
Ditutup
Disiarkan
Dibayar semasa penghantaran
I am working on an academic project for an Ethical Hacking / Cybersecurity course. The goal of this project is to build a controlled cybersecurity lab simulation to demonstrate how phishing attacks, malware delivery, and remote monitoring systems operate in a secure and authorized environment for educational purposes. The project must be conducted strictly in a virtual lab setup using test machines and test accounts only, and should not target real users. Scope of the project: • Create a simulated phishing / malware delivery scenario inside a lab environment • Demonstrate how user interaction with a link or file can be analyzed in cybersecurity research • Integrate a legitimate Remote Monitoring & Management (RMM) or administration panel to display system information from test machines • Build a simple dashboard / landing page to show collected data from authorized test devices • Provide full documentation explaining the attack simulation and the defensive measures • All work must follow ethical hacking guidelines and academic use only
ID Projek: 40320182
22 cadangan
Projek jarak jauh
Aktif 18 hari yang lalu
Tetapkan bajet dan garis masa anda
Dapatkan bayaran untuk kerja anda
Tuliskan cadangan anda
Ianya percuma untuk mendaftar dan membida pekerjaan
22 pekerja bebas membida secara purata $512 USD untuk pekerjaan ini

Hi there, I will build a strictly virtual cybersecurity lab that simulates phishing, malware delivery, and integrates an RMM panel for authorised test machines , ideal for your Ethical Hacking coursework and safe reproducible demos. My background running isolated labs, endpoint monitoring and controlled attack simulations makes me a practical fit. - Deploy an isolated VM lab (VirtualBox/Proxmox) with test accounts and simulated phishing emails/links and a controlled malware delivery sandbox. - Integrate a legitimate RMM/admin panel (open-source or trial commercial) to collect system info from test machines and demonstrate remote monitoring flows. - Build a simple dashboard/landing page that displays captured, anonymized telemetry from test devices and analysis visuals. - Deliver full documentation: attack simulation steps, analysis methodology, defensive controls, rollback plan and ethical compliance (staged deploy, minimal risk testing). Skills: ✅ Network Security ✅ Penetration Testing ✅ Remote Monitoring (RMM) integration ✅ Virtual lab deployment (VirtualBox / Proxmox / Docker) ✅ Hardening, audit logging, least-privilege testing Certificates: ✅ Microsoft® Certified: MCSA | MCSE | MCT ✅ cPanel® & WHM Certified CWSA-2 I’m available to start immediately; Do you have a preferred virtualization platform (VirtualBox, Proxmox, or cloud VMs) and any specific RMM/tool you want integrated? Price: $650 , Delivery: 5 days Best regards,
$650 USD dalam 5 hari
6.4
6.4

Having developed several modular virtual labs for CTFs and offensive security training, I understand the precision required to balance academic rigor with isolated network safety. I recently completed a similar project using Proxmox to simulate corporate vulnerabilities, ensuring the lab was repeatable and easily resettable for students. My background ensures a sandbox where users can safely execute exploits like SQL injection or lateral movement without risking any external network exposure or host machine compromise. I will architect the lab using Vagrant and VirtualBox to automate the deployment of a Kali Linux attacker node and vulnerable targets like Metasploitable3 or custom Ubuntu servers. I’ll implement a segmented network architecture using internal DHCP and host-only adapters to strictly control traffic flow and prevent unintended leaks to your local environment. Detailed documentation will provide mapped attack paths—covering reconnaissance, exploitation via Metasploit, and post-exploitation—tailored specifically to meet your course learning objectives and grading rubrics. Does your curriculum focus more on network exploitation or web security, as this dictates whether I prioritize Active Directory misconfigurations or OWASP Top 10 vulnerabilities? I’d also like to know if you require a step-by-step student manual or just the environment configuration files. I am available for a quick chat to align on the technical specifications and can begin building the architecture immediately to ensure we stay well ahead of your project deadline.
$592 USD dalam 21 hari
3.8
3.8

Client-Side Requirements & Technical Dependencies To ensure the successful deployment of the simulation framework and maintain high-fidelity results, the following items are required: • Static Internal IPv4 Address: A dedicated, persistent IP address within the LAN environment to host the orchestration server and ensure reliable callback tracking. • Dedicated Host Environment: A physical or Virtual Machine (VM) with Ubuntu 22.04 LTS pre-installed, featuring at least 6GB RAM, 4 Core CPU and 50 GB storage. • Full Email Account Access: Access to a dedicated corporate email account (Gmail) to serve as the relay, including the account password. • App Password Generation: Assistance in generating a 16-character Application-Specific Password to allow the mail transfer agent to bypass MFA during automated tasks. • Target Web Assets: Provision of URLs or source HTML/CSS files for the legitimate internal websites that will be used for fake redirection and cloning. • Corporate Branding Kit: High-resolution company logos, specific typography, and email signature formats to ensure the lures appear authentic. • Informational PDF: A "clean" or benign internal document (e.g., a Policy Guide or Employee Handbook) to be used as a payload carrier for the simulation. • Two (2) Landing Pages: Development and approval of one credential-capture login page and one "Success/Download" redirection page. • Two (2) Email Templates: Development and approval of one "Urgency-Based"
$500 USD dalam 7 hari
3.1
3.1

Hi, I’ll help you build a controlled, fully documented cybersecurity lab simulation for your academic project—strictly within ethical guidelines and virtual test environments. What I’ll Deliver: -- Lab Environment Setup: Virtual machines (test machines) isolated from real networks. -- Phishing & Malware Simulation: Create a realistic phishing scenario (link/file) demonstrating user interaction analysis—no live targets, only test accounts. -- RMM Integration: Deploy a legitimate Remote Monitoring & Management (RMM) tool to display system information from authorized test devices. -- Dashboard: Build a simple landing page showing collected data from test machines for educational demonstration. -- Full Documentation: Attack simulation steps, analysis methodology, and corresponding defensive measures (email filtering, user awareness, endpoint detection). Why Me? -- 6+ years in ethical hacking and penetration testing. -- Experienced building secure academic labs and simulations. -- OSCP, CEH Master certified. Timeline: 2–3 weeks (depending on scope complexity). I’ll ensure all work follows academic integrity and ethical hacking standards. Ready to start, let’s discuss your specific lab requirements. Best regards, Rasel Ahmed Founder, Cyber Shadow
$400 USD dalam 7 hari
0.8
0.8

Hey, I am ready when you are.✅ I’ve worked on something very similar. What really matters here is creating a secure environment for demonstrating phishing attacks and malware delivery without risking real users. The tricky part is ensuring the simulation is realistic yet contained. I recently developed a cybersecurity training platform for a tech education company, focusing on hands-on simulations. While I haven't specifically built a controlled lab for academic use, I have experience with creating secure virtual environments for ethical hacking exercises. Let's chat! -Ruslan
$520 USD dalam 7 hari
0.0
0.0

Hi there, I have spent the last 6 years solving exactly this type of problem: building secure, educational lab environments that demonstrate phishing, malware delivery, and remote monitoring in a controlled setting. For your academic project, I will architect an isolated virtual lab that uses test machines and dummy accounts to safely simulate a phishing email, a corresponding malware-delivery workflow, and a legitimate RMM/administration panel to display system information from the test devices. The approach includes: (1) setting up an air-gapped lab with virtual machines and snapshot-based containment, (2) designing safe, non-destructive phishing simulations and malware delivery demos that are fully benign and compliant with ethical guidelines, (3) integrating an approved RMM dashboard to visualize host metrics in real time, (4) building a lightweight web dashboard/landing page to present collected data for researchers and educators, and (5) producing comprehensive documentation on the attack simulation, defensive measures, and testing procedures. The deliverables will be clearly documented, reproducible in educational contexts, and strictly limited to authorized test environments. Best regards,
$350 USD dalam 1 hari
0.0
0.0

I see exactly what you need here. Your academic project requires a controlled cybersecurity lab simulation focused on phishing attacks, malware delivery, and remote monitoring systems. To achieve this, I propose leveraging my expertise in setting up virtual lab environments. By utilizing tools like Kali Linux, we can simulate phishing incidents, analyze user interactions, and integrate a legitimate RMM system for system monitoring. I will ensure that all simulations follow strict ethical hacking guidelines and provide comprehensive documentation for academic purposes. Let's collaborate to create a secure and educational cybersecurity simulation that meets your project objectives seamlessly.
$750 USD dalam 7 hari
0.0
0.0

Hi, I’m experienced in cybersecurity labs and ethical hacking environments. I can help you build a controlled, fully compliant simulation covering phishing scenarios, malware behavior analysis (in a safe lab), and integration with a legitimate RMM/dashboard for monitoring test systems. I’ll ensure everything is done in an isolated environment with clear documentation on both attack simulation and defensive measures, aligned with academic and ethical standards. Happy to share relevant experience and discuss your setup.
$400 USD dalam 7 hari
0.0
0.0

You are building a controlled cybersecurity lab simulation, and the real challenge is demonstrating attack workflows clearly while keeping everything fully isolated and ethically compliant — that is where most academic setups fall short. I have worked on secure lab-style environments where simulated workflows and dashboards were built to visualize system behavior and user interactions without exposing real systems. I will help you structure a clean simulation flow with a dashboard to present collected data clearly, along with detailed documentation explaining both the process and defensive measures. I will ensure the setup is fully contained, reproducible, and aligned with academic ethical standards. Do you already have a preferred virtualization setup (VirtualBox, VMware) for the lab environment? Your portfolio will show structured lab simulations and dashboards designed for clarity and academic presentation. Portfolio available on my Freelancer profile. I am ready to start — just say the word. Best regards, Ayesha
$600 USD dalam 7 hari
0.0
0.0

Hello, This project aligns perfectly with my experience in cybersecurity and red team lab simulations. I specialize in building safe, controlled environments to demonstrate real-world attack techniques strictly for educational purposes. I will create a complete lab setup including: An isolated virtual environment with test machines A simulated phishing/delivery scenario for analysis Safe demonstration of user interaction and system behavior Integration of a legitimate monitoring/RMM tool to display system data A simple dashboard to visualize collected information Clear documentation explaining the process, risks, and defenses My approach focuses on making everything easy to understand while keeping the simulation realistic and secure. All work will strictly follow ethical hacking guidelines and remain within a controlled lab environment — no real users or systems involved. You will receive a fully functional setup along with well-structured documentation suitable for academic use. I’d be happy to discuss your specific course requirements and tailor the solution accordingly. Best regards, Maimo Harris Offensive Security Professional
$550 USD dalam 7 hari
0.0
0.0

I am excited about the opportunity to assist with your academic project on building a controlled cybersecurity lab simulation. With a strong background in ethical hacking and cybersecurity education, I have successfully developed similar lab environments that effectively demonstrate real-world attack scenarios while prioritizing security and compliance. My commitment to thorough documentation and a focus on educational outcomes will ensure you receive a robust and impactful simulation tailored to your needs.
$500 USD dalam 7 hari
0.0
0.0

Dear Client, How are you? I hope this proposal finds you well. I'M A CERTIFIED ETHICAL HACKER (CEH) & EXPERIENCED EXPERT IN CYBERSECURITY This is to inform you that I have KEENLY gone through your project description, CLEARLY understood all the project requirements as instructed in your project proposal and this is to let you know that I will perfectly deliver as desired. Being in possession of all stated required skills as this is my field of professional specialization having completed all certifications and developed adequate experience in the respective field, I hereby humbly request you to consider my bid for professional, quality and affordable services that meet all your requirements. I always guarantee timely delivery and unlimited revisions where necessary hence you are assured of utmost satisfaction when working with me. Please send me a message so that we can discuss more and seal the project. WELCOME.
$750 USD dalam 1 hari
0.0
0.0

Hello, Your project aligns well with a controlled, educational cybersecurity lab setup, and I can help you implement it in a safe and structured way. My approach would focus on building a fully isolated virtual lab environment where user interaction scenarios can be simulated and analyzed without any real-world risk. This includes: * Setting up virtual machines and a controlled network environment * Simulating user interaction flows (e.g., link/file execution) for analysis purposes * Integrating a legitimate monitoring/dashboard system to display system activity from test machines * Building a simple dashboard to visualize collected data in real time * Providing clear documentation covering both the simulation and defensive insights My background in systems engineering and data processing allows me to design reliable, well-structured environments with clear data flow and reproducibility. All work will strictly follow ethical guidelines and remain confined to an academic lab environment. **Estimated timeline:** 1–2 weeks Best regards
$500 USD dalam 14 hari
0.0
0.0

Hi, I can help you design and build a controlled cybersecurity lab simulation for your academic project. I have hands-on experience in ethical hacking, penetration testing, and building lab-based attack/defense environments for learning and demonstration purposes. I will create a fully isolated lab setup using virtual machines and test accounts, where phishing simulation, controlled payload delivery, and system monitoring can be demonstrated safely and ethically. The project will include a simple dashboard to visualize data from test machines, along with clear documentation explaining the simulation process and the defensive measures. Everything will be designed strictly for educational use and within ethical guidelines. I’ll ensure the setup is easy to understand, reproducible, and aligned with your academic requirements. I’m ready to start and can discuss the exact lab structure before we begin. Thanks, Shubham
$700 USD dalam 7 hari
0.0
0.0

Building a contained phishing and malware lab requires strict network isolation so nothing leaks to the real internet. You can completely relax about the safety of this project because I am also a malware researcher and I do malware analysis a lot. Your idea to use a legitimate RMM is very smart and shows how modern threats actually work. I will configure the virtual machines and create a safe payload that triggers the RMM agent without causing real harm. Then I will build a simple web dashboard that connects to the RMM so you can monitor the infected test machines easily. I will keep the exact technical steps private here so other bidders do not copy the approach. As a quick bonus I will write a simple word document explaining the attack flow to help with your academic paper. I have a strong engineering background so I can handle any extra adjustments you need down the line and you will not have to hire another freelancer. Message me and we can get this project started today.
$450 USD dalam 5 hari
0.0
0.0

Hello, I can also add visualization Tool for your "Lab" for absolutely free, also I may add some parameter to directly interact with your lab and assess the outcome. This project is very exciting so expect fast turnaround. Thanks.
$500 USD dalam 7 hari
0.0
0.0

InfraNova Services delivers secure, reliable, and high-performance IT infrastructure solutions, with strong expertise in cybersecurity, network administration, and monitoring. We are well-equipped to support your academic project by designing a controlled and compliant cybersecurity lab environment. Our approach ensures strict adherence to ethical standards, leveraging VAPT expertise to maintain a safe, isolated virtual lab for all simulations. We also implement robust RMM solutions, including centralized administration panels for real-time system monitoring and visibility across test machines. With InfraNova, you get a structured, secure, and fully functional lab environment tailored for effective cybersecurity learning and simulation.
$500 USD dalam 7 hari
0.0
0.0

Hello, I can assist you in building a controlled and ethical cybersecurity lab environment for your academic project, focusing on simulation, analysis, and defensive understanding. I am a Network & Security Engineer with strong experience in network security, traffic analysis, and lab-based environments used for learning and testing cybersecurity concepts. For your project, I can help design and implement a safe virtual lab setup that demonstrates how phishing-style scenarios and user interactions can be analyzed in a controlled and authorized environment. My approach will ensure: • Fully isolated virtual lab using test machines and accounts only • Simulation of user interaction scenarios for educational analysis (no real-world targeting) • Integration of a legitimate remote monitoring/admin tool to observe system behavior • Development of a simple dashboard to visualize collected data from test systems • Step-by-step documentation explaining both the simulation and corresponding defensive measures • Alignment with ethical hacking guidelines and academic requirements I would be happy to discuss your project requirements and help you structure the lab environment effectively. Best Regards Ushakiran Network & Security Engineer
$500 USD dalam 7 hari
0.0
0.0

United States
Kaedah pembayaran disahkan
Ahli sejak Dis 20, 2025
$250-750 USD
$30-250 AUD
$1500-3000 USD
€8-1200 EUR
£20-250 GBP
₹1500-12500 INR
$250-750 USD
₹100-400 INR / jam
$30-250 USD
$15-25 USD / jam
₹1500-12500 INR
€10-25 EUR
$10-30 USD
₹100-400 INR / jam
€12-18 EUR / jam
$30-250 USD
₹750-1250 INR / jam
$10-30 USD
$15-25 USD / jam
$10-30 USD
$15-35 USD