Em Andamento

23 Ethical Hacking Guides!

Hello Ethical Hackers!

I will need a full guide for eachone of all these below I can give up to $15-$20 for each one 4-5 pages each with examples or screenshots so I can create a complete guide for all of these with average $400 USD and cretew a quality guide. Specifically:

if interested select one (1) of the following until July 18:

1. Convert [login to view URL] to use the patator instead of medusa ([login to view URL])

2. Develop a manual/guide of ncrack and basic use of the patator. Compare them and give examples of how to use them.

[login to view URL] [login to view URL]

3. Develop a report describing what netbios is and how the attacker to a windows domain can exploit it . Give examples with specific tools.

4. Develop a report that describes what kerberos authentication is in a windows domain.

5. Develop a report that explains which the extra security features are in windows 10, specifically Credential guard and how we can apply them using powershell.

6. Develop a report that explains which additional security features are in Windows 10, specifically Windows Defender Advanced Threat Protection, and how to use them with powershell.

[login to view URL] a report that states which additional security features are in windows 10, specifically Windows Defender Application Guard, how can we apply them using powershell.

8. Develop a metasploit basic use / operation guide and refer to the key modules available for metasploit.

9. Develop a guide/manual to implement the following end-user attack technique: [login to view URL]

10. Develop a basic use guide for the empire. ([login to view URL])

11. Develop a guide listing specific examples of whitelisting bypass techniques: [login to view URL]

[login to view URL] a task that describes what the Server Message Block (SMB) is and how it can be exploited by the attacker in a windows domain. Give examples with specific tools.

[login to view URL] a task that describes what Kerberoasting is and how it can be exploited by the attacker in a windows domain ([login to view URL]). Give examples with specific tools.

[login to view URL] up a guide to using nmap and in particular the nmap scripting language. Give examples of how to develop scripting modules.

[login to view URL] a task that describes what Pass the Hash is and how the attacker can exploit it in a windows domain ([login to view URL]). Give examples with specific tools.

[login to view URL] out what is Pass the Ticket and how it can be exploited by the attacker in a windows domain ([login to view URL]). Give examples with specific tools.

17. Develop a manual for the use of koadic ([login to view URL]).

18. Develop a pupy user guide ([login to view URL]).

19. Elaborate a task that describes what NTLM v2 Authentication is and how it can be exploited by the attacker in a windows domain. Give examples with specific tools.

20. Install, test, and develop a ReelPhish user guide:

[login to view URL]

[login to view URL]

21. Develop a MailSniper User Guide and give examples of how to use [login to view URL]

22. Develop a Throwback User Guide and give examples of how to use [login to view URL]

23. Develop a user guide for the responder and give examples of how to use [login to view URL]

If any of the above issues is good for me, I will wait for updates.

Thanks.

Habilidades: Python, Redação técnica

Veja mais: the complete ethical hacking course for 2016/2017!, the complete ethical hacking course: beginner to advanced! free, ethical hacking course free, the complete ethical hacking course for 2016/2017! download, the complete ethical hacking course beginner to advanced pdf, udemy ethical hacking, ethical hacking for beginners pdf, the complete ethical hacking course beginner to advanced kickass, ethical hacking argentina, ethical hacking none, ethical hacking course faridabad, projects ethical hacking, freelance ethical hacking projects, ethical hacking jobs freelance, decoder message bypass

Acerca do Empregador:
( 107 comentários ) Thessaloniki, Kalamaria, Greece

ID do Projeto: #17329931

Concedido a:

sysadmsp

Hello sir I can make documentation for all the things you've mentioned I've been working with security for more then 3 years Thanks

$211 USD em 4 dias
(0 Comentários)
0.0

6 freelancers estão ofertando em média $128 para esse trabalho

wairimundirangu4

I am a professional writer with 4 years experience in writing.I hold a Masters in Business Administration (MBA) and Medicine, I have wide knowledge in search engine optimization.I have experience in Rewriting and writ Mais

$30 USD em 1 dia
(2 Comentários)
1.8
Mathenam

"Hello, Reports rely on reliability, efficiency, and concise, quality writing. I pride myself on research toward accurate communication of information. My experience in this field has molded my investigative eye, and Mais

$400 USD in 7 dias
(0 Comentários)
0.0
Mjawadi

Hi, Do you accept collecting guides and copy/paste ? Thank you ....................................

$15 USD em 1 dia
(0 Comentários)
0.0
moharemm

Dear; My Name is Reda, I actually work as System Administrator in a SOC (Security Operation Center). I worked as Information Security Analyst in the SOC, the use of most of the mentioned tools was part of my dail Mais

$66 USD in 4 dias
(0 Comentários)
0.0
captainratnesh

Hello, I have done the similar projects before about technical [login to view URL] me so that i can show samples from my previous work

$45 USD em 1 dia
(0 Comentários)
0.0