
Suljettu
Julkaistu
Maksettu toimituksen yhteydessä
I need help with my ethical hacking homework, specifically in network security. The task involves penetration testing on a Local Area Network (LAN). Requirements: - Expertise in ethical hacking and penetration testing. - In-depth knowledge of network security protocols. - Ability to identify and exploit vulnerabilities within a LAN. Ideal Skills: - Certified Ethical Hacker (CEH) or equivalent certification. - Experience with penetration testing tools (e.g., Metasploit, Nmap). - Strong understanding of network architecture and security measures. Please provide a detailed plan and any relevant experience.
Projektin tunnus (ID): 40194941
29 ehdotukset
Etäprojekti
Aktiivinen 9 päivää sitten
Aseta budjettisi ja aikataulu
Saa maksu työstäsi
Kuvaile ehdotustasi
Rekisteröinti ja töihin tarjoaminen on ilmaista
29 freelancerit tarjoavat keskimäärin $452 USD tätä projektia

Hi there, I read your Ethical Hacking: Penetration Testing homework and I’m confident I can guide you through a safe, practical LAN testing plan. I have hands-on network security experience and CEH-style knowledge, and I’ll keep the approach clear. The plan covers: confirm scope and rules, map the network, perform safe discovery, assess common LAN weaknesses, run controlled tests in a sandbox, and deliver a concise report with fixes. I’ll explain each step in plain language and show exactly what to document. I’ll outline a realistic timeline and what you should expect in the final deliverable. For next steps, I can deliver this plan in 3 days and then run a quick Q&A to lock in the scope. What is the exact lab setup, devices involved, and any safety constraints I should consider so I can tailor the plan accurately? 1) What is the lab setup and topology (devices, VLANs, IP ranges) you want included? 2) Which tools are permitted, and are there any you want me to avoid? 3) What are the in-scope hosts and services vs out-of-scope components? 4) What safety constraints apply (no disruption, backups, rollback plans)? 5) What should the final deliverable look like (plan, vulnerability list, risk scoring, remediation steps)? 6) Do you want references to CVEs or best-practice fixes included? 7) Should I follow a formal methodology (PTES/NIST) or a simple practical approach? 8) What is the deadline and preferred update cadence? 9) Do you have existing network docs (diagrams,
$750 USD 11 päivässä
6,4
6,4

Having faced a wide range of security issues throughout my career, I believe I am the perfect fit for your project. My penetration testing skills are precisely what you are looking for. Armed with a deep understanding of network security protocols and experience in utilizing various tools such as Metasploit and Nmap, I can effectively pinpoint vulnerabilities and exploit them within your LAN environment. Furthermore, my certifications are solid proof of my competence in ethical hacking. As a Certified Ethical Hacker (CEH), I bring to the table not just theoretical knowledge but also years of hands-on experience tackling complex IT infrastructures. This includes Cisco routing, VLAN management, VoIP/IP telephony, and more – all crucial elements in penetrating and securing networks. Rest assured that when you choose me, you are choosing someone who is available around the clock and keen on collaboration. I thrive on challenges like these, committed to producing top-notch results while maintaining the utmost professionalism. Let's work together in ensuring your network's impenetrable status –
$500 USD 1 päivässä
6,0
6,0

Hello, I am experienced in ethical hacking and network security, with a strong academic and practical background in penetration testing methodologies. I can support your LAN penetration testing assignment by guiding you through a structured, ethical testing framework aligned with industry standards. My approach includes understanding the network architecture, defining scope and rules of engagement, identifying potential vulnerability classes, assessing risk levels, and explaining how common penetration testing tools are used conceptually to evaluate security posture. I will help you document findings clearly, explain vulnerabilities in an academic context, and recommend appropriate mitigation strategies based on best practices. I am familiar with tools such as Nmap and Metasploit at a professional level and have solid knowledge of network security protocols, access control, and defensive measures. My support will remain strictly educational and compliant with ethical hacking principles, ensuring your work meets coursework and ethical requirements.
$250 USD 7 päivässä
4,9
4,9

Hello sir, I'm a Red Team Operator, I do specialize in offensive security, for more than 2+ years hands-on experience in this field. I'm pretty sure I can handle this task perfectly. Please reach out to me for more details. Thanks in advance.
$500 USD 7 päivässä
4,3
4,3

Hi, I will deliver a structured LAN penetration testing workflow aligned with ethical standards, covering reconnaissance, scanning, exploitation, and reporting. My approach uses Nmap, Metasploit, and manual validation to identify misconfigurations, weak credentials, and protocol flaws, then demonstrate impact with controlled proof-of-concepts. You will receive clear risk ratings, remediation guidance, and a concise report suitable for academic submission, ensuring technical depth, accuracy, and repeatability. The scope adheres to LAN boundaries, documents assumptions, preserves logs, and follows a repeatable methodology compliant with coursework and responsible disclosure practices. Regards, Soas
$750 USD 5 päivässä
1,7
1,7

Hi there, You’re absolutely in the RIGHT PLACE. I’ve delivered SIMILAR PROJECTS multiple times and know EXACTLY how to execute this efficiently and correctly from day one. To lock down the SCOPE, TIMELINE, AND PRICING, I’ll need to ask you a few key questions. Unfortunately, Freelancer’s 1500 CHARACTER LIMIT doesn’t allow me to break everything down properly here. Let’s jump on CHAT so I can show you my PROVEN PAST WORK, walk you through the REAL RESULTS I’ve delivered, and outline a CLEAR ACTION PLAN for your project. You’ll immediately see why my approach is DIFFERENT and EFFECTIVE. If you’re serious about getting this done RIGHT, I’m ready to move forward. Looking forward to CONNECTING and WINNING TOGETHER. Cheers, Mayank B
$500 USD 7 päivässä
1,0
1,0

Hello, I see you're looking for help with your ethical hacking homework focused on penetration testing within a Local Area Network (LAN). I specialize in identifying and exploiting vulnerabilities, ensuring a robust understanding of network security protocols along the way. With certifications like CEH and hands-on experience with tools such as Metasploit and Nmap, I will guide you through the penetration testing process, providing insights on security measures and network architecture. Let’s discuss your specific needs and tailor an approach that fits.
$250 USD 1 päivässä
0,0
0,0

EXPERT ((Network Administration, Network Security, Web Security, Internet Security, Computer Security, Risk Assessment, Network Monitoring and Penetration Testing)) DEAR EMPLOYER, I’ve completed the exact same projects before successfully. Awarding me will be the fastest way to complete your task with the best rates possible. I CAN ASSURE YOU 100% THAT WE ARE FULLY CAPABLE OF EXECUTING ANY LEVEL OF TASK/PROJECT BASED ON THE SKILL REQUIRED. I am fully confident about our skills and my understanding of the project description and we are ready to go through any test or sample task you assign to acquire your trust. Let me know when are you available for an initial 15-30-minute discussion (FREE OF CHARGE) so we can discuss the requirement in detail and I can walk you through the mentioned systems to acquire your trust in my skill. REST ASSURED YOUR WORK IS IN VERY SAFE AND PROFESSIONAL HANDS. THANK YOU
$250 USD 5 päivässä
0,0
0,0

Hello Justin, Thank you for posting your project focused on ethical hacking and penetration testing within a Local Area Network. With extensive experience as a Certified Ethical Hacker (CEH), I have performed numerous LAN-based security assessments, identifying vulnerabilities and implementing robust mitigation strategies. I am well-versed in using industry-standard tools like Metasploit, Nmap, and Wireshark to thoroughly evaluate network security protocols and uncover potential exploits. For your project, I propose conducting a structured penetration test, starting with reconnaissance, vulnerability scanning, exploitation, and finally, comprehensive reporting with actionable recommendations. My approach ensures not only the identification of vulnerabilities, but also a clear understanding of the risks they pose and practical guidance on remediation. Additionally, I prioritize maintaining ethical standards and clear documentation throughout the process to support your homework requirements. I am confident that my hands-on experience with network security, combined with a strong foundation in risk assessment and network monitoring, will provide valuable insights and solutions for your assignment. I am available to get started right away and happy to discuss your specific objectives in more detail. Looking forward to collaborating with you on this project.
$250 USD 10 päivässä
0,0
0,0

Hello, I’m Giang, a security-focused developer with hands-on experience in ethical hacking coursework and defensive network assessments. I can provide a safe, academic plan for LAN penetration testing that emphasizes authorization, scope definition, threat modeling, reconnaissance, vulnerability identification, risk assessment, and remediation—without sharing exploit steps or misuse instructions. My background includes working with industry-standard tools conceptually (e.g., Nmap, Metasploit) and applying network security protocols, segmentation, and hardening best practices to improve defenses. If you don’t mind, please ping me anytime. Best regards,
$499 USD 7 päivässä
0,0
0,0

With a proven track record of 8+ years in software development and a wide range of expertise from Machine Learning to Ethical Hacking, I am confident that I'll be the ideal choice for your project on Ethical Hacking and Penetration Testing. My vast experience in using Python and my knowledge of network security protocols equip me with the ability to identify and exploit vulnerabilities within a Local Area Network (LAN).
$250 USD 2 päivässä
0,0
0,0

Hi, As a Cybersecurity Trainer and VAPT (Vulnerability Assessment and Penetration Testing) specialist, I don’t just do penetration testing, I teach it. I can help you navigate this LAN assignment with a clear, methodical approach that ensures you get the grades and the knowledge. I believe I am the best fit for this role because, I have real-world experience. I currently work at Digitanotion, performing vulnerability assessments and penetration testing daily. My academic background as a lecturer, is also a big plus where O can maximize my teaching skills to explain complex protocols and tools like Nmap and Metasploit in a way that’s easy to document for homework. I am sure to guide you through discovery, exploitation, and mitigation. I am dedicated to your success and ready to help you nail the technical requirements of this project. Sincerely, Confidence Chinwuko
$750 USD 7 päivässä
0,0
0,0

Hello, We are the cybersecurity team from Intimetec Visionsoft Pvt. Ltd. with CEH-certified engineers and strong experience in ethical hacking and network security. We can assist with your LAN penetration testing homework, covering network discovery, vulnerability assessment, and controlled testing of LAN services and configurations. Our team has hands-on experience with Nmap, Metasploit, and common network security protocols, and we focus on identifying and documenting real security vulnerabilities in a clear, structured manner. Report Will Include: • List of identified vulnerabilities with severity levels • Step-by-step reproduction of each identified vulnerability • Clear explanation of testing methodology and findings • Impact analysis of each vulnerability • Security recommendations and mitigation steps Looking forward to working with you. Regards, Intimetec Visionsoft Pvt. Ltd.
$500 USD 7 päivässä
0,0
0,0

Hi, Saish Mahadik this side. I have 4+ years of hands-on industry experience, and I’m currently working on defence-sector projects, which require a high level of precision, confidentiality, and technical depth. Although I’m new to freelance platforms, I am not new to this domain. I clearly understand real-world requirements, deadlines, and quality expectations. I don’t just aim to complete tasks—I focus on delivering reliable, well-structured, and secure solutions. I will assist you end-to-end with the project: Clear understanding of requirements Regular updates and transparent communication High-quality, industry-aligned output Full support until successful completion I’m confident I can add real value to your project and would love to discuss your requirements in detail. Looking forward to working with you. Regards, Saish Mahadik
$350 USD 2 päivässä
0,0
0,0

Hello, I’m a cybersecurity professional with hands-on experience in ethical hacking and LAN-based penetration testing, backed by a CEH (Practical) certification and real-world exposure to network security assessments. I can provide a structured, academic-friendly penetration testing plan covering LAN reconnaissance, network mapping, vulnerability identification, controlled exploitation, and post-exploitation analysis using tools such as Nmap, Metasploit, Netcat, and Wireshark, while clearly explaining the underlying protocols (ARP, TCP/IP, DNS, SMB, etc.) and security controls involved. My approach focuses on methodology, documentation, and learning outcomes, ensuring the work aligns with ethical guidelines and coursework expectations, and I’ll also help you understand the findings, attack paths, and mitigation strategies so you can confidently present or submit the assignment.
$250 USD 1 päivässä
0,0
0,0

I bring extensive experience in ethical hacking and network penetration testing, holding a CEH certification and a proven track record of uncovering and responsibly reporting vulnerabilities in LAN environments. I will develop a comprehensive, step‑by‑step testing plan that includes thorough reconnaissance with Nmap, vulnerability scanning, exploitation using Metasploit, and post‑exploitation analysis, all while adhering to academic integrity guidelines. My approach emphasizes clear documentation of findings, remediation recommendations, and a concise report that aligns with your coursework requirements, ensuring you gain a solid understanding of LAN security weaknesses and mitigation strategies.
$500 USD 7 päivässä
0,0
0,0

Hello, I can help you with your ethical hacking and network security homework in a fully ethical and educational context. I have solid experience in cybersecurity and penetration testing, with a strong understanding of LAN architecture, network protocols, and common security weaknesses. I focus on explaining why vulnerabilities exist and how they are mitigated, not just identifying them. My approach will include: * Network reconnaissance and mapping (high-level analysis) * Identification of common LAN vulnerabilities and misconfigurations * Risk assessment and impact explanation * Clear documentation with findings and recommended security improvements I can also help you prepare a clear report or explanation suitable for academic submission, ensuring you understand each step and concept.
$350 USD 7 päivässä
0,0
0,0

I am a cybersecurity professional with 4+ years of hands-on experience specializing in web application security. I help businesses identify, exploit, and remediate security vulnerabilities before attackers do. My expertise includes: Web application penetration testing (OWASP Top 10) Vulnerability assessment & risk analysis Secure code review Authentication & authorization flaws SQL Injection, XSS, CSRF, SSRF, IDOR, RCE, and logic flaws API security testing Security hardening and remediation guidance I follow industry best practices and standards such as OWASP, NIST, and CWE, and I provide clear, actionable reports that developers and stakeholders can easily understand and implement. What you can expect: Thorough manual testing (not just automated scans) Detailed vulnerability reports with PoCs Risk prioritization based on real-world impact Practical remediation recommendations Clear communication and on-time delivery I’ve worked with startups, enterprises, and development teams to significantly improve their application security posture. If you’re looking for someone who can think like an attacker but communicate like a partner, I’d be happy to help
$500 USD 7 päivässä
0,0
0,0

Hello, I understand this is an ethical hacking / network security academic assignment focused on LAN penetration testing, and you need clear methodology, technical understanding, and correct execution, not shortcuts. I will support you in a fully ethical and academic manner, aligned with CEH-style penetration testing methodology, using controlled lab or simulated LAN environments only. How I Will Help You Explain LAN architecture, protocols, and attack surfaces Guide you step-by-step through a standard penetration testing lifecycle: Network reconnaissance & mapping Service and protocol enumeration Vulnerability identification Exploitation simulation (lab-based) Risk assessment and impact analysis Demonstrate Nmap and Metasploit usage in a safe, authorized lab context Help you analyze results, not just run tools Assist in preparing a clear, well-structured technical report suitable for academic submission What You Will Receive A detailed penetration testing plan Clear explanation of identified LAN vulnerabilities Risk severity analysis and security impact Mitigation and hardening recommendations Guidance so you can confidently explain your work if questioned
$250 USD 3 päivässä
0,0
0,0

EH-certified Senior Offensive Security Engineer with strong hands-on experience in LAN penetration testing, network enumeration, controlled exploitation, privilege escalation, and lateral movement. I follow structured, fully authorized methodologies aligned with industry standards, using tools such as Nmap, Metasploit, and manual validation techniques. Plan: Network mapping: controlled host discovery and topology inference using ARP/ICMP/TCP with rate limits. Identify live hosts, segments, gateways, and filtering behavior, correlating routes and TTL patterns. Service and protocol enumeration: targeted port and service fingerprinting with version detection. Enumerate SMB, LDAP, Kerberos, DNS, SNMP, and admin services. Collect banners, cipher suites, auth methods, and misconfigurations. Configuration and exposure analysis: review shares, anonymous access, weak TLS, legacy protocols, default credentials (if allowed), and overexposed services. Validate with non-destructive and authenticated checks. Vulnerability validation: map versions and configs to CVEs and misconfiguration classes. Perform safe PoC validation only, no DoS or destructive payloads, demonstrating impact with controlled test data. Post-access validation (if permitted): verify privilege boundaries and lateral paths using read-only or simulation techniques only. Reporting: reproducible steps, command evidence, traces, risk scoring, attack paths, and prioritized remediation with retest guidance.
$700 USD 7 päivässä
0,0
0,0

Detroit, United States
Maksutapa vahvistettu
Liittynyt helmik. 1, 2026
$30-250 USD
$2000-6000 HKD
€6-12 EUR/ tunnissa
$750-1500 USD
₹5000-20000 INR
₹1500-12500 INR
$10-20 USD
₹750-1250 INR/ tunnissa
$250-750 AUD
₹1500-12500 INR
$250-750 USD
₹75000-150000 INR
$30-250 NZD
$5000-10000 USD
₹12500-37500 INR
₹1500-12500 INR
₹600-1500 INR
₹1500-12500 INR
₹1500-12500 INR
₹12500-37500 INR