
Suljettu
Julkaistu
Maksettu toimituksen yhteydessä
Both my Linux-based laptop and my iOS phone are showing clear signs of compromise—unexpected network activity, pop-ups I can’t trace, and login alerts from locations I’ve never visited. I’ve tried standard antivirus scans and OS updates, but the intrusions keep resurfacing, so I need a security specialist who can dive deeper. The work I’m asking for covers three phases: • Investigation & Evidence Capture – Conduct a remote forensic sweep of the Linux machine (terminal-level tools such as chkrootkit, rkhunter, Wireshark, auditd, etc.) and the iPhone (device logs, mobile forensics toolkit or config profiles). – Identify and document any malware, rootkits, rogue services, or suspicious network routes. • Removal & Recovery – Safely eliminate every confirmed threat without forcing a full wipe unless absolutely necessary. – Patch vulnerabilities, lock down SSH or other exposed services, and restore trusted system files. – Ensure the iPhone is clean, free of spy profiles or side-loaded configuration files, and fully updated. • Hardening & After-Care – Deliver a concise, plain-English report showing what was found, what was fixed, and how the compromise happened. – Provide a step-by-step hardening checklist (firewall rules, SELinux/AppArmor settings, 2FA recommendations, secure backup strategy, ongoing monitoring tools) to keep both devices safe. I can be available for live sessions via Zoom or any screen-sharing tool of your choice. If you have verifiable experience in incident response on Linux and iOS, plus a solid track record of helping individuals recover their devices, I’d like to start as soon as possible.
Projektin tunnus (ID): 40190118
26 ehdotukset
Etäprojekti
Aktiivinen 10 päivää sitten
Aseta budjettisi ja aikataulu
Saa maksu työstäsi
Kuvaile ehdotustasi
Rekisteröinti ja töihin tarjoaminen on ilmaista
26 freelancerit tarjoavat keskimäärin $1 137 USD tätä projektia

Hello, I understand you're dealing with a suspected security breach on your Linux laptop and iPhone. I will conduct a remote forensic sweep for both devices, identify malware, rootkits, rogue services, or suspicious network routes, and capture evidence. On the Linux side I'll use chkrootkit, rkhunter, auditd, and Wireshark; on the iPhone I'll review device logs, profiles, and available mobile-forensics data. In Removal & Recovery I'll eliminate every confirmed threat without a full wipe unless absolutely necessary, patch vulnerabilities, secure SSH and exposed services, and restore trusted system files. For the iPhone I'll ensure no spy profiles or side-loaded configuration files remain and apply the latest updates. In Hardening & After-Care I'll deliver a plain-English report of findings, fixes, and how the compromise happened, plus a practical hardening checklist (firewall rules, SELinux/AppArmor considerations, 2FA, secure backup strategy, ongoing monitoring). I can work remotely and offer live sessions via Zoom or your preferred screen-sharing tool. Please review and provide input: Could you share any known indicators of compromise (IPs, domains, malware hints) and confirm your preferred times for live sessions? Best regards,
$1 500 USD 21 päivässä
7,0
7,0

As one of the top-tier cybersecurity engineers specializing in incident response, computer security, and network security, l am highly skilled in detecting and eliminating unauthorized access, malware, rootkits, and all forms of intrusions. My certifications as a Digital Security & Forensics expert, Certified Ethical Hacker (CEH), and my extensive experience in Web Application Security make me a perfect fit for this task. Over the past decade, l have delivered comprehensive cybersecurity solutions tailored to meet unique client needs. I specialize in conducting white and grey hat penetration testing along with developing and implementing secure policies that enhance network safety. In addition to my technical capabilities, l also pride myself on my communication skills. I understand the importance of delivering concise yet detailed reports - something essential when outlining what was found during the investigation phase and how it was effectively addressed. Plus, with me, you can always count on getting the "why" behind the recommended changes - demystifying the often convoluted world of digital security. Rest assured that by choosing me for your Linux-based laptop and iOS phone security recovery project, you are partnering with an experienced professional dedicated to delivering impactful results that will keep your devices safeguarded even after completion.
$1 500 USD 15 päivässä
7,4
7,4

As an accomplished technology professional with deep expertise in computer security, Linux and network security, I am in a prime position to tackle this complex project head-on. With over a decade's worth of experience in the industry, I have not only honed my technical skills but developed a knack for resolving even the most intricate issues. The fact that I am well-versed in incident response on both Linux and iOS is crucial for your current requirement. Your project entails three phases: Investigation & Evidence Capture, Removal & Recovery, and Hardening & After-Care. Through my extensive knowledge of tools like chkrootkit, rkhunter, Wireshark, auditd along with mobile forensics toolkit or config profiles, I am competent to uncover all hidden threats and document each one meticulously. Efficiently eliminating them without resorting to a full device wipe is my priority. Moreover, my responsibility doesn't end at recovery; it extends to future-proofing your devices. Post-recovery, I will furnish you with comprehensive reports that not only detail what was discovered and fixed but also provide step-by-step hardening checklists tailored to your specific devices to minimize any potential risks moving forward. Given my drive for continuous self-improvement and the use of state-of-the-art best practices - I am ideally suited for this project and its unique needs. Let's get started now and make your devices hacker-proof!
$750 USD 7 päivässä
7,1
7,1

⭐⭐⭐⭐⭐ Hello Valuable Client, Your situation calls for disciplined incident response, not guesswork. CnELIndia, led by Raman Ladhani, has hands-on experience handling exactly these multi-device compromise cases across Linux and iOS. How we will complete this successfully: Investigation & Evidence Capture: We start with a controlled remote session to preserve evidence. On Linux, we run terminal-level forensics (chkrootkit, rkhunter, auditd review, process and persistence checks, Wireshark traffic analysis). On iOS, we review device logs, configuration profiles, MDM indicators, and network behaviors to identify spyware or abuse without jailbreaking. All findings are documented with timestamps. Removal & Recovery: Confirmed threats are surgically removed, persistence mechanisms neutralized, and system integrity restored. We harden SSH, rotate credentials, patch weak services, and validate trusted binaries. iOS is verified clean of malicious profiles and fully secured without a wipe unless evidence demands it. Hardening & After-Care: You receive a clear report explaining what happened and why, plus a practical hardening checklist (firewall rules, AppArmor/SELinux guidance, 2FA, backups, and monitoring). We work live via Zoom and can start immediately to stabilize and secure both devices.
$1 125 USD 7 päivässä
5,2
5,2

With my expertise in Linux, Computer Security, Technical Support, Ubuntu, and Internet Security, I am well-equipped to tackle the project "Secure Hacked Laptop & iPhone." I am confident in my ability to conduct a thorough investigation, remove all threats, and provide comprehensive after-care to ensure the security of your devices. Rest assured, I am flexible with the budget and eager to commence work promptly. Please review my extensive 15-year-old profile to see my track record of client satisfaction. Let's discuss the details and get started right away. Please go through my profile its 15 years old see the work I did over the years. No Win No Fee means that your satisfaction is my utmost priority. Lets discuss the job details. Moreover, I am willing to start the job and perform tasks without even being hired; it is just to show my commitment to this project. Looking forward to hear from you.
$1 050 USD 21 päivässä
4,6
4,6

Hello, I recently assisted a client who experienced repeated Linux compromises and suspicious iOS behavior, where I performed remote forensic analysis, identified hidden persistence mechanisms, cleaned infected services, and hardened both environments to prevent reinfection. The result was fully restored systems and a documented security baseline they could trust. For your case, I will run terminal-level forensic tools on Linux, analyze network traffic and logs, inspect startup services and cron jobs, and review iOS logs and configuration profiles to locate any malicious artifacts. I will safely remove confirmed threats, close exposed services, patch vulnerabilities, and verify system integrity. You will also receive a clear report and a practical hardening checklist to maintain long-term security. I can start your project immediately and I am committed to fast, careful remediation and transparent communication throughout the process. Best regards, Elenilson
$850 USD 7 päivässä
4,2
4,2

On the subject of security, I understand its paramount importance in this digital age. My licensure for the Sacramentary Country Permit demonstrates my commitment to responsible practices. I may not have experience specifically in incident response on Linux and iOS, but as a structural and civil engineer, I'm experienced in comprehensive analysis and intricate problem-solving—essential skills when it comes to investigating the nuances of compromised devices. I am wholeheartedly devoted to ensuring your laptop and iPhone are thoroughly examined and restored to full security. My experience with advanced simulations and modeling will prove valuable for identifying unseen vulnerabilities. As your security specialist, I'll provide more than just a clean-up; I'll deliver detailed reports of what was found and any actions taken, while also providing future steps to maintain device safety. In short, my adaptability, deep-dive approach, and dedication make me uniquely qualified for this project.
$1 000 USD 3 päivässä
4,0
4,0

Hello, I understand you’re looking for an experienced security specialist to investigate, clean, and harden both a Linux laptop and an iPhone that are showing persistent signs of compromise. I have direct hands-on experience in incident response, digital forensics, and post-breach recovery across Linux environments and iOS devices, with a focus on precision, evidence preservation, and long-term security. My process begins with a structured forensic investigation using trusted terminal-level tools to identify rootkits, malicious services, unauthorized persistence mechanisms, and abnormal network behavior on Linux, while carefully analyzing iOS logs, configuration profiles, and system indicators for spyware or misuse. All findings are documented clearly before any remediation begins. Threat removal is handled surgically to eliminate confirmed compromises while preserving data integrity, closing exposed services, restoring trusted binaries, and ensuring the mobile device is fully verified and up to date. After recovery, I deliver a clear, non-technical report explaining what occurred, how access was gained, and what was fixed. I also provide a practical hardening checklist covering firewall rules, access controls, secure authentication, backup strategy, and ongoing monitoring so both devices remain protected going forward. Thanks, Asif
$1 500 USD 11 päivässä
4,0
4,0

Ahlan, i;d love to help you investigate, mitigate, protect, make honey pots and try to figure out who and what is leaked. ready to start asap, letsa brain storm the details and stop the leak.
$1 125 USD 7 päivässä
4,4
4,4

Hi, I can do this. With extensive experience in incident response for both Linux and iOS devices, I am well-equipped to address your security concerns. **Investigation & Evidence Capture:** I will perform a thorough forensic analysis of your Linux laptop using tools like chkrootkit and Wireshark, alongside mobile forensics on your iPhone to identify any threats. **Removal & Recovery:** I will safely eliminate confirmed threats, patch vulnerabilities, and ensure both devices are secure without unnecessary data loss. **Hardening & After-Care:** You will receive a detailed report outlining findings and a hardening checklist to prevent future compromises. I am available for live sessions via Zoom or any preferred tool to facilitate this process. Let’s get started on securing your devices. Ashnasajid
$1 125 USD 3 päivässä
2,9
2,9

Hello. How are you? We're very interest in your project. Here's how we work. 1. we comply 100% with client's requirements 2. we provide the first work result within 12 hours 3. we provide updated work progress everyday 4. we can make call if you wanna that There are 23 members in my team and each member has unique skill each other. we work with 8 -10 projects everyday. Then we will wait for a good news. Thanks in advance.
$1 200 USD 10 päivässä
0,0
0,0

As an experienced and highly skilled Full Stack Software Engineer with a particular focus on computer security, I believe I would be an ideal choice for your project. With over 10 years of experience, I have a deep understanding of the various layers of system vulnerabilities and know how to efficiently eliminate them without compromising the integrity of your valuable data. My expertise extends to almost all dimensions of technology stack - from hardware-level programming and kernel engineering to building cloud dashboards and mobile apps. This hands-on experience gives me a unique advantage in conducting reliable remote forensics, identifying malware or any rogue services, and patching exposed security vulnerabilities as required in the first phase. In the second phase, I ensure precise elimination of the threats while retaining your data without hasty wipes. Additionally, my love for details and concise yet comprehensive documentation allows me to provide you with a step-by-step hardening checklist tailored for your devices in the aftercare stage. My knowledge about secure firmware development (including OTA updates), cryptography concepts such as 2FA, makes me confident that I can furnish you with robust solutions ensuring end-to-end safety. Let's get started on this project immediately via live sessions over screen-sharing tools that you prefer!
$1 000 USD 5 päivässä
0,0
0,0

Hello, How are you? I have checked your job description and I’m confident I can complete exactly what you need. I have extensive experience with digital forensics and computer security, particularly with Linux and iOS devices. I understand the intricacies involved in investigating and resolving security issues, especially regarding unexpected network activities and unauthorized access alerts. I can effectively conduct a forensic sweep of your laptop using terminal-level tools like chkrootkit and rkhunter, as well as mobile forensics for your iPhone to identify any threats. I will ensure that all confirmed threats are safely removed and will provide you with a comprehensive report detailing what was found, fixed, and steps to prevent future incidents. Additionally, I will develop a hardening checklist tailored to your needs to enhance the security of both your devices. I think this job is an ideal match with my skills and experience. Please send me a message so that we can discuss more. Thanks,
$1 000 USD 15 päivässä
0,0
0,0

EXPERT ((Technical Support, Digital Forensics, Internet Security, Security, Network Security, Linux, Ubuntu and Computer Security)) DEAR EMPLOYER, I’ve completed the exact same projects before successfully. Awarding me will be the fastest way to complete your task with the best rates possible. I CAN ASSURE YOU 100% THAT WE ARE FULLY CAPABLE OF EXECUTING ANY LEVEL OF TASK/PROJECT BASED ON THE SKILL REQUIRED. I am fully confident about our skills and my understanding of the project description and we are ready to go through any test or sample task you assign to acquire your trust. Let me know when are you available for an initial 15-30-minute discussion (FREE OF CHARGE) so we can discuss the requirement in detail and I can walk you through the mentioned systems to acquire your trust in my skill. REST ASSURED YOUR WORK IS IN VERY SAFE AND PROFESSIONAL HANDS. THANK YOU
$750 USD 5 päivässä
0,0
0,0

Hi, I completely understand your concern regarding the ongoing security compromise of both your Linux laptop and iPhone. With extensive experience in digital forensics and incident response on Linux and iOS devices, I can perform a thorough remote forensic sweep using advanced tools like chkrootkit, rkhunter, Wireshark, and mobile forensics toolkits. I'll precisely identify and eliminate threats, patch vulnerabilities, and harden your systems with a clear, actionable report and checklist ensuring sustained security. I am ready to begin immediately and support live via Zoom as required. Could you specify the Linux distribution and version on your laptop, and the iOS version on your iPhone? Thanks, Roshan
$1 250 USD 10 päivässä
1,2
1,2

Hello, I hope you are doing well. I’m a security professional focused on Linux and iOS incident response. I specialize in remote forensics, evidence capture, and precise remediation that minimizes disruption. I’ve conducted Linux sweeps with chkrootkit, rkhunter, Wireshark, and auditd, plus iPhone log/config analysis to detect malware, rootkits, rogue services, and suspicious routes. I’ll document findings clearly without unnecessary data loss. I will remove threats, patch vulnerabilities, lock down exposed services, and restore trusted files. I’ll ensure iPhone cleanliness, updates, and a plain-English hardening report with a practical checklist (firewall, 2FA, backups, monitoring). Please contact me to discuss details. I’m ready to start soon. Best regards, Billy Bryan
$750 USD 13 päivässä
0,0
0,0

I’ve dealt with similar cases where symptoms like unexpected network traffic and unfamiliar login alerts signaled stealthy footholds rather than just surface malware. One step beyond scanning is tracing suspicious routes and services that linger beneath the OS radar. I see the need for a thorough, terminal-level forensic audit on your Linux system coupled with detailed mobile forensics on your iPhone. Done right means eliminating threats cleanly, no unnecessary wipes, while restoring trust and preventing repeat intrusions with clear, actionable hardening steps. In past breaches, I’ve balanced aggressive threat hunting with minimal disruption, using tools like chkrootkit, auditd, and mobile config analysis to precisely target root causes. Offering remote sessions keeps communication transparent and efficient without costly overhead. What I’ll deliver: ✅ Comprehensive forensic report of all findings and attack vectors ✅ Removal of all detected malware and rogue configurations without forced resets ✅ Customized hardening checklist tailored for your devices and usage ✅ Clear, plain-English explanation so you can maintain security confidently What’s the most urgent device for you to secure first? Let’s schedule a quick sync to clarify your priorities. Happy to discuss this further and align before moving ahead. Kind regards Eliza.
$1 150 USD 3 päivässä
0,0
0,0

Hello ss973, I am Vishal Maharaj, a Computer Security expert with 20 years of experience in Linux, Network Security, and Ubuntu. I have carefully reviewed your project requirements regarding securing your hacked laptop and iPhone. To address the issues, I propose to conduct a thorough investigation using advanced forensic tools like chkrootkit, rkhunter, Wireshark, and mobile forensics toolkits. I will identify and document any malware, rootkits, or suspicious network activities. Once the threats are confirmed, I will safely remove them, patch vulnerabilities, and provide a detailed report on the findings and solutions. Additionally, I will provide a comprehensive hardening checklist to prevent future compromises. Please initiate a chat to discuss this further. Cheers, Vishal Maharaj
$1 000 USD 10 päivässä
0,0
0,0

Hi there! Are you also interested in setting up real-time alerts or automated scripts to catch suspicious activity early on after the cleanup? Regardless, this is definitely something that I feel confident delivering on, given my past experience. I would love to discuss your project further! Looking forward hearing from you. Kind Regards, Corné
$750 USD 14 päivässä
0,0
0,0

I’m a Senior DevSecOps / Incident Response Engineer with 8+ years of hands-on experience investigating and remediating real security compromises on Linux systems and iOS devices. I can handle this work end to end: Investigation & Evidence Remote forensic analysis of the Linux laptop using low-level tools (process, network, log, and persistence checks) Review of iOS device logs, configuration profiles, and security settings to identify spyware, rogue profiles, or account abuse Clear documentation of any confirmed malware, persistence mechanisms, or suspicious activity Removal & Recovery Safe removal of verified threats without forcing a full wipe unless absolutely necessary Lockdown of exposed services, credentials, and access paths Validation that the iPhone is clean, profile-free, and fully updated Hardening & After-Care Plain-English report explaining what was found, how the compromise occurred, and what was fixed Practical hardening checklist covering firewall rules, system protections, account security, backups, and ongoing monitoring I work carefully, explain findings clearly, and focus on restoring trust and long-term safety, not quick fixes. I’m available for live Zoom or screen-sharing sessions and can start immediately.
$1 125 USD 7 päivässä
0,0
0,0

Riyadh, Bahrain
Maksutapa vahvistettu
Liittynyt tammik. 30, 2026
₹5000-20000 INR
$15-25 USD/ tunnissa
₹12500-37500 INR
₹1500-12500 INR
$10000-20000 USD
₹5000-10000 INR
$250-750 AUD
₹1500-12500 INR
£250-750 GBP
₹75000-150000 INR
$250-750 USD
$250-750 AUD
$30-250 CAD
₹150000-250000 INR
$30-250 USD
$30-250 USD
₹12500-37500 INR
₹12500-37500 INR
₹1500-12500 INR
$30-250 AUD