Remote Network And System Administration Job In IT And Networking

Demonstration help needed for work

Find more Network And System Administration remote jobs posted recently Worldwide

Need some help with a demo I have to do for some training at work but lack the confidence and expert knowledge to do it on my own. This will likely be very easy for someone with experience, specifically I need someone well versed in Kali Linux and Metasploit. I will do the work and obviously the final demo myself, but I need some guidance with commands and some teaching for a couple of hours to finalize the demo. This will be done in my local VM practice lab. Here are the specifics of what I need help with:
Select a vulnerability that targets a Windows 7/8.1/10 (or newer) system. You will play the role of an attacker and exploit this vulnerability, allowing you to gain remote control over this system.
The attack should meet the following criteria:
Remote delivery (i.e. not simply double clicked from the Desktop)
o Exploit a vulnerability within an office application or system process.
Allow the attacker to implant a persistence mechanism.
o Provide the attacker with a remote shell or the ability to execute code.
Show how this access can be leveraged to act on objectives.
Demonstrate the threat using live machines over a remote screen share session.
o There should be (1) Attacker system and (1) Victim system (I have this already setup in practice lab)
Explain the risk that this attack represents and challenges that IT organizations face in protecting against it.
About the recuiter
Member since Aug 31, 2017
Taisha
from Chandigarh, India

Skills & Expertise Required

Kali Linux Metasploit Penetration Testing 

Candidate shortlisted and hiredHiring open till - May 1, 2024

Work from Anywhere

40 hrs / week

Hourly Type

Remote Job

$19.15

Cost

Looking for help? Checkout our video tutorial
How to search and apply for jobs

How to apply? Do you have more questions about the Job?
See frequently asked questions

Similar Projects

Penetration Test For a B2C Cryptocurrency Exchange Application

This job has a simple definition. We would like to have a penetration test for new online B2C exchange application. Our goal is to be sure that the application has enough security level.

We expect a professional penetration test with good r...read more

Need a cyber security course content designer from basic to advance

Cyber security course content designer from basic level to advance level.

Content should be from basic for example CEH to OSCP

Please mentioned the whole cost and duration you will need to complete.

Only sincere bids plea...read more

antivirus test environment for visitor - cyber eng

I am working in industrial company that required to have virus scan for any visitors enter the company.
It came to my mind to have test environment to do virus scanning and compromise test for any visitor laptop.
The test environment will h...read more

Exploitation of all vulnerabilities on the site

It is necessary to exploit vulnerabilities on the site.

- XSS vulnerabilities
- MySQL injection.
- DDoS protect.
- Inside network,
- Network.