Find vulnerability websitetrabajos

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    1,960 find vulnerability website trabajados encontrados, precios en USD

    ...QUIENES SOMOS - ADVISORIES - CONTACTO" y la categoría SERVICIOS debe tener un menú desplegable con los siguientes servicios: RED TEAM PENTESTING CYBER THREAT INTELLIGENCE VULNERABILITY ASSESSMENT CODE REVIEW tenemos varios ejemplos de otras páginas de seguridad informática para mostrarles por Privado. Gracias....

    $144 (Avg Bid)
    $144 Oferta Promedio
    10 ofertas

    ...Informático, Computación o carrera afín, para vacante de Administrador de Seguridad. Se requieren sólidos conocimientos en Herramientas de vulnerabilidad (nessus, openvas, vulnerability manager, rapid 7) y experiencia comprobable en el área de Seguridad TI mínima de 2 añ[iniciar sesión para ver URL] de Trabajo: Santiago CentroH...

    N/A
    N/A
    0 ofertas

    ...Metropolitana necesita para sus dependencias a un Administrador de Seguridad Informática Por Proyecto.* Experiencia en herramienta de vulnerabilidades como - Nessus- OpenVAS- Vulnerability Manager- Rapid 7Se ofrece:* Desde el cuarto mes contrato Indefinido* Renta acorde al mercado* Buen ambiente Laboral-...

    N/A
    N/A
    0 ofertas
    Especialista Finalizado left

    ...Scripts Linux/Windows?Análisis de Datos/Log Manager?Gestión de Incidentes de Seguridad?Apoyo para Auditorias de Seguridad PCI/ ISO 27000.?Hetical Haking?Penetration Testing?Vulnerability Assessment?Identificar los problemas técnicos.?Apoyo a preventa en lenguaje técnico.?Establecer y mantener relaciones sólidas en todo el ciclo de vida del proyecto a ca...

    N/A
    N/A
    0 ofertas
    Web hackeada Finalizado left

    ...protect our IP reputation and other clients. Thank you to: - read your mail server logs - investigate and identify the spam source (possible server misconfiguration, website compromised, account/password compromised etc...) - fix the issue and stop the spam source - clean the server outbound mail queue, and other potential malicious files -

    $138 (Avg Bid)
    $138 Oferta Promedio
    7 ofertas
    Seguridad Mikrotik Finalizado left

    ...nivel avanzado de seguridad informática. ------------------ I need tou hire someone Advanced - Expert in Mikrotik security skill to try to get access hacking the vulnerability of the RB in the Internet Service Provider to know how is the security. I will pay this job only when I have a real print screen from the device. The only administrator

    $140 (Avg Bid)
    $140 Oferta Promedio
    2 ofertas
    Sale person / Vendedor Finalizado left

    Hi / Hola, We need a sale person to promote/sale our web security seals and web vulnerability scans. We are thinking to start with a revenue share model. Please check our solutions in: [iniciar sesión para ver URL] We can accept any kind of collaboration that generates leads or sales, e.g.: email marketing, telemarketing, etc... Deseamos encontrar

    $205 (Avg Bid)
    $205 Oferta Promedio
    2 ofertas

    We have a WordPress website which has been subjected to a pharma hack. This is the second time this has happened, so the site has obviously been exposed to a vulnerability somewhere. Currently, a page on the site redirects to a pharma site - we need this fixing, and the problem finding so it does not happen again. Thanks!

    $133 (Avg Bid)
    $133 Oferta Promedio
    56 ofertas

    Hi We an outdates CMS script from 2012 . Today it was hacked because of a vulnerability and exploits . they hacked the database and converted all articles to the same title / author. Any experienced one with security to fixe those exploits Thanks

    $427 (Avg Bid)
    $427 Oferta Promedio
    24 ofertas

    Site keeps having unusual data loss from the DB Need you to inspect code, AWS hosting setup & files for potential threats Help put an end to mysterious data loss

    $92 (Avg Bid)
    $92 Oferta Promedio
    18 ofertas

    Check this very easy basic microsoft Excel macro Preparation 1 File 1 : 192_168_0_0_23_Part1_2  Input File 2. File 2 : Vulnerability  Output File This is simple Macro , we have to present it as a Demo . Then after check & confirm we can discuss about remote support contract. It is paid service after this demo we present. • Input : There are

    $29 (Avg Bid)
    $29 Oferta Promedio
    6 ofertas

    Looking for an business analyst who has expo... reports , presentations and documentations for executive usage. Ability to produce well formatted presentation using Microsoft PowerPoint. Have some background with Vulnerability Management, and Security Incident Management and willing learn and become and expert. Ability to cover European Time Zone.

    $23 / hr (Avg Bid)
    $23 / hr Oferta Promedio
    20 ofertas

    Hello, Hope you're doing well. I have developed a Python tool to find OWASP's top 10 mainly (Cross-site scripting and SQL Injection) vulnerabilities from PHP Web applications using pattern matching and OWASP's prevention rules for XSS and SQLI. So I have developed the tool, the tool can scan files from the vulnerabilities as mentioned earlier and

    $175 (Avg Bid)
    $175 Oferta Promedio
    12 ofertas

    We want to implement the below security for sessions on our website. (Vb.net,ASP.net) User Session Recreation Vulnerability Regenerate session tokens after a period of time, after certain number of requests, prior to any significant transactions. Application should only issue session ID’s of newly generated sessions to users after they have successfully

    $186 (Avg Bid)
    $186 Oferta Promedio
    17 ofertas

    Hello, Need somebody who can apply security settings to the GLI AR-300 Op...AR-300 [iniciar sesión para ver URL] file. Current Nmap scan resulted in open ports on 53/tcp domain, 80tcp http and 83tcp http/ looking to achieve an outcome with all ports closed on vulnerability scan. Need firewall script and other tweaks directly applied to the image or as hotfix script.

    $86 (Avg Bid)
    $86 Oferta Promedio
    4 ofertas
    Logo for the brand Finalizado left

    ...global partnership with best of breed Indian and international product vendors to offer their products in pay per use model. Our service offering includes People and Tech vulnerability assessment, Application security testing, Compliance and certification, AI based unified security management and SOC, Identity services, Mobility management services, Ransomware

    $22 (Avg Bid)
    $22 Oferta Promedio
    28 ofertas

    I Downloaded an app which caused major problems for my website. Lost my page 1 google ranking. I need to clean up my Liquid files to ensure there are no errors caused by this app snippets still effecting my website Also I ran this scanner on my homepage - there are these errors i would like fixing. Critical Errors Title check: Tags count: 8 H1-H6

    $225 (Avg Bid)
    $225 Oferta Promedio
    21 ofertas
    Trophy icon Develop Poster from Presentation Content Finalizado left

    ...efficient--slide 7 is a rough example of how this can be combined in theory--please improve upon this design) Step 4: Defining Requirements for Cybersecurity Career (slide 9): Vulnerability Assessment and Mgmt was the occupation selected--the right side shows the actual KSAs for this specific career Step 5: Executing and Monitoring: We want to show that

    $50 (Avg Bid)
    Garantizado
    $50
    6 participaciones

    Hi, I ...warning. I had malware couple weeks ago that was removed and since then adwords worked fine but no it has stopped again. I made a scan with a secuarity plugin that says "Vulnerability found: Twenty Fifteen Theme <= 1.1 - DOM Cross-Site Scripting (XSS)" Anyone that can fix that google adwords starts to work again and dont show any warnings?

    $98 (Avg Bid)
    $98 Oferta Promedio
    20 ofertas

    Hi, I ...warning. I had malware couple weeks ago that was removed and since then adwords worked fine but no it has stopped again. I made a scan with a secuarity plugin that says "Vulnerability found: Twenty Fifteen Theme <= 1.1 - DOM Cross-Site Scripting (XSS)" Anyone that can fix that google adwords starts to work again and dont show any warnings?

    $75 (Avg Bid)
    $75 Oferta Promedio
    16 ofertas

    Hi, I ...warning. I had malware couple weeks ago that was removed and since then adwords worked fine but no it has stopped again. I made a scan with a secuarity plugin that says "Vulnerability found: Twenty Fifteen Theme <= 1.1 - DOM Cross-Site Scripting (XSS)" Anyone that can fix that google adwords starts to work again and dont show any warnings?

    $87 (Avg Bid)
    $87 Oferta Promedio
    37 ofertas

    ...User Acceptance Test (UAT) sessions, briefing and training sessions and a step-by-step guide on the use of the mobile application. c) One-time Penetration Test (PT) and Vulnerability Assessment (VA) scan, and annual PT and quarterly VA scan. d) 1-month support, 7 days a week, after Go Live and subsequent man-day rate for change request. e) Subscription

    $10477 (Avg Bid)
    $10477 Oferta Promedio
    66 ofertas

    Project to do Vulnerability research

    $146 (Avg Bid)
    $146 Oferta Promedio
    14 ofertas

    to modify python file to exploit device that suffers from the buffer overflow vulnerability in the libmodbus library. The vulnerability can be found in the modbus reply function and is exploited by the remote write/read requests. In this function, rsp is a buffer which was defined in the stack. This buffer is used when the server tries to read/write

    $35 (Avg Bid)
    $35 Oferta Promedio
    2 ofertas
    Project for Imam U. Finalizado left

    ...determine how many devices are allowed for each membership type. 4. Developer shall ensure the code is written and installed in a way that does not create a security vulnerability for my website. Developer shall install code and confirm that the change works consistently. Deliverables: 1. File containing code and step-by-step installation instructions.

    $550 (Avg Bid)
    Acuerdo de Confidencialidad
    $550 Oferta Promedio
    1 ofertas
    Need a developer -- 2 Finalizado left

    Want to develop a piece of software that clients can pay for access to operate via web browser or mobile devices. Software would walk clients through all hazards, risk, vulnerability, and threat assessments. For Cyber and Physical Security. Clients would pay via credit card and would set up logins to use it. User management interface to close accounts

    $2159 (Avg Bid)
    $2159 Oferta Promedio
    38 ofertas

    ...that you bid. I need a website which has a homepage in which the user enters a URL of some other website. Then my website should scan the other website, i.e the entered URL for security vulnerabilities and generate a report for the same. namely heyi .. in how much can you provide a website that checks for these Website Fingerprinting version

    $124 (Avg Bid)
    $124 Oferta Promedio
    4 ofertas

    We want to implement the below security for sessions on our website. (Vb.net,ASP.net) User Session Recreation Vulnerability Regenerate session tokens after a period of time, after certain number of requests, prior to any significant transactions. Application should only issue session ID’s of newly generated sessions to users after they have successfully

    $184 (Avg Bid)
    $184 Oferta Promedio
    14 ofertas

    YOU MUST BE FAMILIAR WITH DREAMHOST PANELS. Our server has been hacked, and multiple sites affected. We need the entire server cleaned, the vulnerability identified and removed from the server and all the wordpress websites. All sites, are currently on ONE USERNAME on the Dreamhost Shared Server. We need each site to be to moved onto their own username

    $106 (Avg Bid)
    $106 Oferta Promedio
    19 ofertas

    ...settings only from the specified perimeter. 2. check the hardening and the permissions of the operating system user and the container environment (Linux SE) 3. use of a vulnerability scanner on the IP address of [iniciar sesión para ver URL] 4. checking the malware detection (Watering Hole / HIDS) 5. segmentation of the application according to the DMZ scheme

    min $41 / hr
    Sellado Acuerdo de Confidencialidad
    min $41 / hr
    8 ofertas

    Vulnerability research project

    $106 (Avg Bid)
    $106 Oferta Promedio
    11 ofertas

    ...need you to develop an analytics platform/application using AWS stack - the platform must be highly integrable with other common technologies such as Cisco firewall and vulnerability management solutions such as Qualys and must be able to ingest logs from other cloud platform or enterprises using API. The platform must be highly restricted and secure

    $2956 (Avg Bid)
    $2956 Oferta Promedio
    9 ofertas

    Customer reporting portal Purpose Present customer with vulnerability information about their infrastructure in a delicate and easy user web interface with options for exporting raw data and access governed by roles. Function Some examples of views that shall be available: Pie chart distributing vulnerabilities by severity, critical/high/medium

    $3 / hr (Avg Bid)
    $3 / hr Oferta Promedio
    2 ofertas

    Hi Mudassar, I would like offer a new project, it is about a vulnerability assessment for my website [iniciar sesión para ver URL] before it lauched. We can talk about details by chat. Thanks!

    $25 / hr (Avg Bid)
    $25 / hr Oferta Promedio
    1 ofertas

    Hi freelancers, I have received a messege from my web host saying malicious activity has been detected on our wordpress website. Please see email received below: "Unfortunately, malicious activity has been detected on your account. Such activity can harm the site's visitors, as well as its reputation on search engines and the reputation of the server

    $158 (Avg Bid)
    $158 Oferta Promedio
    26 ofertas

    Customer reporting portal Purpose Present customer with vulnerability information about their infrastructure in a delicate and easy user web interface with options for exporting raw data and access governed by roles. Function Some examples of views that shall be available: Pie chart distributing vulnerabilities by severity, critical/high/medium

    $5 / hr (Avg Bid)
    $5 / hr Oferta Promedio
    5 ofertas
    Need a developer Finalizado left

    Want to develop a piece of software that clients can pay for access to operate via web browser or mobile devices. Software would walk clients through all hazards, risk, vulnerability, and threat assessments. Clients would pay via credit card and would set up logins to use it. User management interface to close accounts or block access needed Storage

    $1671 (Avg Bid)
    $1671 Oferta Promedio
    38 ofertas
    Software Tester Finalizado left

    Me and my team are currently working on a website vulnerability tester and are looking for people to find any bugs in our program. We currently have tested it on Windows 10, but no other operating systems.

    $166 (Avg Bid)
    $166 Oferta Promedio
    8 ofertas

    ...have a Wordpress website which has been quarantined because its was compromised and 'hacks' due to vulnerability in the website software hosted on the account or a weak CMS password. Simply, I want to clean and secure it and back to live again and make sure that issue doesn't happen again in the future You'll work directly on the website server ...

    $36 (Avg Bid)
    $36 Oferta Promedio
    27 ofertas

    Have one word press website, vulnerability report. I need a a 2 page writing on the same. Can some one help ? Should complete in 2 hours.

    $7 / hr (Avg Bid)
    $7 / hr Oferta Promedio
    2 ofertas

    I have two separate issues on my AWS server. 1. The LetsEncrypt SSL certificate always fails to renew, so it throws a security warning when trying to access the website 2. Separately, AWS sent me an email about an abuse issue "The reported activity is the result of what is known as a reflection / amplification denial of service (DoS) attack. What this

    $75 (Avg Bid)
    $75 Oferta Promedio
    10 ofertas
    PHP developer Finalizado left

    Patching PHP software with vulnerability

    $23 (Avg Bid)
    $23 Oferta Promedio
    16 ofertas

    Identify and explain the significance o...family Describe the risk and protective factors in the scenario Supported by research, discuss how the risk factors could impact on parenting capacity and increase the vulnerability of children to risk of harm Outline the concept of resilience, and how this could be supported for each family member Case study:

    $29 (Avg Bid)
    $29 Oferta Promedio
    22 ofertas

    ...original JSON object. Handling of CORS is necessary. All code should be written to current web security standards. (no XSS, no SQL Injection, or any other major known vulnerability). All code should use dependencies that are not known to be vulnerable (no known CVEs et al). This is a work for hire. We appreciate your efforts, but we reserve the right

    $582 (Avg Bid)
    $582 Oferta Promedio
    39 ofertas

    HI , i am building an app and i want to evaluate the security of the features based on...A V Comparatives report of how vulnerable my app will be in comparison to other known security phone apps i need to evaluate the score based on criteria of phone device vulnerability such as microphone access permission can be used for attack on phone for instance

    $125 (Avg Bid)
    $125 Oferta Promedio
    6 ofertas

    ...Speed Score is: 52 Mobile User Experience: Size tap targets appropriately URL Vulnerability: Injecting parameters in path is processed failed URL Vulnerability: www / non-www page redirects are not configured URL Vulnerability: Error page is not accessible URL Vulnerability: Configured wrong Warnings Content check: Content to code ratio: 3% (Recomended

    $257 (Avg Bid)
    $257 Oferta Promedio
    17 ofertas

    I need a brochure (in english and french) for my cyber security company. Company name: Elliptic Cyber website: [iniciar sesión para ver URL] email: contact@[iniciar sesión para ver URL] Phone: xxxxxxxxxxx Slogan: "Your Digital Shield" (english) "Votre bouclier numerique" (french) Attached is the logo .......................Content ...

    $40 (Avg Bid)
    Urgente Garantizado
    $40
    53 participaciones
    Trophy icon designe a logo and make flyers Finalizado left

    I need a logo for my cyber security company and a flyer that will outline our services. The name of the company is elliptic Cyber ("Votre assurance en ligne") Website: [iniciar sesión para ver URL] Who we are! Elliptic Security is an experienced and talented team of cyber security professionals whose primary mission is to provide our clients with

    $60 (Avg Bid)
    Urgente Garantizado
    $60
    232 participaciones

    ...recipients who share the folder. *Script must remain secure. Basically a script or tool inside Google apps (GSuite) that does not expose it to any outside third party vulnerability, of course, but does the following: Allows us to enable/disable Google Drive folder/file change notifications. So if a file is created, added or changed in a particular

    $110 (Avg Bid)
    $110 Oferta Promedio
    6 ofertas