $48 (Avg Bid)
    $48 Média
    10 ofertas

    ... Responsibilities: Perform a thorough scan using state-of-the-art pentest tools. Identify vulnerabilities and weaknesses in website security. Provide clear and actionable recommendations for risk mitigation. Prepare a detailed report of findings and suggested actions. Requirements: Proven experience in penetration testing. Knowledge of security tools such as Nmap, Metasploit, Burp Suite, Wireshark, among others. Ability to prepare clear and understandable technical reports. Deliverables: A detailed pentest report, including the methodology used, vulnerabilities found, test evidence, and security recommendations. An action plan for rectifying identified weaknesses. To apply, please send: A brief description of your experience in pene...

    $204 (Avg Bid)
    $204 Média
    27 ofertas

    ...infrastructure code, e.g. targeting the driver framework, UEFI/ROM, direct I/O, virtualization checks, etc. c) JavaScript/PDF vulnerability and corresponding exploit analysis Your skills: 1. Vulnerability and malware analysis skills for x86/JavaScript. 2. 0day exploits. 3. Static and dynamic code analysis and debugging tools like Metasploit, Burp Suite, angr, afl, BinaryAnalysisPlatform bap, KLEE, bindiff, BitBlaze, Ghidra-sre, x64dbg, IDA Pro, OllyDbg, AutoSploit, MetaSploit, Mimikatz, Kali Linux, snort, tcpdump, Wireshark, ClamAV, Malware analysis sandboxes like Cuckoo 4. Unpackers, PDF parsing, decompression & JS extraction. 5. Disassemblers, decompilers. 6. Analyzing sample exploits or their descriptions and extending them to provide all relevant details. 7. Analy...

    $1257 (Avg Bid)
    $1257 Média
    16 ofertas

    i need someone who can provide me some videos where i can learn how to use some kali linux tools like nmap, metasploit, osint and matelgo or nessus. the coder can record his screen to show me how to use them ... please only bid if you can provide some samples. thank you

    $23 (Avg Bid)
    $23 Média
    6 ofertas

    Good morning, I'm a student and I'm going to perform a penetration testing on Windows 10 32 bit on my Virtualbox using Eternalblue and Metasploit. But not working. I'm looking anybody able to perform this. Note. This not any illegal activity, we are in a virtualbox with virtual machine in my network.

    $28 (Avg Bid)
    $28 Média
    16 ofertas

    Hello, I've been learning penetration testing for a while and know the usual Kali Linux tools like nmap, nikto, metasploit etc. How can I conquer a hardened server that I only know is an nginx or apache but don't know its version number? I would like to learn that. You connect to my PC via Anydesk and explain it to me. Please write in your offer how much USD you require for 3 hours. I live in Germany and have time every day from 6 p.m. (German time). Here you can see my time zone:

    $173 (Avg Bid)
    $173 Média
    15 ofertas

    Hi, I am looking for an experienced pentester to teach me how to scan the vulnerabilities of a wordpress site and exploit the flaws in order to test myself my sites that I develop. Software like metasploit will be part of it or any other. I am open to discussion. Bonjour, je recherche un pentester expérimenté pour m'apprendre à scanner les vulnérabilités d'un site wordpress et exploiter les failles afin de tester moi-même mes sites que je développe. Des logiciels comme metasploit en feront partie ou tout autre. Je suis ouvert à la discussion.

    $51 / hr (Avg Bid)
    $51 / hr Média
    24 ofertas

    ...recommended remediation steps, in clear and concise reports. Stay up-to-date with the latest trends, techniques, and tools in Android device security and penetration testing to continuously enhance the testing methodologies and practices. Requirements: Strong experience in Android device penetration testing and security assessment. Proficiency in using penetration testing tools, such as Burp Suite, Metasploit, Frida, ADB, and custom scripts. Deep understanding of the Android operating system, architecture, and security mechanisms. Knowledge of common vulnerabilities and attack vectors specific to Android devices, such as insecure storage, privilege escalation, code injection, and insecure communication channels. Familiarity with mobile application security best practices and sec...

    $8670 (Avg Bid)
    $8670 Média
    6 ofertas
    Ethical Hacker Encerrado left

    Looking for an experienced ethical hacker to condu...security risks. The ideal candidate should have experience in web application security and penetration testing. The specific skills required include: - Knowledge of web application vulnerabilities such as SQL injection, cross-site scripting (XSS), and CSRF - Knowledge of web application security standards such as OWASP Top 10 - Experience with penetration testing tools such as Burp Suite, Nmap, and Metasploit - Ability to provide detailed reports on findings and recommendations for remediation The project will involve testing the web application for vulnerabilities and providing a detailed report on findings and recommendations for remediation. The candidate should be able to work independently and meet the tight timeframe for c...

    $36 / hr (Avg Bid)
    $36 / hr Média
    38 ofertas

    I am a cybersecurity professional looking for experienced and highly knowledgeable instructors to help refresh my knowledge in penetration testing for security operations. Specifically, I'm looking for one on one instructor-led training for an intermediate audience. The instructors must have expertise in topics such as setup and configuration, vulnerability exploit, and the fundamentals of penetration testing. Through the training program, I would like my team to gain the skills needed to identify threats, anticipate security needs, and devise covert methods for testing system and network security.

    $26 / hr (Avg Bid)
    $26 / hr Média
    20 ofertas
    Pen Test Website Encerrado left

    I am looking to have a professional perform a thorough Penetration Test on my website. The main focus of the testing should be on the publicly-facing services, and to include automated testing. To help keep the website secure. The successful candidate for ...secure. The successful candidate for this project should possess a wide range of knowledge and expertise in the area of webserver and web application security. They should also be able to work with white lists/blacklists, patching, user authentication and other security measures. They must have experience in utilizing automated software penetration testing tools, such as Nmap, Nessus, Nikto, Metasploit and Core Impact. Finally, an ability to interpret the results of the tests and provide detailed reports upon completion is non-n...

    $26 (Avg Bid)
    $26 Média
    27 ofertas

    ...and in-line traffic analysis. You will implement and document the steps given in this project. You should submit your final report containing a description of the tasks you have done and the results of the analysis generated by the security systems. You are also required to include snapshots for every step you have conducted. you must expert in these tools: Virtual Box, Kali, Wireshark, Nmap, Metasploit, netcat, Snort, Suricata, Zeek deadline 12/2/2023 ...

    $164 (Avg Bid)
    $164 Média
    18 ofertas

    ...that weaponize new proof-of-concepts for exploitation, evasion, and lateral movement – Communicate effectively with team members during an engagement – Ability to think unconventionally to develop adversarial TTPs – Keep current with TTPs and the latest offensive security techniques You should know your way around the common professional exploitation frameworks (e.g. Core Impact, Canvas, Metasploit) and have a strong working knowledge of exploitation outside the typical “click to exploit” type of testing. We are not asking if you can scan something and only attempt an exploit in msf/Core/Canvas. You should have full working knowledge of Kali Linux or similar testing distributions and most of the tools. Experience with penetration testing as ...

    $2768 / hr (Avg Bid)
    $2768 / hr Média
    20 ofertas

    We are looking for a full stack developer to update github code in GitHub : Project details will be discussed with the preferred bidder.

    $109 (Avg Bid)
    $109 Média
    41 ofertas

    ...source code named “” and file that explains how to run your program. 2. Reverse shell for Linux:- In the series of our labs, we learnt how to create a reverse shell for a Windows machine. (We used msfvenom to generate a backdoor and exploit it using Metasploit, creating a reverse shell.) It is harder to create a reverse shell for Linux, but it is not impossible. Your task is to refer to the following web article and create a reverse shell for Ubuntu (Linux) VM. trojan/ Once you are successful, take screenshots of the following events: 2 ...

    $50 (Avg Bid)
    $50 Média
    7 ofertas

    It is located inside the metasploit project a file . I want to modify it so that it deals with multi threads So that and some very simple modifications such as printing in a file . و أشياء صغيرة

    $190 (Avg Bid)
    $190 Média
    4 ofertas
    Metasploit tutoring Encerrado left

    I want to know how to use metasploit and file bind, using kali linux

    $628 (Avg Bid)
    $628 Média
    7 ofertas

    I need a script (either operating system script or a script using commands from some known tools such as nmap or metasploit) to use part of an academic project. -Given a web url, or a subnet IP, I want that script to identify the topology related to that url (like all the related IP's), firewall, router, etc. I am not sure at what level this is possible using known tools, but this is what I need.

    $191 (Avg Bid)
    $191 Média
    5 ofertas
    Blocking of Ports Encerrado left

    I am often on business trips. Unfortunately, I often forget to shut down my test PCs. I don't want them to be attacked in my absence. (company documents etc.) Is there a way to lock or block the open ports in my absence? Unfortunately, I often forget my access...often forget to shut down my test PCs. I don't want them to be attacked in my absence. (company documents etc.) Is there a way to lock or block the open ports in my absence? Unfortunately, I often forget my access data, so I can't access my network remotely. Tips like: "Write down your access data" are not effective. DOS or DDOS attacks are also pointless. If you know tricks with e.g. with Metasploit, Burp Suite, ZAP Proxy or others, then I look forward to your offer. It's about the tempo...

    $168 (Avg Bid)
    $168 Média
    13 ofertas

    Hi, I think it's simple and clear, i need to install Metasploit in ubuntu server ( dedicated server ). Regards,

    $22 (Avg Bid)
    $22 Média
    2 ofertas

    Hello freelancers, I am here posting a project regarding some help that I need in kali linux regarding metasploit all my backdoor exe files are currently getting detected by windows and I would like to know how to get them to be undetectable, this is for upcoming certifications thanks! I am looking for someone who has good and extensive experience in this field who can help me right away without wasting anytime please feel free to send me a message I answer right away! I am looking forward to speaking with you!!

    $255 (Avg Bid)
    $255 Média
    10 ofertas

    Guideline to setup using Amazon marketplace Opencanary and hand to metasploit to automate hacking back hackers Besides collecting hackers commands ,skills and strange packets and also hand over to another EC2 metasploit to automate hack back hackers. Also write a testing procedure to proof it works

    $74 (Avg Bid)
    $74 Média
    3 ofertas

    Hi, Need an expert cybersecurity persion well versed with : Metasploit Nmap etc . Who can do remote execution.

    $291 (Avg Bid)
    $291 Média
    2 ofertas
    Metasploit Project Encerrado left

    Finish a metasploitt project... deadline is 18th of November. i will share the documents in chat. only bid if you have experience in Metasploit.

    $15 (Avg Bid)
    $15 Média
    2 ofertas

    This project is for those with intermediate skills on using metasploit kali linux to create payload that will work on Windows. You should know the ins and outs of using kali linux and the technicalities to achieve this.

    $119 (Avg Bid)
    $119 Média
    5 ofertas

    I want someone who can complete a mini project. There will be five tasks 1. Buffer Overflow 2. Web AOacks 3. Password AOacks 4. Metasploit Framework

    $75 (Avg Bid)
    $75 Média
    7 ofertas

    ...móviles. | Excluyente. • Experiencia y/o conocimiento de metodologías OSSTMM, OWASP, NIST | Excluyente. • Conocimiento y experiencia en ethical hacking, explotación de vulnerabilidades, escalamiento de privilegios, ejecución de técnicas de movimiento lateral, obtención de la administración del dominio. • Capacidad para operar escáneres de vulnerabilidades y herramientas tales como Nessus, Qualys, Metasploit, Burp Suite, Kali, entre otras. • Conocimiento de redes y enrutamiento y de los principales sistemas operativos, especialmente Linux y Windows. • Certificaciones en CEH, OSCP, PenTest + o GPE (es un plus). • Conocimientos de lectura y escritura de shell scripts. • Dominio avanzado del id...

    $1010 (Avg Bid)
    $1010 Média
    2 ofertas

    Hi pavankv241, I noticed your profile and would like to offer you my project. We can discuss any details over chat. It's a metasploit project to access an android machine.

    $50 (Avg Bid)
    $50 Média
    1 ofertas

    ...penetration tests on our website and identify any breaches or weaknesses in the security setup. The tests you need to conduct include but not limited to- * nmap * nikto * uniscan * zenmap * WPScan * Metasploit and Exploit-DB Exploits [along with CVE Details vulnerability database] and Remote code Execution * google dorks (SQL vulnerability) * SQLMAP * Burpsuite (Directory Traversal Attack) * Burpsuite (Checkout page data tampering) * Hashcat (Password hash cracking) * John the Ripper (Brute force attack) * Fuxploider (Exploiting file upload vulnerability in server for force uploading malware) * Metasploit payload attacks and Pivoting * Google dorks (Exposed log files, vulnerable systems etc.) We need an expert ethical hacker who can conduct advanced penetration tests. De...

    $1958 (Avg Bid)
    $1958 Média
    15 ofertas

    i want step by step to use this modified metasploit in kali linux and what the requirment need in the meterpreter i test to do the command to get message from android by use this command dump_sms but in this metasploit there is new option that make dump_whatsapp ( message chat) because i need to take from my phone the db for whatsapp and i dont't know where the key for whatsapp chat store so i see the above the link the made from developer

    $100 (Avg Bid)
    $100 Média
    1 ofertas

    Hi Eduardo E., I noticed your profile and would like to offer you my project. We can discuss any details over chat. i want step by step to use this modified metasploit in kali linux and what the requirment need in the meterpreter i test to do the command to get message from android by use this command dump_sms but in this metasploit there is new option that make dump_whatsapp ( message chat)

    $100 (Avg Bid)
    $100 Média
    1 ofertas
    Project for Ali S. Encerrado left

    Hi alisiblini11, I noticed your profile and would like to offer you my project. We can discuss any details over chat. i want step by step to use this modified metasploit in kali linux and what the requirment need in the meterpreter i test to do the command to get message from android by use this command dump_sms but in this metasploit there is new option that make dump_whatsapp ( message chat)

    $100 (Avg Bid)
    $100 Média
    1 ofertas

    from teem viewer i need fix Metasploit RPC Server to interact with meterpreter sessions and generate payloads. kage tool with kali linux

    $16 / hr (Avg Bid)
    $16 / hr Média
    3 ofertas

    We have recently launched an Instant Messaging App named "Alaap - BTCL Calling App". The App link is We need a Penetration Tester for this App who can check and verify if this app is vulnerable to Payload Injection using tools like Metasploit/AhMyth or any other Advanced RAT generator. Upon testing, provide us with your findings.

    $20 / hr (Avg Bid)
    $20 / hr Média
    13 ofertas

    The server in the lab is Apache 2. Need assistance to fix my skills. 1. Configure the ethernet adapters in your machines 2. Use of different tools you’ve learned in the class such as but not limited to: ++Nmap ++Zenmap ++Nikto ++Wpscan ++Metasploit ++OWASP ++John the ripper ++Hydra 3. Conduct Footprinting. Use the appropriate tools to identify the Case Study machine. a. Scanning b. Reconnaissance 4. Conduct Enumeration 5. Conduct Web Vulnerability and Scanning 6. Exploit Vulnerabilities 7. Brute Force Credentials 8. Conduct Research I am ready to pay as per the time spend on the task.

    $12 (Avg Bid)
    $12 Média
    1 ofertas

    i need someone with experience in pen testing who is also very good at writing. more details in the chat box. 2 conditions: - must have used and understand Kali Linux or backtrack and Metasploit - must be good at writing

    $491 (Avg Bid)
    $491 Média
    17 ofertas

    ...security risks. * Familiar with common vulnerabilities and technical knowledge to address and mitigate vulnerabilities. * Technically hands-on and curious about inner workings of technologies. Candidate shall possess experience with AD, FW/IPS, SIEM, UEBA, AV/EDR, VMS and VAPT tools. * Familiarity with phishing, vulnerability assessment, apt, bug bounty, pen test, iam, pam, cyberark, sandbox, metasploit, kali, mimikatz, siem, edr, soc, waf is a plus * Strong analytical, conceptualisation and problem-solving skills. * Excellent communications and interpersonal skills for stakeholder engagement. This should include good writing and presentation skills. * Able to work independently and in teams. * Relevant qualifications in Cyber/Info Security or Computer Science/Engineering. * Cert...

    $35 / hr (Avg Bid)
    $35 / hr Média
    10 ofertas

    Hello, We need help to scan our Azure resources with Metasploit and generate a report, if any issues found resolve and then rescan until all issues are resolved. thanks

    $250 (Avg Bid)
    $250 Média
    2 ofertas
    Instructors Encerrado left

    ...Ethical Hacking, IT Security Auditor, Security Analyst, Security Consultant, Security Auditor, SOX, IT Auditor, Reverse Engineering, and much more. Information security analyst and ethical hacking trainer for an online class. The duties will be as follows - 1. Train our students from colleges, universities & corporate on the following topics - CEH 11, Ethical Hacking Penetration Testing using Metasploit C & Data Structure Python CCNA Candidate who can teach the following subjects, in addition to above subjects will be given preference. Otherwise, we can train willing candidates to learn the following topics - Computer Forensic, CHFI 9 Java, JSP Android App Development Cloud Security and penetration testing IoT Penetration Testing SOC analyst License Penetration Teste...

    $3 / hr (Avg Bid)
    $3 / hr Média
    4 ofertas

    In this next phase of our security tests, we are looking for 3 skilled hackers or experienced security professionals. Your assignment will be to find multiple ways to hack our php/mysql website using a combination of manual and automated black box attack techniques (including usage of 0-Day exploits and tools such as Metasploit), document how you discovered the exploits or vulnerabilities you found, and provide practical security safeguards to prevent these same kinds of real-world attacks. The goal of this challenge is to discover great talent to collaborate on our long-term projects. Bid up to a maximum of $100 for consideration, less to show flexibility.

    $124 (Avg Bid)
    $124 Média
    10 ofertas

    You need to create/develop a virtual environment such as Virtual Box. Use virtual machine images such as Kali VMware to create a Metasploit system and create another virtual machine as Metasploitable system (Linux environment). You need to setup a Metasploit system (a Kali installed System) and another system (such as Linux) that will act as Metasploitable and write a report about this. You will have 4 tasks to complete. TASK 1: Set up a virtual environment (Virutal box) and create one instance of Metasploit (Kali) and one instance of Metasploitable. TASK 2: You have managed to use appropriate tools (airmon-ng, airodump-ng, aircrack-ng or any other tools) to scan WiFi network and managed to crack WiFi password. (You can demonstrate with any known password) B. ...

    $274 (Avg Bid)
    $274 Média
    11 ofertas

    I created a payload for android but I need it to be automatically download and install and open automatic on victims device. I need some help with this, I already have the payload.

    $75 (Avg Bid)
    $75 Média
    2 ofertas

    This small project needs a developer that can convert a small & relatively simple Open Source Tool from GO to Ruby/Metasploit.

    $258 (Avg Bid)
    $258 Média
    1 ofertas

    Need help with the Professional Android Mobile hacking without accessing it using Metasploit(Kali Linux), official ethical hacking project. Need Training with Technologies, Tools used. This is only for learning purposes and to experiment for ethical purposes.

    $13 / hr (Avg Bid)
    $13 / hr Média
    8 ofertas

    ...work on the project! I had to include my request in a separate text file, because it was too long for the field provided by the "" platform. I also included the script through which the exploiting currently takes place, in the module already configured in Metasploit, and working, and the external module to check the presence of the vulnerability (Remote Command Execution checker). (Archive named "RCE Checker- External "). Note: The module "" (Attachment) contained in Metasploit already contains a vulnerability checker. If you prefer, you could just rely on that, ignoring the external module. (External module: convenient, but optional). Once you have read all my requests carefully, please contact me to give me your opinion, or ask me for clari...

    $704 (Avg Bid)
    $704 Média
    8 ofertas

    ...work on the project! I had to include my request in a separate text file, because it was too long for the field provided by the "" platform. I also included the script through which the exploiting currently takes place, in the module already configured in Metasploit, and working, and the external module to check the presence of the vulnerability (Remote Command Execution checker). (Archive named "RCE Checker- External "). Note: The module "" (Attachment) contained in Metasploit already contains a vulnerability checker. If you prefer, you could just rely on that, ignoring the external module. (External module: convenient, but optional). Once you have read all my requests carefully, please contact me to give me your opinion, or ask me for clari...

    $525 (Avg Bid)
    $525 Média
    1 ofertas