Reverse white hat hacking


This role will be for gathering information on Who is remotely monitoring my phone and cloud database. The plethora of data I have will be available for review in person. Emulator is good. My hats off to them. Will discuss further if you’re interested. Price will be negotiated.

Keyword: Linux

 

Simulating WPA2-Enterprise Credential Harvesting via Evil Twin Attack in a Controlled Environment

Project Title: Simulating WPA2-Enterprise Credential Harvesting via Evil Twin Attack in a Controlled Environment We’re working on a cybersecurity graduation project that simulates a WPA2-Enterprise Evil Twin attack to demonstrate how attackers can exploit institu...

View Job
Server Cleanup & Optimization for DigitalOcean (with Portfolio Project Sorting)

N/D

View Job
Mac OSX + Active Directory Migration Consulting

Looking for a resource to guide us on the process of migrating our Mac OSX machines from our old active directory domain to a new one, and retaining same user folder. A session with us discussing and showing us the best process and explaining potential issues and how to...

View Job