Select a vulnerability that targets a Windows 7/8.1/10 (or newer) system. You will play the role of an attacker and exploit this vulnerability, allowing you to gain remote control over this system.
The attack should meet the following criteria:
Remote delivery (i.e. not simply double clicked from the Desktop)
o Exploit a vulnerability within an office application or system process.
Allow the attacker to implant a persistence mechanism.
o Provide the attacker with a remote shell or the ability to execute code.
Show how this access can be leveraged to act on objectives.
Demonstrate the threat using live machines over a remote screen share session.
o There should be (1) Attacker system and (1) Victim system (I have this already setup in practice lab)
Explain the risk that this attack represents and challenges that IT organizations face in protecting against it.","employmentType":["FULL_TIME","PART_TIME","CONTRACTOR","TEMPORARY","PER_DIEM"],"jobLocationType":"TELECOMMUTE","hiringOrganization":{"@type":"Organization","name":"Toogit","sameAs":"https://www.toogit.com/","logo":"https://www.toogit.com/images/toogit_logo_initial.png"},"identifier":{"@type":"PropertyValue","name":"Toogit","value":363782},"skills":["Kali Linux","Metasploit","Penetration Testing"],"applicantLocationRequirements":[{"@type":"Country","name":"IN"},{"@type":"Country","name":"Canada"},{"@type":"Country","name":"USA"},{"@type":"Country","name":"Germany"},{"@type":"Country","name":"Pakistan"},{"@type":"Country","name":"Philippines"},{"@type":"Country","name":"Indonesia"},{"@type":"Country","name":"Sri Lanka"},{"@type":"Country","name":"Nigeria"},{"@type":"Country","name":"China"},{"@type":"Country","name":"Russia"},{"@type":"Country","name":"Bangladesh"}],"validThrough":"2024-10-18T02:12:09+05:30","url":"https://www.toogit.com/freelance-jobs/MzYzNzgy"}
Remote Network And System Administration Job In IT And Networking
Find more Network And System Administration remote jobs posted recently Worldwide
Work from Anywhere
40 hrs / weekHourly Type
Remote Job$19.13
Cost Looking for help? Checkout our video tutorial
How to search and apply for jobs
How to apply? Do you have more questions about the Job?
See frequently asked questions
We are searching for a security / hacker specialist to find exploits in our web app. Highly confidential, more info per PM.
A systems database is hacked and the data in it is encrypted by some hacker were looking for a person who can help us in this. Contact us as soon as possible.
Were looking for an experienced professional who can do penetration test on website and network.
Need someone who can create these reports for a small technology company with web and mobile applications.
Expert security consultant needed for guidance on extremely low-latency inter-process authentication.
Were using WebSockets for a cryptocurrency exchange, which receives orders (nanoseconds count), sends order updates and market data, etc.