Закрыт

small project in security

we will use a deliberately vulnerable Linux image called “Metasploitable 2”. The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. You can use VMWare to run the image.

Each group must select one vulnerability and exploit it. To exploit, you are expected to perform the necessary hacking activities (scanning, identifying vulnerabilities … etc.).

In order to perform the exploit, you will need an “attack” image. You can use “Kali Linux” as your attack machine. Kali Linux comes with all the tools that you would need to exploit the many vulnerabilities that exist in Metasploitable 2. Other resources can be used too. Examples include BeEF (Browser Exploitation Framework) for launching attacks against web browsers.

Квалификация: Компьютерная безопасность, Интернет-безопасность, Linux, Ubuntu, Безопасность сети

Показать больше network security mini projects, security projects for students, cyber security projects for college students, web security projects, information security projects with source code, cyber security projects for beginners, projects based on cyber security, network security projects with source code, small project language, small project management, small project ideas programming, small project freelance, fulltime offline data entry small project fulltime chennai, small project network security, migrate small project from aspnet to mvc, mimigrate small project from aspnet to mvc, how to hire a freelance programmer for small project, where to find software engineers for small project, The project is about understand user questions and generate a query for SQL in order to get answers., how to manage a small project

О работодателе:
( 1 отзыв ) Riyadh, Saudi Arabia

ID проекта: #19168379

12 фрилансеров(-а) в среднем готовы выполнить эту работу за $84

rozeny2k

Hi. I am an experienced penetration tester and technical writer with an MS in Computer Science and Engineering. I am expert in Kali/Backtrack, RHEL, Ubuntu and several other Linux distribution. I am also expert in pene Больше

$150 USD за 2 дней(-я)
(146 отзывов(-а))
7.2
AhmadSameer

Hello there, I have been in the InfoSec for years. I had conducted tons of security related projects using Metasploitable and Kali. I'm downloading the attached file to check. Regards.

$250 USD за 2 дней(-я)
(52 отзывов(-а))
5.4
ciscoterminal

Dear Sir, i am CCIE Security and CHFI with 17 years of cyber security experience. i will do your project and attack vm image as per your requirements. we can discuss further over chat. thanks for reading

$200 USD за 1 день
(38 отзывов(-а))
5.0
vaptsolutions

Have 5+ years of experience in both black box and white box testing penetration testing. Perform VAPT(Vulnerability and penetration testing) services like Web-Application penetration testing; System Application penetra Больше

$55 USD за 2 дней(-я)
(5 отзывов(-а))
3.9
niladri1991

Hi , I am a MSc student at University College Dublin int he field of Digital investigation and forensic computing. I have my own forensic kit, in most cases I use Kali Linux. I have a complete running setup with Metas Больше

$30 USD за 1 день
(1 отзыв)
2.3
xupiter2012

Hi Fahad, It sounds like an interesting challenge and very good fit. I have great experience with cyber security, forensic and especially with Kali Linux, so it will be done in a very professional way. Let me kno Больше

$150 USD за 3 дней(-я)
(3 отзывов(-а))
2.2
armanmohammad

just reviewed your requirement, I am Ethical Hacker & Kali Linux My Play Ground. I can do this job without any issue. If You interested for Discussion Then inbox me. Best Regards

$30 USD за 1 день
(0 отзывов(-а))
0.0
gonzalogarciale

Hi, I've exploited Metasploitable 2 many times, as I'm a CTF player (with ID-10-T team). I can help you with this task and make a cool and professional report. Also I have +6 years of experience on penetration testing Больше

$55 USD за 1 день
(0 отзывов(-а))
0.0
naeyna

perform the necessary hacking activities (scanning, identifying vulnerabilities … etc.). In order to perform the exploit, you will need an “attack” image. You can use “Kali Linux” as your attack machine. Kali Linux Больше

$20 USD за 3 дней(-я)
(0 отзывов(-а))
0.0
vimaladevi58

Hi I have 3.6 years of experience in pen testing , I can complete with in the SLA Tim

$25 USD за 1 день
(0 отзывов(-а))
0.0
secnetwork12

Hello, I 'm a Network Security Engineer and also certified cisco ccna routing & switching and ccna security .

$15 USD за 2 дней(-я)
(0 отзывов(-а))
0.0
piyushbca7

Certified Ethical Hacker. Have exploited Metasploitable 2.0 many times before using Kali Linux. May be we can directly proceed with the project after discussing the same. Let me know, if wanna discuss the same Больше

$25 USD за 1 день
(0 отзывов(-а))
0.0