attacks and defense of open source software

已关闭 已发布的 5 年前 货到付款
已关闭 货到付款

1) the exact place

in the source code that causes the problem;

2) the type of this vulnerability;

3) the exact method and code for exploitation;

4) the modifications on the software so as to be resistant to

the exploitation.

The application has been already choosen. It is limesurvey .

We used tools such as Rips, OWASP Zap and W3af and found vulnerabilities such as cross site scripting and SQL injection but not able to mitigate them.

MySQL PHP SQL 网络安全

项目ID: #19200604

关于项目

4个方案 远程项目 活跃的5 年前

有4名威客正在参与此工作的竞标,均价$221/小时

AhmadSameer

Hello, I have been in the Information Security arena for years. I had conducted tons of Penetrations Tests. Would you share more details? Regards.

$250 CAD 在3天内
(15条评论)
5.0
bilal978

Hello, I am currently working as a security expert in a team that is securing a large project and we are actually working on the owasp top 10, 2017. removing the vulnerabilities under the guidlines provided in owasp ch 更多

$277 CAD 在10天内
(18条评论)
3.6
JoeAngry2

I do software development for a living, and I have a special interest in penetration testing specifically using Burp Suite. I've got experience using OWASP ZAP as well. I can certainly help you mitigating the exploi 更多

$200 CAD 在3天内
(0条评论)
0.0