Encerrado

Penetration Testing / EXPLOITATION training program

THE FOLLOWING GIVE DETAILS OF WHAT IS EXPECTED TO COMPLETE THE EXPLOITATION TESTING PROGRAM. WILL GIVE A FULL BRIEF LATER ON..

You will need is to exploit the three target machines and provide a proof of enumeration/vulnerability assessment, scanning, exploit development, exploitation, and vulnerability fixes. You will also need to explain all steps . You will be provided with three OVF/OVA Virtual Machine files with instructions on how to import the files and start each Virtual Machine using VMware. You will also be provided with the Linux Virtual Machine to attack the targets.

Each target machine contains at least one proof file, which you must retrieve, and include with your documentation.

So to get started,,,,,,,,,,,,,

1- Enumeration and vulnerability scanning (this step may have a minimum of 4 screen shots )

Suggested methods:

- use Linux terminal commands to find local machine IP address then scan for available live pcs/systems using may be netdiscover command.

- we also need to include a GUI method of discovering an enumeration of the network around us.

- we should also use the terminal command to check for vulnerabilities on target machines found on the previous step (enumeration)

- for this we repeat the same thing just like before but now we use a GUI tool such as openVAS

2- Exploitation development (this step may have a minimum of 2 screen shots )

- This need to show what commands need to be used for the exploitation strategy and what GUI tools could be used

3- the exploitation itself. (this step may have a minimum of 2 screen shots )

Having established an exploitation strategy, now using command lines and GUI we should complete the exploitation. examples such as MSFconsole > exploit > payload. We need to use a GUI tool for snapshots, reports etc.

So basically explain how you managed to get to the proof file and how you retrieved it using the above example. The brief says at least one proof file meaning that you can go the extra mile and may be retrieve more than one to show better success.

The proof file is mentioned in the full brief (will be provided later)

4- fixing vulnerabilities. (this step may have a minimum of 2 screen shots, reports, graphs etc)

OpenVAS for example could find all available vulnerabilities and could also be used to fix them. This could also generate reports, graphs, tables etc. This data could be added to our main report too. (put them in an appropriate place - may be in appendices if too much)

GENERAL POINTERS:

- REMEMBER WE NEED TO HAVE VERY CLEAR SCREEN SHOTS + DESCRIPTION OF HOW WE HAVE DONE IT

- ALSO THE USE OF COMMANDS NEED TO BE DESCRIBED

- THERE ARE 2 RECOMMENDED HACKING BOOKS - (CHECK IF THEY MAY HELP) AS FOLLOWS:

Penetration Testing (also available in E-book)

A Hands-On Introduction to Hacking

by Georgia Weidman

June 2014, 528 pp.

ISBN-13: 978-1-59327-564-8

The Hacker Playbook 3: Practical Guide to Penetration Testing

Paperback by Peter Kim (Author)

Paperback: 289 pages

Language: English

ISBN-10: 1980901759

ISBN-13: 978-1980901754

- ALL THE TOOLS WE MENTIONED ABOVE ARE JUST EXAMPLES. YOU CAN USE DIFFERENT TOOLS IF NECESSARY.

- WE COULD HAVE A MINIMUM OF 30 SCREENS SHOTS IN TOTAL.

THANKS AND REGARDS

THE REQUIRED VM WARE FILES WILL BE PROVIDED LATER

Habilidades: Penetration Testing, Segurança de computadores

Veja mais: penetration testing school, network penetration testing, which of the following is the basic penetration testing course certification from the sans institute, penetration testing syllabus, penetration testing course, penetration testing course in hyderabad, penetration testing course online free, penetration testing course for beginners, training program software languages karachi, penetration testing india, name university training program software languages karachi, sugarcrm remove 2004 2008 sugarcrm inc program provided, penetration testing karachi, risk assessment penetration testing services india, penetration testing projects, penetration testing pakistan, penetration testing bangalore, penetration testing roma, site penetration testing, penetration testing project

Acerca do Empregador:
( 8 comentários ) Sale, United Kingdom

ID do Projeto: #22527612

12 freelancers estão ofertando em média £207 para esse trabalho

rozeny2k

Hi. I am an IT Security expert and penetration tester with 300+ technical project completion experience. I am expert in Kali/backtrack, metasploitable, RHEL, Ubuntu and several other Linux distributions. Also I am an e Mais

£250 GBP in 7 dias
(131 Comentários)
7.1
exnihilo11

Dear Sir/Madam, I came across the project posted on Freelancer.com and I am perfect for this project for the following reasons: ✪ 100% Client Satisfaction on ALL Projects – see my portfolios. ✪ Glowing Client Revie Mais

£235 GBP in 7 dias
(4 Comentários)
4.8
AhmadSameer

Hey there, I have been in the Information Security arena for years. I had conducted tons of Penetrations Tests. I'm a former black hat hacker as well. Would you share more details? Regards.

£250 GBP in 7 dias
(27 Comentários)
5.0
liveexperts123

Hi there, I have read your project description and i'm confident i can do this project for you perfectly.I still have a few questions. please leave a message on my chat so we can discuss the budget and deadline of the Mais

£250 GBP in 6 dias
(2 Comentários)
3.7
ronkr720

I'm an OSCP Certified Pentester having Knowledge in Penetration testing and Ethical Hacking. With a Background of 3+ Years in Cyber Security and Ethical hacking. I have also performed Penetration tests for several cl Mais

£222 GBP in 5 dias
(1 Comentário)
2.8
nekhbet

Hi, 100 GPB per each VM. Regards Sorin

£334 GBP in 10 dias
(1 Comentário)
2.5
Randyvc

Hi My name is Randy, I'm a security expert based at Costa Rica. My working normal hours are from 7am to 9pm MT US time but I can be flexible if needed. I'm very interested in your project, I'm skilled in what you ar Mais

£150 GBP in 7 dias
(3 Comentários)
2.0
fanstar1996

I am experienced php developer and web designer with the depth knowledge related to MySQL,Codeigniter,Laravel,WordPress,MSSQL,JSON,JAVASCRIPT,AJAX,XML,jQuery,CSS,HTML5,Material Designing with the integration of web tec Mais

£135 GBP in 7 dias
(0 Comentários)
0.0
inf0security

Hi, I am a both a CEH and a certified penetration tester for the U.K. ministry of defence. This sounds like a fun project and something I do on a daily basis (user of vulnhub, hack the box etc) Relevant Skills and Exp Mais

£150 GBP in 3 dias
(0 Comentários)
0.0
£133 GBP in 2 dias
(0 Comentários)
0.0
zZBlackArrowZz

Hi. I am good and an expert in penetration testing. I am expert in Kali Linux and windows systems. Also I am an expert in nmap, metasploit, wireshark, dirbuster, hydra, Qualys, nessus and several other penetration too Mais

£225 GBP in 7 dias
(0 Comentários)
0.0
nishantgoel2050

Into cyber security since 2 years. Preparing for OSCP.

£150 GBP in 3 dias
(0 Comentários)
0.0