Публікуйте вакансії
Наймайте без комісій
Мови/технології програмування
§ Python
§ Солідність
§ C\C++
РСУБД
§ Мій SQL
§ SQLite
Засоби розробки
Середовища віртуалізації
§ VMWare
§ VirtualBox
§ Генімотіон
§ AdroidStudio
Операційні системи
§ Microsoft Windows 95/ 98/ 2000/ XP/ 2003 Server/ Vista / 7/8/10
§ Kali Linux
§ Ubuntu
Додатки/веб-сервери
Методики
§ OWASP
§ NIST
§ ISACA
Інструменти тестування
§ Nmap
§ Нікто
§ Відрижка Люкс
§ OWASP ZAP
§ Нессус
§ Wireshark
§ Мальтего
§ Sqlmap
§ Гобустер
§ Metasploit
§ Cloudflare
§ Ковзати
§ Apktool
Обладнання
§ Мережеві технології
§ Різне технологічне обладнання
Інший
§ Технічна документація/Звіти про тестування на проникнення
§ Зворотне проектування
Mobile application for IOS and Android fitness app. Red-team pentester, worked with clients security team. Conducting the penetration testing of all new releases of apps.
§ Analyze the system and prepare scope of work
§ Determine the possibility of specific attack vectors.
§ Reverse Engineering of Android app
§ Testing security of the apps
§ Dynamic and Static testing
§ Test api and requests to the server
§ Identify a combination of high and low risk vulnerabilities
§ Prepare a detailed report on found vulnerabilities including executive summary, risk level of each vulnerability and recommendations on how to fix them.
Nmap, Wireshark, Metasploit, Nessus, Burp Suite
Auditing the smart contract of token and bridge based on etherium. ERC20 standard.
§ Analyze the system and prepare scope of work
§ Check loops for miner attacks on timestamps and orders, and transaction order dependency
§ Determine inconsistency between specification and implementation
§ Identify defective design, logic, and access control
§ Provide recommendations to improve contract security and readability.
§ Prepare a detailed report on found vulnerabilities including executive summary, risk level of each vulnerability
Slither, Manticore, Surya, SonarQube
§ Smart Contract Audit
§ Check loops for miner attacks on timestamps and orders, and transaction order dependency
§ Determine inconsistency between specification and implementation
§ Identify defective design, logic, and access control
§ Provide recommendations to improve contract security and readability
Apktool, Graudit, Genymothion, Burpsuite
Dating platform. Penetration testing to estimate WAF security and uncover vulnerabilities.
§ Check loops for miner attacks on timestamps and orders, and transaction order dependency
§ Determine inconsistency between specification and implementation
§ Identify defective design, logic, and access control
§ Provide recommendations to improve contract security and readability
Apktool, Graudit, Genymothion, Burpsuite