
Đã đóng
Đã đăng vào
Thanh toán khi bàn giao
Busco a un profesional en seguridad ofensiva que realice pruebas de penetración completas y controladas sobre mis activos. El objetivo principal es identificar vulnerabilidades reales, demostrar su explotación y proporcionarme un informe claro con las acciones de remediación prioritarias. Alcance general • Ejecución de pruebas de caja negra y/o caja gris según sea necesario. • Uso de herramientas estándar como Nmap, Nessus, Metasploit, Burp Suite y OWASP ZAP, complementadas con técnicas manuales. • Documentación paso a paso de cada hallazgo con evidencia (capturas, logs, PoC). • Reunión de cierre para repasar riesgos, impacto y recomendaciones concretas. Entregables mínimos 1. Informe técnico detallado (PDF) con todas las vulnerabilidades clasificadas por criticidad. 2. Resumen ejecutivo dirigido a la gerencia. 3. Guía de corrección inmediata y buenas prácticas para fortalecer el entorno. Los sistemas exactos a evaluar los concretaremos juntos; estoy abierto a incluir red interna, aplicaciones web o móviles según tu propuesta. Necesito confidencialidad estricta y respeto por las ventanas de prueba acordadas. Si cuentas con certificaciones como OSCP u OSCE, menciónalas en tu propuesta.
Mã dự án: 40317699
7 đề xuất
Dự án từ xa
Hoạt động 23 ngày trước
Thiết lập ngân sách và thời gian
Nhận thanh toán cho công việc
Phác thảo đề xuất của bạn
Miễn phí đăng ký và cháo giá cho công việc
7 freelancer chào giá trung bình $13.571 USD cho công việc này

We at Offensium Vault Private Limited (ISO 27001:2022 & ISO 9001:2015) can perform a comprehensive penetration test across your assets with a strong focus on real-world exploitability and actionable remediation. Approach • Black-box and gray-box testing based on agreed scope • Aligned with OWASP, PTES, and industry best practices • Tools: Nmap, Nessus, Burp Suite, Metasploit, OWASP ZAP + manual techniques • Coverage can include web apps, APIs, networks, and mobile environments. Testing Focus • Vulnerability identification and controlled exploitation validation • Authentication, authorization, and business logic flaws • Misconfigurations, exposed services, and privilege escalation risks • Step-by-step documentation with screenshots, logs, and PoC evidence Deliverables • Executive summary for management • Detailed technical report (PDF) with severity classification (CVSS) • Reproducible steps and PoC evidence • Prioritized remediation guidance and best practices • Debrief session to walk through findings We ensure strict confidentiality, non-disruptive testing, and adherence to agreed timelines. Our team has experience across web, mobile, and network security assessments, and we can start immediately once scope is finalized.
$10.000 USD trong 7 ngày
3,6
3,6

As an CEH v13-certified and globally recognized penetration tester with 7+ years' experience, I am the expert you need to secure your assets effectively. Over my career, I have honed my skills by delivering thorough red teaming exercises that include both black and grey box methodologies. Additionally, I leverage tools like Nmap, Nessus, Metasploit, and more to complement my manual techniques for a comprehensive evaluation. Central to my process is documenting each finding meticulously with well-supported evidence including logs, captures, and proof-of-concept implementations, ensuring clarity and easy reference. I guarantee the delivery of a detailed technical report on prioritized vulnerabilities as well as an executive summary tailor-made for management comprehension - in line with your minimum deliverables. In choosing me for this project, you'll be benefiting from a seasoned professional who follows strict protocols while ensuring absolute confidentiality and respecting agreed-upon testing windows. My proficiency in core methodologies such as OWASP Top 10, PTES, MITRE ATT&CK, OSSTMM equips me to provide you with robust remediation strategies, strengthening your overall security stance. Let's move forward with creating a safe digital environment together!
$10.000 USD trong 30 ngày
3,2
3,2

As we delve into the world of digital security, my experience in technical documentation will be a valuable asset. I have a solid background in translating complex technological concepts into layman's terms, which is crucial when crafting detailed reports for such projects as yours. I understand that not everyone on your team may possess an in-depth knowledge of cybersecurity, and it's paramount that they have a clear understanding of our findings. My ample experience includes working with SaaS platforms and cybersecurity companies, empowering me to deliver precise reports tailored for different stakeholders. In addition to my documentation skills, my organizational capabilities will ensure an efficient testing process with minimal disruption to your operations. I respect and value confidentiality, assuring you complete discretion throughout the project. My work management history involves balancing multiple tasks while maintaining high-quality results and adhering to strict timelines—a skill that aligns well with your need for well-defined testing windows.
$15.000 USD trong 7 ngày
0,0
0,0

⭐⭐⭐⭐⭐ As a security expert with a proven track record in penetration testing, I am confident that my skill-set aligns perfectly with your project requirements. I leverage comprehensive techniques, including black-box and grey-box testing, while utilizing industry-standard tools such as Nmap, Nessus, Metasploit, Burp Suite, and OWASP ZAP. My approach is always well-documented, ensuring transparency and a detailed analysis of every vulnerability found with step-by-step evidence. Throughout my 18-year-long successful career, I have gained significant experience in not just identifying vulnerabilities but also clearly communicating the risks they pose to businesses. Your minimum deliverables align precisely with my professional strengths: delivering precise technical reports, actionable executive summaries and providing immediate remediation steps as well as best practices to bolster your system's security. Furthermore, your call for strict confidentiality and respect for agreed-upon testing windows is fully recognized. As an OSCP-certified professional, I adhere to the highest ethics of the profession. So let's collaborate on this project for thorough vulnerability identification and strategic protection against potential threats - I'll be your most reliable partner on this journey!
$15.000 USD trong 7 ngày
0,0
0,0

Trabajo para una empresa de seguridad ofensiva con sede en Florida con millones de consultas. También he tenido la oportunidad de trabajar con grandes empresas en España antes, así que tengo excelentes referencias. La evasión de EDRs modernos ha dejado atrás la ofuscación básica; hoy en día, hacen llamadas directas al sistema y técnicas de unhooking dinámico en memoria para eludir las defensas. Si solo confías en escaneos automatizados, estás dejando la puerta abierta a estas explotaciones indetectables. Organicemos una reunión o un chat. Saludos
$20.000 USD trong 63 ngày
0,0
0,0

HOLA, HEMOS TRABAJADO EN PROYECTOS SIMILARES Y PODEMOS PROPORCIONAR EJEMPLOS. Entendemos que esto requiere más que simples escaneos automatizados: usted necesita pruebas controladas y en entornos reales que identifiquen riesgos genuinos y demuestren su explotabilidad. Con más de 10 años de experiencia en pruebas de seguridad y auditoría de sistemas, combinamos herramientas como Nmap, Burp Suite, Metasploit y OWASP ZAP con técnicas de prueba manuales para descubrir vulnerabilidades más profundas a través de las capas web, de red y de aplicaciones. Nuestro enfoque se centra en la claridad y el impacto: no nos limitamos a enumerar problemas, sino que mostramos cómo pueden ser explotados y cómo solucionarlos de manera efectiva. Asimismo, garantizamos una estricta confidencialidad, ventanas de prueba controladas y una mínima interrupción en sus sistemas. Flujo de trabajo: Definición del alcance → Finalizar objetivos, nivel de acceso (caja negra/gris) y ventana de pruebas. Reconocimiento y escaneo → Uso de herramientas + técnicas manuales para identificar la superficie de ataque. Explotación → Validar vulnerabilidades mediante Pruebas de Concepto (PoC) seguras y evidencias. Elaboración de informes → Documentar los hallazgos, incluyendo severidad, impacto y pasos para la remediación. Sesión de revisión → Analizar en detalle los riesgos, las prioridades y las mejoras de seguridad. Recibirá un informe técnico detallado, un resumen ejecutivo y una guía práctica de remediación para
$10.000 USD trong 10 ngày
0,0
0,0

Santo Domingo, Dominican Republic
Thành viên từ thg 3 22, 2026
$250-750 USD
$30-250 USD
₹100-300 INR/ giờ
₹12500-37500 INR
₹37500-75000 INR
₹1500-12500 INR
€8-30 EUR
$30-250 USD
$500-2000 USD
$15-25 AUD/ giờ
$10000-20000 USD
€250-750 EUR
₹750-1250 INR/ giờ
$10-30 USD
₹1500-12500 INR
€250-750 EUR
$30-250 USD
€8-1200 EUR
$30-250 USD
$5000-10000 USD