Wrt54gl wireshark jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,365 wrt54gl wireshark jobs found, pricing in USD

    ...requirements: - Implement DTLS in C: The primary goal of this project is to introduce DTLS to an existing system for secure communication. - Tight deadline: This project needs to be completed within two weeks. Timeliness and reliability are crucial. I need the data coming from the server to the client over UDP socket to be encrypted with DTLS, and it should appear as DTLS in the protocol section of Wireshark. In addition, the code should be able to handle streaming video or live feed over the socket accordingly. This code should work in linux and windows. Ideal Skills and Experience: - Proficiency in C: Extensive experience with C language is a must. - DTLS Knowledge: Prior experience implementing DTLS is highly preferred. - Security Background: Strong understanding of encrypt...

    $435 (Avg Bid)
    $435 Avg Bid
    11 bids

    I'm aiming to create a beginner-level educational website focusing on the AWS EC2 service. This is an individual project with an objective to learn and teach AWS technologies. Key tasks are: 1. Webs...Development: - Build an informative and user-friendly website. - Experience in educational website creation is preferred. 2. AWS EC2 Teaching Material: - Develop easy-to-understand content covering basic AWS EC2 topics. - Hands-on AWS experience is necessary, especially with the EC2 service. 3. Log Capture & Processing: - Configure logs to be captured in Wireshark, processed in Splunk. - Experience in Wireshark and Splunk would be beneficial. Freelancers with a teaching background in technology, AWS expertise, and experience in log management will ...

    $76 (Avg Bid)
    $76 Avg Bid
    8 bids

    ...needs to be capable of conducting precise user authentication using usernames and passwords over the network. I also expect the system to integrate Wireshark or a similar tool to capture network traffic effectively. Key Responsibilities: - Designing and implementing a network application with advanced security features - Ensuring the integrity of user identification through username/password inputs - Using Wireshark to deliver comprehensive network traffic capture Ideal Skills: - Proficiency in Networks and Security, especially with the use of Sockets API - Practical experience in application/network development - Good understanding of Wireshark or similar network traffic analysis tools The captured network traffic will be used to: - Gauge the performance of ...

    $96 (Avg Bid)
    $96 Avg Bid
    1 bids

    ...requirements: - Implement DTLS in C: The primary goal of this project is to introduce DTLS to an existing system for secure communication. - Tight deadline: This project needs to be completed within two weeks. Timeliness and reliability are crucial. I need the data coming from the server to the client over UDP socket to be encrypted with DTLS, and it should appear as DTLS in the protocol section of Wireshark. In addition, the code should be able to handle streaming video or live feed over the socket accordingly. This code should work in linux and windows. Ideal Skills and Experience: - Proficiency in C: Extensive experience with C language is a must. - DTLS Knowledge: Prior experience implementing DTLS is highly preferred. - Security Background: Strong understanding of encrypt...

    $520 (Avg Bid)
    $520 Avg Bid
    8 bids

    I'm seeking an experienced cellular engineer with strong expertise in smartphone field testing. You should have significant understanding of the intricate complexities of 3G/4G/5G technologies. Key Expectations: - Carry out testing on hardware, software, and the network. - Have practical experience with smartphones and smartwatches. - Be proficient with logging tools including QxDM, QCAT, Wireshark, STT, ELT, etc. - Capable of performing daily testing and providing a concise report to myself concerning the results. Specifically, I am interested in evaluating: - Battery performance - Camera quality - Understanding of GNSS/GPS technical concepts. This is considered a significant advantage. Your excellent interpersonal relationships and proven written/verbal communication sk...

    $100 (Avg Bid)
    $100 Avg Bid
    4 bids

    ...in-depth Android application security assessment. Skills in the following areas are required: Static Application Analysis: Understanding of tools like PEView, Dependency Walker (for analyzing dependencies in a Windows environment), APKTool, Androguard, or similar. Dynamic Application Analysis: Experience with tools like Process Explorer/Monitor (for analyzing processes in a Windows environment), Wireshark, or comparable tools. Code Analysis & Reverse Engineering: Proficiency in Ghidra, SMALI/BAKSMALI, dex2jar, and similar disassemblers/decompilers for Android code. Key Requirements: Proficiency in Volatility, APKTool, and Ghidra Intermediate level of experience in Android application security assessment. Ideal Skills and Experience: Demonstrated experience in Android appl...

    $221 (Avg Bid)
    $221 Avg Bid
    7 bids

    ...conducting network analysis and troubleshooting, as well as port scanning and service enumeration on my local network using Netcat and Wireshark. As a part of this project, I expect the freelancer to: - Conduct a thorough analysis of my network using Netcat and Wireshark - Implement solutions for any network troubleshooting issues identified - Perform a comprehensive port scan and service enumeration on my network - Provide recommendations for improving network security based on the findings - Ensure no sensitive data is exposed in the process Ideal candidates for this project should have: - Proficiency in using network analysis tools such as Netcat and Wireshark - Strong experience in network security testing and vulnerability assessment - Excellent troubleshooti...

    $177 (Avg Bid)
    $177 Avg Bid
    20 bids

    ...Skills: Hands-on experience with Security Information and Event Management (SIEM) tools. Proficiency in Python, Linux, and SQL. Knowledge of CIA Triad, governance, risk analysis, compliance, and business continuity planning. Familiarity with Linux and Windows server configuration, Active Directory, network architecture, operations, and security. Experience in areas such as Wireshark, email security, wireless security, cryptography, port scanning, cloud security, and virtualization. Proficiency with tools like Splunk, Burp Suite, Metasploit, Zenmap, etc. Certification experience in Security+ and CEH. Additional Assets: Knowledge and experience with Google Cloud Platform. Responsibilities: Setting realistic schedules, deadlin...

    $11 - $18 / hr
    Featured Sealed
    $11 - $18 / hr
    9 bids

    ...characteristics consisting of 9 hosts, 3 switches, and a controller. where a trio of hosts are connected to each switch and the three switches are connected to the controller. must be done in virtual box, S.O. ubuntu, using mininet, openflow, opendaylight controller. at the end you should use wireshark tool to see latency, bandwidth, delay, bitstream and network transfer rate and do ping between different hosts Every step that involves the creation of the network, use of controller, wireshark, be recorded minimum quality 1080p hd (You can do it in a single video in general or several, the important thing is to see each step) And specify which versions were used for each software tool Key Skills: - Experience with network engineering and SDN The timeline for this...

    $124 (Avg Bid)
    $124 Avg Bid
    83 bids

    I need a skilled network analyst who can examine an ARP request and reply...ARP request and reply message within my network. The purpose of this project is network troubleshooting. - Use Wireshark - Focus on personal computers - Generate a report outlining patterns or oddities - You should be knowledgeable about detecting intrusion, maintaining network security, and problem-solving in complex network environments. Experience with the Wireshark tool is essential. Your goal is to give a clear snapshot of the situation with the ARP request and reply messages. Here are the deliverables: - ARP request and reply messages log - A detailed report about these ARP messages and potential problems Please, only bid if you have a concrete understanding of Wireshark Network An...

    $33 (Avg Bid)
    $33 Avg Bid
    5 bids

    I am looking for an expert in Yeastar p560 VoIP systems to implement a solution for a trunk to trunk call forwarding inclusive of ...implement a solution for a trunk to trunk call forwarding inclusive of Direct Inward Dialing (DIDs). The task is troubleshooting headers, the trunks / solution is already setup. The key functionality includes: - Trunk to trunk hand off with headers (in and out) - Forwarding calls over VoIP Your expertise should span the configuration of VoIP systems for diverse and specific users. Knowledge of wireshark and pcap analysis, understanding of SIP headers. With your understanding of my needs, you'll enable seamless communication within my organization. Prior experience in similar setups is a necessity. Your bid will be a value-add to the success o...

    $96 (Avg Bid)
    Urgent
    $96 Avg Bid
    10 bids

    ... specifically for Windows and Linux platforms - Working on Jupyter, a malware variant associated with the SolarMaker family. - Proven track record in both static and dynamic malware analysis - Ability to work under tight schedules - Excellent problem-solving and analytical skills - Sound understanding of malware techniques and exploits - Familiarity with tools such as IDA Pro, Ghidra, and Wireshark - Detailed malware analysis - Code Analysis of the malware Responsibilities: - Conduct comprehensive static and dynamic malware analysis - Provide actionable insights and detection strategies - Clearly document findings for technical and non-technical audience If you believe you're equipped for this critical task, I'd be more than excited to see your proposal. Please g...

    $445 (Avg Bid)
    $445 Avg Bid
    16 bids

    I'm seeking professional assistance with network traffic analysis. The task includes conducting analysis to provide a concise overview of total data usage. The ideal candidate will be proficient with Wireshark and possess a comprehensive understanding of network security. Key Tasks: - Analyze network traffic - Report on total data usage Desired Skills: - Proficiency in Wireshark - Strong understanding of network security - Excellent report writing skills.

    $116 (Avg Bid)
    $116 Avg Bid
    34 bids

    I am at the beginner level in using QXDM and Wireshark. I am aiming to learn more about Protocol Analysis and Troubleshooting. I would like to focus on the 5G and LTE wireless technologies and protocols during my training. Ideal skills: - Strong understanding of QXDM and Wireshark - Ability to teach protocol analysis and troubleshooting - Deep knowledge of 5G and LTE technologies Experience: - At least 3 years' experience in using and teaching QXDM and Wireshark - Comprehensive knowledge of 5G and LTE protocols - Background in mentorship or training would be favorable.

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    2 bids

    I am planning to configure a Windows PC equipped with Wireshark, which will be connected to the network via Wi-Fi. The purpose is to conduct a comprehensive network assessment. For this assessment, I require a continuous monitoring period of 48 hours. During this time, Wireshark will capture and log all network traffic, including packets transmitted and received. Following the 48-hour monitoring period, I will perform an in-depth analysis of the captured data. This analysis will involve examining the network traffic to identify patterns, anomalies, and potential security threats. Each device connected to the network will undergo thorough scrutiny to understand its communication patterns, bandwidth usage, and any potential issues. The detailed network evaluation will include...

    $22 (Avg Bid)
    $22 Avg Bid
    3 bids

    ... specifically for Windows and Linux platforms - Working on Jupyter, a malware variant associated with the SolarMaker family. - Proven track record in both static and dynamic malware analysis - Ability to work under tight schedules - Excellent problem-solving and analytical skills - Sound understanding of malware techniques and exploits - Familiarity with tools such as IDA Pro, Ghidra, and Wireshark - Detailed malware analysis - Code Analysis of the malware Responsibilities: - Conduct comprehensive static and dynamic malware analysis - Provide actionable insights and detection strategies - Clearly document findings for technical and non-technical audience If you believe you're equipped for this critical task, I'd be more than excited to see your proposal. Please g...

    $354 (Avg Bid)
    $354 Avg Bid
    6 bids

    ...developer to create an advanced C# streaming app that will facilitate real-time capture of video streams. Key Attributes Required: - Versed in C# language and have experience in app development that involves real-time video monitoring. - Proven experience in implementing streaming protocols, specifically HTTP Live Streaming (HLS). - Professional understanding of stream monitoring tools, similar to Wireshark, is essential. - Prevoen experience websocket development. The Project Scope: - Develop an application capable of real-time capture of video streams, thus raw data monitoring. - The application should provide comprehensive protocol analysis capabilities. - Specifically, the application should support the HLS protocol directly targeting video streams. - The developed system...

    $459 (Avg Bid)
    $459 Avg Bid
    42 bids

    Need a cyber security specialist to decrypt an AES-CTR encryption for a CTF flag. provided information : pcapng file for wireshark and the encryption method written in python

    $24 (Avg Bid)
    $24 Avg Bid
    6 bids

    ...from scratch. • Perform Internal and external penetration tests against systems to identify vulnerabilities. • Collaborate with the application development teams and develop test cases, which can check the security of applications, databases and authentication mechanisms. • Experience using a wide variety of security tools to include Kali-Linux, Checkmarx CxSAST, CxIAST, Burp Suite Pro, Wireshark, Nmap, Nessus, Metasploit, and Nexpose. • Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications. &bul...

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    29 bids

    I am in need of a system that can command a PTZ camera to perform a horizontal rotation every 30 seconds. The specifications for the project are: - The main purpose of sending the signal is to control the movement of the camera. - Upon receiving the signal, the PTZ camera should go to a specified Preset. At present, I have to log...present, I have to log into a camera, choose Preset 1, and Execute. A command is then sent to the camera via the browser and the camera moves to that position. Same if I create another Preset 2, and the camera will move. i would like an webpage that I can put the camera IP Address, Username, password and the presets, and it automatically sends the command every 30 seconds. At present, you can use wireshark or something similar to see what is sent to t...

    $150 (Avg Bid)
    $150 Avg Bid
    20 bids

    Implementation of live game cancellation function

    $469 (Avg Bid)
    $469 Avg Bid
    30 bids

    ONSITE ONLY in NJ USA We are a small IT company that is currently look...networks small to medium size - Exceptional problem-solving and analytical abilities The network in question is of medium complexity. Thus, the ideal candidate should have: - Understanding of networks, domains, comms and internal/external testing - Ability to identify and resolve network security vulnerabilities within this setup - Expertise in Pen testing tools such as: Kali Linux, Burp Suite, Wireshark, John the Ripper, Hashcat, Nmap & Invicti Your role is to ensure our network is as secure as possible and to suggest improvements where necessary. Provide all technical information and data used to report the overall security of a customer and actions for remediation. Looking forward to productive c...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    18 bids

    As the client, I'm seeking an expert Flutter and BLE developer to help me integrate Bluetooth devices like smartwatches...should have: - Experience with Flutter development. - Good understanding of Bluetooth Low Energy (BLE) technology and its integration with flutter_blue_plus package - Experience in working with different Bluetooth devices, especially smartwatches, fitness trackers, and proximity sensors. - Experience in working with sensor data and custom ATT. - Understand reverse engineering BLE protocol from Wireshark / Android Bluetooth HCI logs - Problem-solving abilities to overcome integration challenges Once this integration is successfully completed, we will have a stronger foundation for delivering a seamless user experience. Therefore, your skills will make a sign...

    $171 (Avg Bid)
    $171 Avg Bid
    5 bids

    I'm taking a course online related to Security Analysis SOC SIEM or incident response, all sorts of tools related to those fields, such as Splunk, ELK, YARA, Sigma, Windows Event logs, Wireshark, Suricata, etc. I'm looking for an experienced Security Analysis SIEM or incident response, someone with working experience in the field to mentor me and explain some concepts. Note: There will be a lot of screen sharing. -------------------- in return for your help, I'll also give you the highest rating & best recommendation after we finish

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    7 bids

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $39 (Avg Bid)
    $39 Avg Bid
    12 bids

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $51 (Avg Bid)
    $51 Avg Bid
    6 bids

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $140 (Avg Bid)
    $140 Avg Bid
    9 bids

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $44 (Avg Bid)
    $44 Avg Bid
    8 bids

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $26 (Avg Bid)
    $26 Avg Bid
    2 bids

    I am looking for a freelancer who can help me discover the endpoints of an existing app. I need someone who is experienced in using tools like Wireshark or any other tool to extract the endpoints. App is called XCWeather, just the the End points: ???????? Requirements: - Proficiency in using tools like Wireshark or any other tool to analyze network traffic and extract endpoints - Familiarity with API endpoints and database endpoints - Ability to work with limited access to the application's source code Ideal Skills and Experience: - Experience in discovering and extracting API endpoints and database endpoints - Strong understanding of network traffic analysis - Ability to work with limited access to source code Expected Outcome: - Provide a comprehensive list of disc...

    $16 (Avg Bid)
    $16 Avg Bid
    5 bids

    I am looking for a freelancer who can help me discover the endpoints of an existing app. I need someone who is experienced in using tools like Wireshark or any other tool to extract the endpoints. App is called XCWeather, just the the End points: ???????? Requirements: - Proficiency in using tools like Wireshark or any other tool to analyze network traffic and extract endpoints - Familiarity with API endpoints and database endpoints - Ability to work with limited access to the application's source code Ideal Skills and Experience: - Experience in discovering and extracting API endpoints and database endpoints - Strong understanding of network traffic analysis - Ability to work with limited access to source code Expected Outcome: - Provide a comprehensive list of disc...

    $24 (Avg Bid)
    $24 Avg Bid
    6 bids

    Hi everyone I'm posting this job twice and i hope i can get what i want so here is the requirement. Budget: 35000 Following experience should be needed before you read full description. must be familiar with java networking programming. must have created VPN app before. must know how Wireshark sniff network packets and how can we do this in java android. What I'm looking? My goal is to create a VPN app that track the network packets ok let me clear. Let's suppose I'm searching something on a browser like chrome or Firefox. I visit any of the website where there are a lots of pictures and now i want to block some pictures through vpn app running at background. Here when my app will receive packets of network app should decrypt packet and find url of images ...

    $335 (Avg Bid)
    $335 Avg Bid
    7 bids

    I am looking for a freelancer who can assist me with a Wireshark analysis project. The purpose of this analysis is to conduct a security analysis of my network. I have specific protocols and traffic types that I would like to be analyzed. I require a detailed report with recommendations based on the analysis. Skills and Experience: - Strong knowledge of Wireshark and network analysis - Expertise in conducting security analysis - Ability to provide detailed reports with recommendations - Familiarity with various protocols and traffic types for analysis

    $26 (Avg Bid)
    $26 Avg Bid
    22 bids

    I am looking for Computer Networks experts who have experience in Network Design and Architecture. Specific requirements f...network performance and security The ideal freelancer for this project should have: - Strong knowledge and experience in computer networks - Proficiency in network design and architecture - Familiarity with network security protocols and best practices - Ability to troubleshoot and resolve network issues The specific tools and software preferred for this project are: - Cisco Packet Tracer - Wireshark - GNS3 However, I am open to suggestions if the freelancer has alternative tools or software that can meet the project requirements. Please provide examples of previous work in computer networks and specify your level of expertise in network design and arc...

    $29 (Avg Bid)
    $29 Avg Bid
    17 bids

    i want to i...when asterisk send request to dsiprouter the request cannot find the endpoint i tried (realm-outbound proxy and etc) but i didnt make it. the error just changed from 407 proxy and still can't find the endpoint . i can see the logs and i guess the problem is dsiprouter . it cant route the calls through endpoint in this way. because when the call reaches the dsiprouter it hangs i debugged using wireshark and the 503 is from voip.ariyanasoft.net. i tried to change outbound carriers and dial executes in asterisk but no ring on sip phone. so i presume the problem is outbound rules inside dsiprouter . please help me with configuration of outbound rulse and carriers for tel to ip calls because ip to tel works fine and i didnt configure anything except connecting dsiprout...

    $699 (Avg Bid)
    $699 Avg Bid
    9 bids

    Project Title: Cybersecurity Specific Areas of Assistance: - Network Security - NMAP AND WIRESHARK Cybersecurity Frameworks or Standards: - Please specify the cybersecurity frameworks or standards that need to be followed Level of Threat Detection and Response: - Advanced Ideal Skills and Experience: - Extensive knowledge and experience in network security - Familiarity with industry-standard cybersecurity frameworks and standards - Proficiency in advanced threat detection and response techniques - Ability to customize and implement cybersecurity measures based on specific requirements - Strong problem-solving and analytical skills in identifying and addressing cybersecurity vulnerabilities - Excellent communication and collaboration skills to effectively work with the client an...

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    8 bids

    Project Title: Cybersecurity Specific Areas of Assistance: - Network Security - NMAP AND WIRESHARK Cybersecurity Frameworks or Standards: - Please specify the cybersecurity frameworks or standards that need to be followed Level of Threat Detection and Response: - Advanced Ideal Skills and Experience: - Extensive knowledge and experience in network security - Familiarity with industry-standard cybersecurity frameworks and standards - Proficiency in advanced threat detection and response techniques - Ability to customize and implement cybersecurity measures based on specific requirements - Strong problem-solving and analytical skills in identifying and addressing cybersecurity vulnerabilities - Excellent communication and collaboration skills to effectively work with the client an...

    $93 (Avg Bid)
    $93 Avg Bid
    14 bids

    ...Title: TCP/IP Protocol Analysis Project Description: I am looking for a freelancer who can assist me with the analysis of the TCP/IP protocol. Specific requirements: - Expertise in TCP/IP protocol analysis - Strong understanding of network protocols and packet analysis - Ability to identify and troubleshoot TCP/IP protocol issues - Familiarity with network monitoring tools and protocols such as Wireshark - Experience in analyzing network traffic and identifying performance bottlenecks - Familiarity with TCP/IP protocol stacks and their functionalities - Knowledge of common TCP/IP vulnerabilities and security best practices Ideal skills and experience: - Intermediate level of understanding of the TCP/IP protocol - Previous experience in analyzing network protocols and identify...

    $21 (Avg Bid)
    $21 Avg Bid
    5 bids

    I am looking for a freelancer who can help me discover the endpoints of an existing app. I need someone who is experienced in using tools like Wireshark or any other tool to extract the endpoints. App is called XCWeather, just the the End points: ???????? Requirements: - Proficiency in using tools like Wireshark or any other tool to analyze network traffic and extract endpoints - Familiarity with API endpoints and database endpoints - Ability to work with limited access to the application's source code Ideal Skills and Experience: - Experience in discovering and extracting API endpoints and database endpoints - Strong understanding of network traffic analysis - Ability to work with limited access to source code Expected Outcome: - Provide a comprehensive list of dis...

    $19 (Avg Bid)
    $19 Avg Bid
    34 bids

    ... Perform a thorough scan using state-of-the-art pentest tools. Identify vulnerabilities and weaknesses in website security. Provide clear and actionable recommendations for risk mitigation. Prepare a detailed report of findings and suggested actions. Requirements: Proven experience in penetration testing. Knowledge of security tools such as Nmap, Metasploit, Burp Suite, Wireshark, among others. Ability to prepare clear and understandable technical reports. Deliverables: A detailed pentest report, including the methodology used, vulnerabilities found, test evidence, and security recommendations. An action plan for rectifying identified weaknesses. To apply, please send: A brief description of your experience in penetration testing. Exa...

    $204 (Avg Bid)
    $204 Avg Bid
    27 bids

    I am looking for a freelancer who can assist me with a Wireshark Lab assignment. The specific protocol or network analysis task required for this assignment is HTTP Analysis. I would like a written report to be included with the assignment. I can provide guidelines for the report if needed. The deadline for this project is less than 1 week. Ideal Skills and Experience: - Proficiency in using Wireshark for network analysis - Strong understanding of HTTP protocols and analysis techniques - Excellent report writing skills

    $107 (Avg Bid)
    $107 Avg Bid
    35 bids

    Project Description: Introduction: I am looking for a skilled freelancer to assist me with an Axi Ethernet 1G base project for Xilinx KCU116, which is a Kintex Ultrascale. Project MUST NOT CONTAIN Microblaze, only soldi VHDL code. Target...provided, but free trial is available by Xilinx) based - 1Gb speed required - No Microblaze or MPSoC, only VHDL code. - Configuration must be done by AXI-Lite bus (No Configuration vector) - Ethernet frames must be sent by AXI-Stream bus - Reference ISE is Vivado 2022.1 ISE Milestone: A simple example which send Ethernet packets on KCU116. Project Operating will be verified by connecting a PC with wireshark in order to receive the sent frames. If you have the required skills and experience, I am looking forward to collaborating with you on thi...

    $384 (Avg Bid)
    $384 Avg Bid
    5 bids

    Just have 6 simple questions that I need. You need to have Kali Linux VM and use wireshark through there to locate the information.

    $21 (Avg Bid)
    $21 Avg Bid
    4 bids

    ...vulnerability and corresponding exploit analysis Your skills: 1. Vulnerability and malware analysis skills for x86/JavaScript. 2. 0day exploits. 3. Static and dynamic code analysis and debugging tools like Metasploit, Burp Suite, angr, afl, BinaryAnalysisPlatform bap, KLEE, bindiff, BitBlaze, Ghidra-sre, x64dbg, IDA Pro, OllyDbg, AutoSploit, MetaSploit, Mimikatz, Kali Linux, snort, tcpdump, Wireshark, ClamAV, Malware analysis sandboxes like Cuckoo 4. Unpackers, PDF parsing, decompression & JS extraction. 5. Disassemblers, decompilers. 6. Analyzing sample exploits or their descriptions and extending them to provide all relevant details. 7. Analyzing binary patches regarding vulnerabilities and fixes. 8. Coding sample programs with vulnerable code and coding exploits, e.g. bas...

    $1257 (Avg Bid)
    $1257 Avg Bid
    16 bids

    I need help analyzing a .pcap with Wireshark

    $218 (Avg Bid)
    $218 Avg Bid
    6 bids

    Hi Hicham O., I noticed your profile and would like to offer you my project. I need help with a Wireshark CTF.

    $218 (Avg Bid)
    $218 Avg Bid
    1 bids

    Analysis of a pcap trace with Wireshark on a subnet to detect ARP spoofing attacks.

    $31 / hr (Avg Bid)
    $31 / hr Avg Bid
    9 bids

    examine the network protocol traffic captured in the dump file, network protocol analysis using Wireshark, defend your recommendations to diverse stakeholders, which involves articulating your proposed strategies, mitigations, and solutions in a manner that addresses the concerns and priorities of various stakeholders, Prepare and create your presentation,

    $41 (Avg Bid)
    $41 Avg Bid
    7 bids

    need someone familiar with Wireshark and traceroute to do small task

    $23 (Avg Bid)
    $23 Avg Bid
    23 bids

    Need to create code ( i will create and connect hardware) for STM32+ethernet based controller that will control musical devices using ethernet (cable connected) and based on websockets and OSC protocol commands. The websockets commands - nee to read from mixer using wireshark. Ned to decode the mixer websocket commands and use it to can controll audio mixers by STM32+ETHERNET board using encoders, buttons lets and so on. Need to can use up to 16 audio channels, each channel need to can controll by encoders: Volume, Panorama, EQ Gain Low.id-Low, Mid-High, High, Freq, Q, HPF, Aux1 send, Aux2 send, Fx1 Send, Fx2 Send, Fx3 Send, Fx4 Send, and few other commands. Using Buttons need to can set each channel to Mute/Unmute, also need to can load/save presets by buttons, and few other featu...

    $546 (Avg Bid)
    $546 Avg Bid
    14 bids