Banner Image

Skills

  • Server Administration
  • Software Development
  • Web Development
  • Administrative Assistant
  • Analytics
  • App Development
  • Backup
  • Bash
  • CentOS
  • Cloud Computing
  • Concept Development
  • Customer Satisfaction
  • Email Services
  • FreeBSD
  • Google

Sign up or Log in to see more.

Services

  • Network security, cloud ,server admin

    $10/hr Starting at $50 Ongoing

    Dedicated Resource

    Professional Penetration Tester, Security Consultant Assessment of susceptibility to Cross Site Scripting, SQL Injection and Buffer Overflow Vulnerabilities inline with the OWASP framework. In line with...

    AnalyticsApp DevelopmentCloud ComputingConcept DevelopmentEmail Services
  • server & db adminstrator

    $10/hr Starting at $50 Ongoing

    Dedicated Resource

    System administrator. 5 years of experience. OS: I have 10 years of Experience as a Linux System Administrator. High level of expertise in Windows system administration. Strong knowledge of Linux systems...

    Administrative AssistantBackupBashCentOSCustomer Satisfaction

About

Professional Penetration Tester, Security Consultant Motivated and experienced technical and organisationalasa leader with 8 years of experience in government and the private sector

Strong communication, mentoring, and decision-making skills
- Recognized for implementing policy and process backed by technical credibility
- Certified penetration tester and ethical hacker; knowledgeable in numerous cyber security and information technology tools/protocols including but not limited to Snort, Wireshark, Nessus, Nmap, and others

Web Application/Network/Mobile Penetration Testing
Wordpress/Joomla Security and Malware Analysis/Removal
Ethical Hacking
Security Consulting
iPhone/Android/Blackberry/J2ME Mobile Security Testing
Security Code Review (.NET, JAVA, PHP)
Vulnerability Assessment of Network Devices/Databases/Web Server/Application Server
Wireless Security


Website/server infected with MALWARES or HACKED removal
-
Web Server Security

Assessment of susceptibility to Cross Site Scripting, SQL Injection and Buffer Overflow Vulnerabilities inline with the OWASP framework. In line with a strict code of conduct, and the rules of engagement agreed upfront with yourself, I will simulate the actions of a malicious and determined hacker. Using a proven methodology I will asses your web app for the above vulnerabilities as well as those laid out in the OWASP top 10 2017.

Fully knowledge of CWE top 25 most dangerous software errors on application's.
Provide full secure with easy concepts & able to understand everyone.

Tools using -- NMAP, Burpsuite, Nessus, Wireshark, Acunetix,W3af, xsser, nmap,nikto,grabber,matalsploit attacks, website redirecting

The output of this assessment will provide you with a peer review report highlighting the following;

1. Discovered Vulnerabilities
2. Explanation of discovery and exploit path
3. Remediation actions
4. Security best practice
5. Technical References

1. Open Source Analysis / Footprinting

Conduct reconnaissance using open source information. Analysis of Google entries, relevant websites and available metadata in order to enumerate Usernames, Staff Email Addresses and company IP's which can be used.

Work Terms

My project delivery will be ontime and grab heart of my client through my work.