Filter

Meine letzten Suchanfragen
Filtern nach:
Budget
bis
bis
bis
Typ
Fähigkeiten
Sprachen
    Jobstatus
    2,000 xss attack Gefundene Jobs, Preise in EUR

    Hallo wir suchen jemand der unsere Komplete Webseite bereinigen kann und sichern kann. Wir können kein Update ma...bereinigen kann und sichern kann. Wir können kein Update machen da ein Plugin noch Probleme hat "dies sollte natürlich auch geupdatet werden" Wir haben 3-5 x angriffe im Monat wo jemand MalwearAds in unsere Webseite einbaut Du solltest das Plugin Aktualisieren Datenbank bereinigen WordPress reinigen Lücken finden und dies beheben wir haben mit Burp suite unsere Webseite überprüft und sehr viele XSS (Cross site scripting )Lücken finden können. SQLi haben wir bislang keine gefunden. Es müsst daher intensiv geschaut werden wie Leute zugriff auf unseres System erlangen zu not via Honeypot etc. wir möchten hi...

    €553 (Avg Bid)
    €553 Gebot i.D.
    22 Angebote

    ...dann auch Lösungen/Hinweise gegeben werden. Hier einige Funktionen, die gescannt werden sollen. Wenn Sie weitere kennen, gerne mit angeben.... - TLS-Scanner überprüft Zertifikate, Protokollversionen & Verschlüsselungsalgorithmen - DOMXSS-Scanner zur Schwachstellenerkennung bei DOM Cross-Site Scripting Anfälligkeit - HTTP-Security-Header-Scanner prüft die Privatsphäre sowie den Clickjacking-und XSS-Schutz um Spoofing-Angriffe zu verhindern - Information-Leakage-Scanner prüft die Privatsphäre-Einstellungen des CMS - Initiative-S Scanner prüft Webseite auf Virenbefall oder Kompromittierung durch Fremdinhalte wie Phishing - Port-Scanner, welche Ports sind offen? - DDOS - Attacke - Test mit 50 Anfragen in der Sekunde -...

    €2278 (Avg Bid)
    €2278 Gebot i.D.
    22 Angebote

    ...dann auch Lösungen/Hinweise gegeben werden. Hier einige Funktionen, die gescannt werden sollen. Wenn Sie weitere kennen, gerne mit angeben.... - TLS-Scanner überprüft Zertifikate, Protokollversionen & Verschlüsselungsalgorithmen - DOMXSS-Scanner zur Schwachstellenerkennung bei DOM Cross-Site Scripting Anfälligkeit - HTTP-Security-Header-Scanner prüft die Privatsphäre sowie den Clickjacking-und XSS-Schutz um Spoofing-Angriffe zu verhindern - Information-Leakage-Scanner prüft die Privatsphäre-Einstellungen des CMS - Initiative-S Scanner prüft Webseite auf Virenbefall oder Kompromittierung durch Fremdinhalte wie Phishing - Port-Scanner, welche Ports sind offen? - DDOS - Attacke - Test mit 50 Anfragen in der Sekunde -...

    €1060 (Avg Bid)
    €1060 Gebot i.D.
    27 Angebote

    A spacecraft model is to be created for a PC Game (Viper Attack). This model will then serve as Enemy in the game *. From the submissions can several "winning", so ultimately I need several models. It's a top down-scrolling arcade game. To illustrate I have here a little in-game video: There are almost no limits to creativity, it should only be taken care of that there are no similarities, from Movie / Games u. a. existing designs. The model does not need to be super detailed. Which 3D modeling tool you do that does not matter. Output format is .fbx or .obj . technical: -Vertices: less than 15,000 -UVMap: yes, absolutely -Model of several parts: yes, but a maximum of 4 -Texturing: may, but does not have to. -Model or part models must be completely

    €80 (Avg Bid)
    Garantiert Versiegelt
    €80
    32 Einträge

    Hi Farid, the next creature i am interested in would be a Unicorn. Some impressions can be seen at these links: links: As before i need four animations: - Idle - Attack (Horn Thrust) - Casting (Rearing on the hind legs, the horn is considered the magic source: i will add glow/partikels around the horn for that later) - Walk Best regards Damian

    €95 (Avg Bid)
    €95 Gebot i.D.
    1 Angebote

    Meine Web Site wurde gehackt. Benötige dringend Hilfe!

    €104 (Avg Bid)
    €104 Gebot i.D.
    9 Angebote

    ...garantiert werden können. Erforderliche Kenntnisse sind: - mehrjährige Berufserfahrung als PHP Web-Entwickler; -sehr gute Kenntnissen von PHP, JavaScript, MySQL und Zend Framework; -Erfahrungen mit objektorientierte Programmierung (OOP) in PHP5 unter Verwendung von Design Patterns (z. B. MVC); -Kenntnisse von Sicherheitsaspekte bei Web-Anwendungen (z. B. SQL-Injection, Cross Site Scripting-XSS); -Fließende Deutschkenntnisse; -nachweisliche Referenzen auf den o.g. Gebieten; Nicht zwingend notwendig aber wünschenswert sind: -ausgeprägtes analytisches und problemorientiertes Denken; -Erfahrungen mit der Erstellung von Responsive und Mobile Designs; -Erfahrungen mit GIT; -Erfahrungen im Umgang mit den gängigen Grafikprogrammen (z.B. ...

    €36 / hr (Avg Bid)
    €36 / hr Gebot i.D.
    12 Angebote

    Sehr geehrte Freelancer, Leider hat unser bisheriger Programmierer eine Festanstellung angenommen und nur noch wenig Zeit. Allem Anschein nach besteht auf unserer neuen Homepage (bisher fast ohne Inhalte) eine Sicherheitsluecke die wir umgehend schliessen muessen, da wir am heutigen morgen den folgenden Eintrag in unserer Datenbank gefunden haben: „script alert( xss vuln ) /script“. Da dies moeglicherweise ueber zwei bisher vorhandene Kontaktfelder mit einem Zahlencode geschen konnte, wuerden wir diesen Zahlencode gern gegen eine Bilddarstellung austauschen und gleichzeitig auch einmal die vorhandene Programmierung durchsehen lassen wollen. Wir freuen uns auf Ihre Rueckmeldung und Ihr Angebot.

    €167 (Avg Bid)
    €167 Gebot i.D.
    8 Angebote

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €55 (Avg Bid)
    €55 Gebot i.D.
    8 Angebote

    ...Important: - Rectify 4XX Status Codes (3) - Rectify Low Text-HTML Ratios (31) - Identify and Rectify a URL With Temporary Redirect (1) - Rectify Issue with Unminified JavaScript and CSS Files (1) - Rectify 'Your database prefix is set to the default 'wp_'. - Remove The DISALLOW_FILE_EDIT constant is defined and set to false from our - Configure site for HSTS preload list - Rectify the X-XSS protection security header's non-recommended value: "1". - Rectify the HSTS Max-age security header's non-recommended value: "2592000 ". - Rectify the Referrer-Policy security header's non-recommended value: "origin-when-cross-origin". - Ensure page width matches viewport width (32) - Improve page loading time (32) - Delay loading i...

    €84 (Avg Bid)
    €84 Gebot i.D.
    36 Angebote

    I'm urgently in search of a certified and empanelled vendor who can perform a comprehensive scan for both my web and mobile applications. Key Tasks: - Conduct thorough scans to identify any potential vulnerabilities. - Draw up a comprehensive report detailing any findings. Ideal Candidate: - Comprehensive knowledge of different attack vectors is mandatory, even though no specific concern is prioritized for this project. - Proven experience as an empanelled vendor is compulsory. - Must be able to work under tight deadlines, as the completion of this project is ASAP.

    €316 (Avg Bid)
    €316 Gebot i.D.
    11 Angebote

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €61 (Avg Bid)
    €61 Gebot i.D.
    7 Angebote

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €76 (Avg Bid)
    €76 Gebot i.D.
    14 Angebote

    Per country analysis of Distributed Denial of Service attacks We have been collecting data on UDP reflection based Distributed Denial of Service attacks since 2014. There are significant differences in attack patterns between countries (time of day, day of week, target of attack) and in response to global interventions targeting DDoS. This project would involve drilling down in to the per-country data to understand what is going on and why.

    €127 (Avg Bid)
    €127 Gebot i.D.
    28 Angebote

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €32 (Avg Bid)
    €32 Gebot i.D.
    12 Angebote

    I have a small website running on Zencart that apparently suffered a DDoS attack 3 days ago and the website is still down. Now my clients can't visit the site, I've contacted Hostgator (I have a shared server account there) and I've been told I have "web bots crawling my site at unmanaged speeds"... I tried to set longer crawl delays and installed the CloudFlare but the website is still down... Any ideas how to bring the website up and running again?

    €21 (Avg Bid)
    €21 Gebot i.D.
    15 Angebote

    ...combat XSS attacks and remove Zero Width Space (ZWSP) characters. Key Project Requirements: - Develop a Spring Boot application filter. - The filter must effectively handle and block all potentials XSS attacks. - The filter must efficiently remove all encountered ZWSP characters. - The developed filter must suitably plug into a Spring Boot application. - The filter should be designed to handle high networking traffic smoothly. Test Cases Require to Cover: - Scenarios of filtering XSS attacks. - Scenarios that deal with the removal of ZWSP characters. - Scenarios involving combined filtering of XSS attacks and removal of ZWSP characters. Ideal Skills and Experience: - Strong proficiency in Java programming language. - Hands-on experience with Spring Boot. ...

    €129 (Avg Bid)
    €129 Gebot i.D.
    7 Angebote

    I require a comprehensive analysis of various attack surface management companies. The major areas to focus on include: 1. Features: This includes an exhaustive evaluation of the following: - Vulnerability scanning - Asset discovery - Risk assessment - Configuration management 2. Pricing: Provide a detailed overview of each company's pricing structure along with proof. 3. Effectiveness: I'm interested in a thorough evaluation of the effectiveness of each company's software/services. The ideal freelancer for this job should possess an in-depth understanding of cybersecurity software and services. Experience in writing reviews and comparisons of software is a bonus. The review is to be delivered in a concise, easy-to-comprehend report. Please include C...

    €102 (Avg Bid)
    €102 Gebot i.D.
    26 Angebote

    We require an individual capable of crafting a comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, N...comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, Networks, Infrastructures, and Active Directories. 2) Social Engineering Assessments. 3) Physical Security Evaluations. 4) Red Teaming Exercises. 5) Purple Teaming Collaborations. 6) Attack Surface Management. 7) Source Code Analysis. 8) Software Composition Analysis (SCA). 9) Dynamic Application Security Testi...

    €21 / hr (Avg Bid)
    €21 / hr Gebot i.D.
    23 Angebote

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    €830 (Avg Bid)
    €830 Gebot i.D.
    12 Angebote

    I want to get a topic in Ransomware and write on Ransomware attack effects on IT Businesses.

    €108 (Avg Bid)
    €108 Gebot i.D.
    53 Angebote

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    €2285 (Avg Bid)
    €2285 Gebot i.D.
    26 Angebote

    I am in need of highly skilled Python, JavaScript, PHP, bootstrap, JQuery, and HTML programmers for a minimum of two major projects. The first project is focused on creating advanced Python tools for automating tasks of a penetration tester and bug bounty hunting. The tools should scan and exploit the most common vulnerability like XSS, IDOR, SSRF, RCE, Command injection, SQLI, and etc. To do all of this process manually take allot of time. It should be better to make a combo with some software that manage all of the work and Using AI to scan all of the file and codes and have a hacker mindset. For example burp suit have web scanner but it is not smart enough to think critically to find some vulnerability. of course sometimes its work but it is possible to create something much bett...

    €9 / hr (Avg Bid)
    €9 / hr Gebot i.D.
    15 Angebote

    Seeking skilled freelancers for UI/UX design for an Attack Surface Management project. Familiarity with Attack Surface Management preferred but not mandatory. Design style similar to & Please share relevant work samples. Specifics: - Incorporate interactive dashboards - Include detailed analytics - Construct a user-friendly navigation system Skills and experience: - Strong UI/UX design skills - Previous work with similar projects - Knowledge in cybersecurity (preferred, not mandatory)

    €932 (Avg Bid)
    €932 Gebot i.D.
    59 Angebote

    I'm facing a major reputation issue due to a personal attack in a Google review. This false info-based review has had a massive impact on my web presence. While I have made attempts to mitigate the issue by reporting it to Google and responding publicly, professional assistance is now needed for effective resolution. A background in online reputation management and knowledge of Google's content policy would be ideal for this task.

    €9 - €28
    €9 - €28
    0 Angebote

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €14 (Avg Bid)
    Garantiert
    €14
    4 Einträge

    Create an excel sheet where I can score my columns based on categor...Authentication b. IAM permissions c. Configuration of Network Security Measures 3. Breach Probability a. Historical Incidents b. Attack Frequency c. System Value 4. Encryption Status a. Relevance of Encryption Type b. Compliance with Encryption Standards c. Encryption Key Management and Controls 5. Configuration Complexity and Commonality of Misconfiguration Occurrence a. Complexity of Service Settings b. Common Configuration Errors c. Configuration Default Settings 6. Alignment with Pre-Exploitation Phases of MITRE ATT&CK and Cloud Threat Attribution a. Initial Access and Execution Risks b. Privilege Escalation and Defense Evasion c. Threat Actor Profiles and Attack Vector Analysis Total Li...

    €28 (Avg Bid)
    €28 Gebot i.D.
    8 Angebote

    ...developed using FastAPI, a high-performance web framework for building APIs with Python, and MongoDB for data storage. Requirements: Expertise in FastAPI and MongoDB is essential. In-depth understanding of RESTful APIs, CRUD operations, and web security best practices. Ability to implement robust security measures to protect against common vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). Experience with user authentication and authorization mechanisms, including token-based authentication and role-based access control (RBAC). Strong communication skills and the ability to collaborate effectively with our team. Deliverables: Develop a FastAPI backend with CRUD endpoints for managing admin panel data securely. Integrate Mo...

    €110 (Avg Bid)
    €110 Gebot i.D.
    20 Angebote

    Hi Ahmed Mahmoud S., hope you are all well. I have an assignment regarding a Differential Power Analysis attack on a crypto XOODYAK algorithm. And a task for conducting a leakage assessment and interpret test results. Would you be able to help? I currently have some of the code but it needs finishing. If I send you the description, can you take a look and healthly let me know whether you could finish it up in a week. This is highly important for me Sir.

    €232 (Avg Bid)
    €232 Gebot i.D.
    1 Angebote

    I am looking for a seasoned Cybersecurity Professional experienced in conducting realistic attack simulations and incident reports. The goal is to understand how our systems respond against: - DDoS (Distributed Denial of Service) attacks - Malware attacks - Ransomware attacks These simulations should include our Network Servers, four VMs, and Files. Ideal Skills: - Proficiency in conducting DDoS, Malware, and Ransomware attack simulations - Experience in handling and securing network servers and virtual machines - Practical knowledge about file-based attacks and their prevention The final deliverable should be a detailed report that includes a thorough technical analysis of the attack simulations' results. The report should help us identify vulnerabilities, un...

    €52 (Avg Bid)
    €52 Gebot i.D.
    15 Angebote

    I'm looking for an experienced professional who is skilled in working with WooCommerce to swiftly install 3D Secure on my e-shop. I need this done as soon as possible as this is an urgent project. Key Requirements: - Proven experien...working with WooCommerce to swiftly install 3D Secure on my e-shop. I need this done as soon as possible as this is an urgent project. Key Requirements: - Proven experience with WooCommerce - Profound knowledge of 3D Secure installation - Capability to quickly understand and implement necessary changes - Excellent attention to detail We had to disable the card payment as we faced massive cyber attack (card testing) recently. I need a quick intervention to make our e-shop fully functional again. Appreciate your time and look forward to ...

    €83 (Avg Bid)
    €83 Gebot i.D.
    17 Angebote

    I am searching for a Python developer proficient in Scrapy to forge web security testing tools. As a key deliverable, these tools must have the features below: - Subdomain Enumeration: Subdomains to be listed and categorized. - Directory Enumeration - Sensitive Parameter Detection - XSS Testing - SQL Testing Proven experience in creating security software is ideal. The developer should be adept at creating intermediate-level subdomain enumeration features. The project completion requires an understanding and implementation of Scrapy. I expect a functional, well-tested software package at the end of the project.

    €225 (Avg Bid)
    €225 Gebot i.D.
    18 Angebote

    I am seeking a skilled illustrator with a passion for Japanese anime and a keen understanding of various styles. Though I'm primarily interested in the classic anime style, I am open to incorporating other anime styles, if they serve the design well. The designs I require should be based on popular anime themes and characters, namely: - Naruto - One Piece - Dragon Ball Z - Attack on Titan - And other popular themes and characters, up for discussion Ideal freelancers for this project would demonstrate the following: - Proven experience with graphic design, specifically for clothing - A strong portfolio with emphasis on anime-style work - Ability to capture the essence of popular anime characters - A flexible design approach, to cater to different anime styles and...

    €104 (Avg Bid)
    €104 Gebot i.D.
    56 Angebote

    ...for styling and layout consistency. 6. **Error Handling and Logging**: Implement robust error handling mechanisms both on the frontend and backend. Log errors and application events for troubleshooting and monitoring purposes. 7. **Security Measures**: Apply security best practices such as input validation, output encoding, and protection against common vulnerabilities like Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). 8. **Testing**: Write unit tests and integration tests for both the Angular frontend and the .NET Core backend to ensure code reliability and maintainability. Utilize testing frameworks like Jasmine, Karma, xUnit, or NUnit. 9. **Deployment**: Set up deployment pipelines for continuous integration and continuous deployment (CI/CD). Deploy the...

    €729 (Avg Bid)
    €729 Gebot i.D.
    43 Angebote

    My website was compromised last week, and I need the damage from the malicious code injection assessed and repaired immediately. Unfortunately, I do not have a recent backup to rely on. The perfect professional for this job would: - Have extensive experience in WordPress security - Be capable of identifying and mitigating these attacks promptl...security - Be capable of identifying and mitigating these attacks promptly - Have a strong understanding of the latest threats and malware activities that can impact a WordPress website - Provide guidance on keeping my site secure moving forward Given the lack of backup, a keen attention to detail is necessary to ensure minimal data loss. Upon completion, I would like a detailed report of the attack and the measures taken to rectify the ...

    €19 (Avg Bid)
    €19 Gebot i.D.
    31 Angebote

    Goal: To Demo red team skills with a modern attack, Recording a video with steps in a power point slides with explains Metodology: • The recording Will not appears names or country about developers. Only Kali Linux in English • Slides with screenshot and explain all steps • Share the virtual machines on the scenary attack Content: • Envarionment: Ataque a "CompanyX". • Techniques: Phishing spearphishing, zero-day vulnerabilities pivoting, privilege escalation, data exfiltration. • Tools: Virtual machines in virtualbox, Kali Linux, latest generation of attack tools. Benefifts: • Deep understanding of Red Team attack techniques. • Practical vision of tools and strategies. • Improvement of the security posture...

    €121 (Avg Bid)
    €121 Gebot i.D.
    11 Angebote

    I need an expert in Natural Language Processing, specifically in sentiment analysis and text classification, to assist with my project. While I haven't chosen a programming language for this task, I am open to suggestions. It's currently unclear if I will need a pre-trained or custom NLP model, so both options should be explored. Best fit for the job would include: - Extensive experience in NLP, especially sentiment analysis and text classification - Ability to provide insights on different programming languages for the task - Experience with both pre-trained and custom NLP models.

    €280 (Avg Bid)
    €280 Gebot i.D.
    31 Angebote

    I need an expert in Natural Language Processing, specifically in sentiment analysis and text classification, to assist with my project. While I haven't chosen a programming language for this task, I am open to suggestions. It's currently unclear if I will need a pre-trained or custom NLP model, so both options should be explored. Best fit for the job would include: - Extensive experience in NLP, especially sentiment analysis and text classification - Ability to provide insights on different programming languages for the task - Experience with both pre-trained and custom NLP models.

    €50 (Avg Bid)
    €50 Gebot i.D.
    16 Angebote

    I require an expert in network security and artificial intelligence to create an effective intrusion detection system specifically for medical IoT devices. Main Tasks: - Monitoring: Develop a system capable of vigilant surveillance of all activities on medical IoT devices. - Attack Recognition: The device must be able to recognize "man in the middle" attacks. Familiarity with the dynamics of such attacks will be key. - Response Mechanism: This aspect was not specified, so I suggest a system that blocks network traffic as a preliminary standard. Skills and Experience: - Proficient in AI and machine learning algorithms - Knowledge of IoT devices, particularly medical ones. - Strong experience in Network security - Understanding of intrusion detection system mechanisms...

    €528 (Avg Bid)
    €528 Gebot i.D.
    11 Angebote

    ...of enumeration/vulnerability assessment, scanning, exploit development, exploitation and a brief discussion on vulnerability fixes or detailed security recommendations with appropriate references where required. You will be provided with three Virtual Machines each ranked by their difficulty with instructions on how to access these VMs on ESXi. You will be given Kali Linux Virtual Machine to attack the targets. 1. Proof Filenames: / - This file is only accessible to the root or Administrator user and can be found under the /root directory (Linux) or the Administrator “Desktop” or “My Documents and Settings” (Windows). This file is available on every target machine. a. Proofs: Windows On all Windows targets, you must have a shell of one of the follo...

    €174 (Avg Bid)
    €174 Gebot i.D.
    18 Angebote

    ...sense of calm, the app should be intuitive, user-friendly, and highly accessible. Key Features: * Breathing Techniques: Incorporate the 4-7-8 and Progressive Muscle Relaxation breathing exercises as primary functions of the app. * Grounding Techniques: Implement the Body Scan and 5-4-3-2-1 grounding techniques as additional mechanisms for anxiety relief. * Guide the patients through the panic attack * Provide affirmations Ideal Skills and Experience: * Proficiency in UX/UI design across mobile platforms, particularly iOS and Android * A solid portfolio illustrating a knack for colorful and engaging layouts * Familiarity in designing wellness or healthcare-related apps * A clear understanding of the delicate nature of our target users' needs and the ability to incorporate t...

    €47 (Avg Bid)
    €47 Gebot i.D.
    18 Angebote

    We're seeking a skilled Security Researcher/Ethical Hacker to identify and report vulnerabilities in our Jira Cloud application. The ideal candidate will have a proven track record in ethical hacking, with expertise in various security domains including XSS, SQL Injection, SSRF, etc. Responsibilities include conducting thorough security assessments, utilizing the Bugcrowd Vulnerability Rating Taxonomy for prioritization, and providing detailed reports on findings. This role requires a deep understanding of security protocols and a proactive approach to enhancing application security. I will provide link to the cloud application. The aim is to highlight all potential P1/P2/P3/P4. Deadline for assessment 18th March, I will then do the fixes

    €476 (Avg Bid)
    €476 Gebot i.D.
    27 Angebote
    Secure website Beendet left

    Hello, my website seems to be experiencing what appears to be a bot attack. When accessing the site through Google, it redirects to another website. I'm seeking assistance in addressing this security issue.

    €92 (Avg Bid)
    €92 Gebot i.D.
    34 Angebote

    I am personally aiming to expand my knowledge of cybersecurity, particularly in the area of DDOS attacks. Having basic understanding...educational, and interactive simulations - Be equipped to provide a detailed report on the simulation, detection, and mitigation process Additionally, being able to thoroughly explain the steps involved would be essential, as it would aid my understanding of the subject matter. Other keys to comprehending the nuances would be strong communication skills and patience. In summary: - Set up a DDOS attack simulation - Teach detection and mitigation of said attacks - Provide a detailed report of the entire process Leveraging your expertise, I hope to learn more about cybersecurity and how to detect and mitigate DDOS attacks. Thank you for considering m...

    €298 (Avg Bid)
    €298 Gebot i.D.
    8 Angebote

    ...sense of calm, the app should be intuitive, user-friendly, and highly accessible. Key Features: * Breathing Techniques: Incorporate the 4-7-8 and Progressive Muscle Relaxation breathing exercises as primary functions of the app. * Grounding Techniques: Implement the Body Scan and 5-4-3-2-1 grounding techniques as additional mechanisms for anxiety relief. * Guide the patients through the panic attack * Provide affirmations Ideal Skills and Experience: * Proficiency in iOS and Android app development. * Knowledge of UX/UI design principles to ensure a clean, simple, and user-friendly interface. * Experience working on health/wellness applications, preferably with a focus on mental health. * Understanding and/or experience in inculcating interactive health-related exercises in an...

    €908 (Avg Bid)
    €908 Gebot i.D.
    18 Angebote

    In the current situation, my computer has been severely compromised. It has fallen victim to a .faust virus attack, which has resulted in a number of difficulties such as all files in inaccessible.. I'm hopeful to connect with a professional who can restore my computer to its original condition. Required Skills & Expertise: - The freelancer should be an Expect in the area of virus removal. - The potential candidate must possess an excellent understanding of various types of viruses, specifically the .faust virus - randsome. - The freelancer should provide proof of their relevant and successful past work experiences relating to virus removal. The perfect freelancer for this job would be someone who not only removes the virus but also ensures it does not re-infect my system...

    €732 (Avg Bid)
    €732 Gebot i.D.
    10 Angebote

    ...only forward , backward , side ways but NOT diagonally. Each player tries to encircle the enemy's one piece on three sides. Game pieces will be roman soldiers. the user instead of moving the star static game pieces, moves the characters from square to square, and the characters move with a walking animation. When red soldier for example is surrounded on three sides by three blue soldiers, they attack him together and he collapses dies and disapperrs. Please guide me on exactly what all the graphics designer must give, so that later we dont face delays because some components you need are missing. Also mention any other specs or criteria he must follow Please do not send AI (artificial idiocy) generated replies, it impresses no one. Just be an intelligent human, because ...

    €256 (Avg Bid)
    €256 Gebot i.D.
    23 Angebote

    ...with the application development teams and develop test cases, which can check the security of applications, databases and authentication mechanisms. • Experience using a wide variety of security tools to include Kali-Linux, Checkmarx CxSAST, CxIAST, Burp Suite Pro, Wireshark, Nmap, Nessus, Metasploit, and Nexpose. • Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications. • Automation of security scanning process (DevSecOps) into the build environment with CI/CD pipeline using Codefresh, Maven, Gradle, ...

    €23 / hr (Avg Bid)
    €23 / hr Gebot i.D.
    30 Angebote