Completed

23 Ethical Hacking Guides!

Hello Ethical Hackers!

I will need a full guide for eachone of all these below I can give up to $15-$20 for each one 4-5 pages each with examples or screenshots so I can create a complete guide for all of these with average $400 USD and cretew a quality guide. Specifically:

if interested select one (1) of the following until July 18:

1. Convert [login to view URL] to use the patator instead of medusa ([login to view URL])

2. Develop a manual/guide of ncrack and basic use of the patator. Compare them and give examples of how to use them.

[login to view URL] [login to view URL]

3. Develop a report describing what netbios is and how the attacker to a windows domain can exploit it . Give examples with specific tools.

4. Develop a report that describes what kerberos authentication is in a windows domain.

5. Develop a report that explains which the extra security features are in windows 10, specifically Credential guard and how we can apply them using powershell.

6. Develop a report that explains which additional security features are in Windows 10, specifically Windows Defender Advanced Threat Protection, and how to use them with powershell.

[login to view URL] a report that states which additional security features are in windows 10, specifically Windows Defender Application Guard, how can we apply them using powershell.

8. Develop a metasploit basic use / operation guide and refer to the key modules available for metasploit.

9. Develop a guide/manual to implement the following end-user attack technique: [login to view URL]

10. Develop a basic use guide for the empire. ([login to view URL])

11. Develop a guide listing specific examples of whitelisting bypass techniques: [login to view URL]

[login to view URL] a task that describes what the Server Message Block (SMB) is and how it can be exploited by the attacker in a windows domain. Give examples with specific tools.

[login to view URL] a task that describes what Kerberoasting is and how it can be exploited by the attacker in a windows domain ([login to view URL]). Give examples with specific tools.

[login to view URL] up a guide to using nmap and in particular the nmap scripting language. Give examples of how to develop scripting modules.

[login to view URL] a task that describes what Pass the Hash is and how the attacker can exploit it in a windows domain ([login to view URL]). Give examples with specific tools.

[login to view URL] out what is Pass the Ticket and how it can be exploited by the attacker in a windows domain ([login to view URL]). Give examples with specific tools.

17. Develop a manual for the use of koadic ([login to view URL]).

18. Develop a pupy user guide ([login to view URL]).

19. Elaborate a task that describes what NTLM v2 Authentication is and how it can be exploited by the attacker in a windows domain. Give examples with specific tools.

20. Install, test, and develop a ReelPhish user guide:

[login to view URL]

[login to view URL]

21. Develop a MailSniper User Guide and give examples of how to use [login to view URL]

22. Develop a Throwback User Guide and give examples of how to use [login to view URL]

23. Develop a user guide for the responder and give examples of how to use [login to view URL]

If any of the above issues is good for me, I will wait for updates.

Thanks.

Compétences : Python, Rédaction Technique

en voir plus : ethical hacking argentina, ethical hacking none, ethical hacking course faridabad, the complete ethical hacking course for 2016/2017!, the complete ethical hacking course: beginner to advanced! free, ethical hacking course free, the complete ethical hacking course for 2016/2017! download, the complete ethical hacking course beginner to advanced pdf, udemy ethical hacking, ethical hacking for beginners pdf, the complete ethical hacking course beginner to advanced kickass, projects ethical hacking, freelance ethical hacking projects, ethical hacking jobs freelance, decoder message bypass, white hat ethical hacking, penetration test ethical hacking experience, ethical hacking certified pune, ethical hacking projects, freelance ethical hacking

Concernant l'employeur :
( 113 commentaires ) Thessaloniki, Kalamaria, Greece

Nº du projet : #17329931

Décerné à:

Mjawadi

Hi, Do you accept collecting guides and copy/paste ? Thank you ....................................

%selectedBids___i_sum_sub_4% %project_currencyDetails_sign_sub_5% USD en 1 jour
(0 Commentaires)
0.0

6 freelance font une offre moyenne de $128 pour ce travail

wairimundirangu4

I am a professional writer with 4 years experience in writing.I hold a Masters in Business Administration (MBA) and Medicine, I have wide knowledge in search engine optimization.I have experience in Rewriting and writ Plus

%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(2 Commentaires)
1.8
Mathenam

"Hello, Reports rely on reliability, efficiency, and concise, quality writing. I pride myself on research toward accurate communication of information. My experience in this field has molded my investigative eye, and Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 7 jours
(0 Commentaires)
0.0
sysadmsp

Hello sir I can make documentation for all the things you've mentioned I've been working with security for more then 3 years Thanks

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 4 jours
(0 Commentaires)
0.0
moharemm

Dear; My Name is Reda, I actually work as System Administrator in a SOC (Security Operation Center). I worked as Information Security Analyst in the SOC, the use of most of the mentioned tools was part of my dail Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 4 jours
(0 Commentaires)
0.0
captainratnesh

Hello, I have done the similar projects before about technical [login to view URL] me so that i can show samples from my previous work

%bids___i_sum_sub_32% %project_currencyDetails_sign_sub_33% USD en 1 jour
(0 Commentaires)
0.0