attacks and defense of open source software
$30-250 CAD
货到付款
1) the exact place
in the source code that causes the problem;
2) the type of this vulnerability;
3) the exact method and code for exploitation;
4) the modifications on the software so as to be resistant to
the exploitation.
The application has been already choosen. It is limesurvey .
We used tools such as Rips, OWASP Zap and W3af and found vulnerabilities such as cross site scripting and SQL injection but not able to mitigate them.
项目ID: #19200604
关于项目
有4名威客正在参与此工作的竞标,均价$221/小时
Hello, I have been in the Information Security arena for years. I had conducted tons of Penetrations Tests. Would you share more details? Regards.