Penetration Testing Jobs

34 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Intermediate ($$) - Est. Budget: $25 - Posted
We have an email account that is hosted on google apps for work. We would like to pentest this email address i.e. get access to the email by phishing or using any other means, enable pop3/imap and download all the sent and received emails along with any attachments using an email client. The emails are then exported and saved in a file. Copy of downloaded emails are to be left untouched.
Skills: Penetration Testing Internet Security Network Security
Fixed-Price - Intermediate ($$) - Est. Budget: $250 - Posted
Background : a normal proxy requires the computer running the proxy to have it's ports open and forwarded. I need proxy that does not need the Remote Computer to perform Port forwarding and instead it will be my computer which will need the ports forwarded and open, hence why its called a reverse proxy. you can read more about reverse proxies here http://backproxy.blogspot.ca/ Functionally: the program will be divided by two : Server side & Client side. 1.Server side: the server side will run on my computer and will include a listener option to listen on incoming connections. it will have 2 options : Start, Build. 1.2)Start - the start option will let me configure a port number, and start a listener on that port 1.3)Build- the build option will configure the client side (proxy.exe). it will have the option to input my public IP ( for the listener to listen on) and port. after pressing ' build' it will produce an FUD executing file (proxy.exe) to the Proxy folder. 2)Client Side : the client Side is basically the executing file that came from the server builder - its the proxy.exe It needs to run on any windows system, open a connection to my public IP, and connect to the server which is listening on that IP:Port, according to the configurations on 1.3 in the end, i need to be able to surf the web from an other Public IP. add over skype : rick.fridman
Skills: Penetration Testing C C# C++
Hourly - Expert ($$$) - Est. Time: Less than 1 week, 10-30 hrs/week - Posted
I am looking to weaponize and add shellcode to MS12-020 PoC code. Please let me know your experience, budget and timeline to complete. The code should be written as a metasploit module in Ruby, or in Python. Thank you! For more information, please see... https://www.exploit-db.com/exploits/18606/ https://pentestlab.wordpress.com/2012/03/26/microsoft-rdp-vulnerability-poc/ http://pastebin.com/G99npvDy
Skills: Penetration Testing Information Security Vulnerability assessment
Hourly - Expert ($$$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
I am looking to find a highly skilled programmer / penetration tester to join my company. I am focused on paid advertising as an affiliate and drive a lot of traffic to different offers throughout various GEOs. This is a very interesting and lucrative market if this is something of interest send me a message
Skills: Penetration Testing Internet Marketing JavaScript Malware
Hourly - Expert ($$$) - Est. Time: More than 6 months, Less than 10 hrs/week - Posted
Looking for a report (monthly if goes well) regarding our business showing any online or physical threats that may impact our work. Password dumps with our domain, deep web searches, darknet searches, only information that impacts our company should be provided. Do not ask me what information should be collected, I am looking for an expert to tell me what is important and why. Only serious bids will be reviewed.
Skills: Penetration Testing Internet Security Research
Fixed-Price - Intermediate ($$) - Est. Budget: $100 - Posted
We have three financial web applications and we would like to conduct vulnerability and other security related testing and get a report. Please let us know what tools are used, time it will take to conduct the test and the fixed cost.
Skills: Penetration Testing Vulnerability assessment