Find Jobs
Hire Freelancers

Exploitation of Cryptographic Bluetooth Vulnerability in CVE-2018-5383

$30-250 USD

Zavřený
Zveřejněno před více než 5 roky

$30-250 USD

Zaplaceno při doručení
Exploitation of Cryptographic Bluetooth Vulnerability in CVE-2018-5383 Bluetooth Vulnerability CVE-2018-5383 deals with the validation fault in cryptographic key pairing mechanism in Bluetooth 4.2. I need some expert who can theoratically explain and write a paper (along with presentation) on minimum 15 exploits on the said vulnerability in detail and diagramatically and precautionary measures that must be taken to stop that vulnerability. Also, suggestive measures that will help in enhancing security of Bluetooth 5.0
IČ projektu: 18536832

O projektu

7 nabídky
Vzdálený projekt
Aktivní před 5 roky

Chcete si vydělat nějaké peníze?

Výhody podávání nabídek na Freelancer

Stanovte si rozpočet a časový rámec
Získejte za svou práci zaplaceno
Načrtněte svůj návrh
Registrace a podávání nabídek je zdarma
7 freelanceři nabízejí v průměru $162 USD za tuto práci
Avatar uživatele
I'm a Bsc degree holder in computer science. I have worked on many papers in report writing, research.I have read and understood your requirement and I know you will never regret, thank you.
$155 USD v 3 dnech
4,7 (197 recenze)
7,0
7,0
Avatar uživatele
Hi there! May Peace Be Upon You !! I am a certified ethical hacker and pen tester. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. @Certified at Ethical Hacking @Certified at WEB APP SECURITY FUNDAMENTALS @Certified at Website Hacking / Penetration Testing Main Skills: Penetration Testing, Web Application Security. Social Engineering, Red team assessment, Ethical Hacking & Countermeasures, Malware Analysis. I provide a variety of security services including white/black hat penetration testing, network and host auditing, Policies and Business Impact Analysis. I will do OWASP Top 10 Application Security Pentesting. A1:2017-Injection A2:2017-Broken Authentication A3:2017-Sensitive Data Exposure A4:2017-XML External Entities (XXE) A5:2017-Broken Access Control A6:2017-Security Misconfiguration A7:2017-Cross-Site Scripting (XSS) A8:2017-Insecure Deserialization A9:2017-Using Components with Known Vulnerabilities A10:2017-Insufficient Logging&Monitoring Please Contact me anytime if you are really looking forward to a quality and world-class work delivered to you. It will be a pleasure to work with you. See you online and have a great day! Warm regards, Shofiur
$250 USD v 15 dnech
5,0 (10 recenze)
5,2
5,2
Avatar uživatele
Information Technology & Information Security professional, proven Technical & Management Expertise, in a career spanning 28+ Years.
$100 USD v 3 dnech
4,9 (8 recenze)
4,3
4,3
Avatar uživatele
Hello, I'm a Network Engineer and Cybersecurity expert, and I would like to work on your project. I have experience with different exploitation of CVE-2018-5383.
$250 USD v 3 dnech
4,9 (17 recenze)
4,3
4,3
Avatar uživatele
Hello Sir, we have read your requirement and interested taking it up. We have enough Cisco, Computer Security, Network Administration, Research Writing, Technical Writing expertise, and we can complete it fast, but We were wondering if you can send me a document in prior or some more information. and the price is negotiable for this project Best Regards,
$155 USD v 3 dnech
5,0 (14 recenze)
3,5
3,5
Avatar uživatele
AM THE BEST HERE. PLEASE CONTACT FOR SAMPLES I hope you are doing fine my friend, I’d really like to assist you with this paper. I confirm that it falls within the scope of my specialization. Kindly assign/award me this project, and be calm as I work on it professionally. Waiting for your response, and hopefully start working with you. Thanks.
$111 USD v 3 dnech
4,5 (3 recenze)
3,5
3,5
Avatar uživatele
I am an Ec-council certified ethical hacker and security analyst. if you can spare a moment to go through my profile you would get a clear idea about my skills and capabilities. Talking about the work you posted,Bluetooth vulnerabilities analysis is part of what i have studied over the period and i have gone through lot of such vulnerabilities in practical as well so i can assure you quality content along with detailed explanation on how to perform them in real time as well.
$111 USD v 3 dnech
0,0 (0 recenze)
0,0
0,0

O klientovi

Pochází z PAKISTAN
Rawalpindi, Pakistan
0,0
0
Ověřená platební metoda
Členem od pro 17, 2018

Ověření klienta

Díky! Poslali jsme vám e-mailem odkaz pro získání kreditu zdarma.
Při odesílání e-mailu se něco pokazilo. Zkuste to prosím znovu.
Registrovaných uživatelů Zveřejněných projektů
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Načítání náhledu
Bylo uděleno povolení ke geolokaci.
Vaše doba přihlášení vypršela a byli jste odhlášeni. Přihlaste se znovu.