Closed

small project in security

we will use a deliberately vulnerable Linux image called “Metasploitable 2”. The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. You can use VMWare to run the image.

Each group must select one vulnerability and exploit it. To exploit, you are expected to perform the necessary hacking activities (scanning, identifying vulnerabilities … etc.).

In order to perform the exploit, you will need an “attack” image. You can use “Kali Linux” as your attack machine. Kali Linux comes with all the tools that you would need to exploit the many vulnerabilities that exist in Metasploitable 2. Other resources can be used too. Examples include BeEF (Browser Exploitation Framework) for launching attacks against web browsers.

Skills: Computer Security, Internet Security, Linux, Ubuntu, Web Security

See more: network security mini projects, security projects for students, cyber security projects for college students, web security projects, information security projects with source code, cyber security projects for beginners, projects based on cyber security, network security projects with source code, small project language, small project management, small project ideas programming, small project freelance, fulltime offline data entry small project fulltime chennai, small project network security, migrate small project from aspnet to mvc, mimigrate small project from aspnet to mvc, how to hire a freelance programmer for small project, where to find software engineers for small project, The project is about understand user questions and generate a query for SQL in order to get answers., how to manage a small project

About the Employer:
( 1 review ) Riyadh, Saudi Arabia

Project ID: #19168379

12 freelancers are bidding on average $84 for this job

rozeny2k

Hi. I am an experienced penetration tester and technical writer with an MS in Computer Science and Engineering. I am expert in Kali/Backtrack, RHEL, Ubuntu and several other Linux distribution. I am also expert in pene More

$150 USD in 2 days
(146 Reviews)
7.2
AhmadSameer

Hello there, I have been in the InfoSec for years. I had conducted tons of security related projects using Metasploitable and Kali. I'm downloading the attached file to check. Regards.

$250 USD in 2 days
(52 Reviews)
5.4
ciscoterminal

Dear Sir, i am CCIE Security and CHFI with 17 years of cyber security experience. i will do your project and attack vm image as per your requirements. we can discuss further over chat. thanks for reading

$200 USD in 1 day
(38 Reviews)
5.0
vaptsolutions

Have 5+ years of experience in both black box and white box testing penetration testing. Perform VAPT(Vulnerability and penetration testing) services like Web-Application penetration testing; System Application penetra More

$55 USD in 2 days
(5 Reviews)
3.9
niladri1991

Hi , I am a MSc student at University College Dublin int he field of Digital investigation and forensic computing. I have my own forensic kit, in most cases I use Kali Linux. I have a complete running setup with Metas More

$30 USD in 1 day
(1 Review)
2.3
xupiter2012

Hi Fahad, It sounds like an interesting challenge and very good fit. I have great experience with cyber security, forensic and especially with Kali Linux, so it will be done in a very professional way. Let me kno More

$150 USD in 3 days
(3 Reviews)
2.2
armanmohammad

just reviewed your requirement, I am Ethical Hacker & Kali Linux My Play Ground. I can do this job without any issue. If You interested for Discussion Then inbox me. Best Regards

$30 USD in 1 day
(0 Reviews)
0.0
gonzalogarciale

Hi, I've exploited Metasploitable 2 many times, as I'm a CTF player (with ID-10-T team). I can help you with this task and make a cool and professional report. Also I have +6 years of experience on penetration testing More

$55 USD in 1 day
(0 Reviews)
0.0
naeyna

perform the necessary hacking activities (scanning, identifying vulnerabilities … etc.). In order to perform the exploit, you will need an “attack” image. You can use “Kali Linux” as your attack machine. Kali Linux More

$20 USD in 3 days
(0 Reviews)
0.0
vimaladevi58

Hi I have 3.6 years of experience in pen testing , I can complete with in the SLA Tim

$25 USD in 1 day
(0 Reviews)
0.0
secnetwork12

Hello, I 'm a Network Security Engineer and also certified cisco ccna routing & switching and ccna security .

$15 USD in 2 days
(0 Reviews)
0.0
piyushbca7

Certified Ethical Hacker. Have exploited Metasploitable 2.0 many times before using Kali Linux. May be we can directly proceed with the project after discussing the same. Let me know, if wanna discuss the same More

$25 USD in 1 day
(0 Reviews)
0.0