
Ditutup
Disiarkan
Dibayar semasa penghantaran
I need an experienced ethical hacker to assess the security of my production web application. The platform handles login credentials—users sign in with their mobile number and password—so I want to be absolutely certain this flow cannot be abused. Scope • Run a full penetration test coupled with an automated and manual vulnerability scan. • Focus especially on authentication, session management, and any area where those credentials travel or are stored. Deliverables - A clear, step-by-step report detailing every finding, severity rating, and proof-of-concept where exploitation is possible. - Practical remediation advice I can hand straight to my development team. - A concise executive summary of overall risk. All testing must respect live-traffic uptime, follow ethical guidelines, and stay within the defined scope of the web application only. If you have appropriate certifications or recent similar projects, let me know so I can move quickly to schedule the engagement.
ID Projek: 40294455
12 cadangan
Projek jarak jauh
Aktif 1 hari yang lalu
Tetapkan bajet dan garis masa anda
Dapatkan bayaran untuk kerja anda
Tuliskan cadangan anda
Ianya percuma untuk mendaftar dan membida pekerjaan
12 pekerja bebas membida secara purata ₹3,983 INR untuk pekerjaan ini

Hello, I’m a cybersecurity freelancer specializing in web application security assessments and penetration testing. I can perform a controlled penetration test of your production web application with a strong focus on the mobile number and password authentication flow, session management, and credential handling. My testing approach includes: 1. Automated vulnerability scanning combined with manual penetration testing. 2. Deep testing of authentication mechanisms, session tokens, access control, and credential transmission/storage. 3. Identification of OWASP Top 10 vulnerabilities such as injection flaws, broken authentication, and security misconfigurations. 4. Careful testing designed to avoid disruption to live traffic and production uptime Deliverables will include: 1. A detailed step-by-step report with findings, severity ratings, and proof-of-concept where applicable. 2. Clear remediation guidance your development team can implement immediately. 3. A concise executive summary highlighting overall security risk and priorities I have experience in web security testing, digital forensics, and vulnerability analysis, and I follow strict ethical and scope-controlled testing practices. I’m available to start promptly and would be happy to discuss the scope further. Best regards. Kajal Majhi
₹15,000 INR dalam 7 hari
4.9
4.9

We at Offensium Vault Private Limited (ISO 27001:2022 & ISO 9001:2015) can perform a comprehensive web application penetration test to assess the security of your production platform. Approach • Full manual and automated vulnerability assessment aligned with OWASP Top 10 and PTES methodology. • Deep testing of authentication flow, session management, and credential handling (login via mobile number and password). • Analysis of data transmission, storage, and access controls to identify potential abuse scenarios. • Testing with tools such as Burp Suite, OWASP ZAP, Nmap, and custom scripts while ensuring no disruption to live traffic. Deliverables • Executive summary outlining overall risk posture. • Detailed technical report with severity ratings, PoC evidence, and step-by-step reproduction steps. • Practical remediation guidance your development team can implement quickly. All testing will follow ethical security standards and strict scope control. We can begin immediately once access and scope are confirmed.
₹1,050 INR dalam 7 hari
3.6
3.6

Hello, I can perform a comprehensive web application security penetration test for your MySQL-based system, identifying vulnerabilities such as SQL injection, XSS, authentication flaws, and API security issues following OWASP Top 10 standards. I’ll use a mix of automated tools and manual testing to validate risks and provide a detailed report with proof-of-concept and clear remediation steps. Regards, Bharti
₹1,050 INR dalam 7 hari
2.2
2.2

Hi There!, I have 4+ years of experience in penetration testing including Web Application penetration testing; System Application penetration testing; Mobile application penetration testing; Network application penetration testing; social engineering penetration testing etc. Follow systematic approach and best industry methodology like OWASP Testing Guide v4(OTGv4) ; SANS top 25; NIST SP 800-115; PCI DSS etc to perform penetration testing : Web Application Testing : Perform both manual and automated penetration testing for vulnerabilities like SQL injection, Cross-site scripting(XSS), Cross-site request Forgery(CSRF), Code injections, Authentication Bypass, Access Violation, Remote File inclusion(RFI),Local File Inclusion(LFI) etc. Network Testing: Provide Network Penetration Testing so that your Network Infrastructure is secured from the real attacks. Perform both manual and automated network penetration testing to identify network security threats in your network. I can assure you that I will be an ideal candidate for what you are looking for. Please out to me for further discussions. Thank you
₹1,050 INR dalam 7 hari
0.0
0.0

When a production application handles **login credentials like mobile numbers and passwords**, the biggest risk usually lies in authentication flows, session handling, and how credentials travel between the client and server. Even small gaps in these areas can lead to account takeover, session hijacking, or credential abuse. My approach would be to carefully test these points without disrupting live traffic. Here’s how I would approach your security audit: • Perform a **full vulnerability scan and manual penetration testing** of the web application • Test the **authentication flow** for brute force protection, credential stuffing risks, and weak validation • Review **session management** (session tokens, expiry, fixation, and hijacking possibilities) • Analyse how credentials are **transmitted and stored**, including encryption and API security • Check for **OWASP Top 10 vulnerabilities** such as SQL injection, XSS, CSRF, and access control flaws • Conduct testing carefully to **avoid affecting live users or system uptime** • Provide a **detailed report with severity levels, proof-of-concept demonstrations, and screenshots** • Include **clear remediation steps** your development team can immediately implement • Deliver a short **executive summary explaining overall security risk** Best regards. Praveen Sharma
₹750 INR dalam 5 hari
0.0
0.0

I’ll help you with all the required tasks and make sure everything is completed correctly, with accurate and reliable results.
₹3,000 INR dalam 14 hari
0.0
0.0

Hello, I am an experienced security researcher and active bug bounty hunter with a strong background in web application security testing. I have successfully identified and responsibly reported multiple vulnerabilities, helping organizations reduce their security risks and improve their overall security posture. I can conduct comprehensive penetration testing using industry-standard tools along with thorough manual testing techniques to ensure deeper coverage. After the assessment, I will provide a detailed report that includes an executive summary, vulnerability descriptions, impact analysis, step-by-step reproduction instructions, Proof of Concept (PoC), and severity ratings based on CVSS standards. Additionally, I can assist your development team by providing clear remediation recommendations to help fix the identified vulnerabilities effectively.
₹800 INR dalam 6 hari
0.0
0.0

Hello, I am a penetration tester with around 3 years of experience in web, API, and mobile application security testing. I have experience identifying vulnerabilities related to authentication, session management, and credential handling. For this project, I will perform both automated scanning and manual penetration testing focusing on: • Authentication flow security (login with mobile number & password) • Session management and token handling • OWASP Top 10 vulnerabilities • Areas where credentials are transmitted or stored You will receive a detailed security report including: • Clear vulnerability descriptions • Risk severity ratings • Proof-of-Concept (PoC) • Practical remediation recommendations for developers • Executive summary of overall security risk All testing will be conducted carefully to avoid disrupting production traffic and strictly within the agreed scope. I look forward to working with you. Best regards
₹15,000 INR dalam 7 hari
0.0
0.0

Hello, I can perform a security penetration test on your web application with special focus on authentication and session management to ensure the login flow cannot be abused. My testing process includes both automated and manual analysis covering: • SQL Injection testing • Cross-Site Scripting (XSS) • Authentication bypass attempts • Session management vulnerabilities • Input validation issues • OWASP Top 10 security risks I have hands-on experience testing vulnerable applications such as OWASP Juice Shop and DVWA and have built vulnerability scanning tools using Python. You will receive: ✔ A clear step-by-step vulnerability report ✔ Proof-of-concept examples where applicable ✔ Practical remediation recommendations for your development team ✔ A concise executive summary of overall risk Quick question: Is the application currently live in production or do you have a staging environment available for testing? Best regards, Kaivan
₹1,050 INR dalam 3 hari
0.0
0.0

Hi, We are a registered MSME cybersecurity firm with a certified team holding credentials such as CEH, OSCP, OSCE, CCNA, CISSP, ISO 27001 LA, and expertise aligned with OWASP, NIST, and MITRE ATT&CK frameworks. We have delivered VAPT services across web, network, and cloud environments. For your web application, we will conduct a **comprehensive penetration test** focusing on securing the mobile number + password authentication system. **Scope includes:** • Authentication & login bypass testing • Session management (fixation, hijacking risks) • Secure handling of credentials (transmission & storage/MySQL) • Input validation & OWASP Top 10 vulnerabilities **Deliverables:** • Detailed report with severity, PoC, and step-by-step findings • Practical remediation guidance for developers • Executive summary of overall risk posture All testing will be performed safely on production, ensuring no disruption and strict adherence to ethical guidelines. We can start immediately and deliver reliable, real-world security insights. Best regards, CT Infosec Team
₹750 INR dalam 6 hari
0.0
0.0

Tāra, India
Ahli sejak Mac 12, 2026
₹1500-12500 INR
₹600-1500 INR
$250-750 USD
₹100-400 INR / jam
$30-250 USD
$250-750 USD
₹150000-250000 INR
₹1500-12500 INR
$30-250 USD
₹12500-37500 INR
₹12500-37500 INR
$750-1500 USD
₹600-700 INR
$10-30 USD
₹1250-2500 INR / jam
₹37500-75000 INR
₹150000-250000 INR
£750-1500 GBP
₹750-1250 INR / jam
$30-250 USD