Job entails a security expert to analyze as needed up to 4 sites on a shared webhosting account. One oscommerce site is generating an iframe injection to the index file after the first body tag on an irregular basis for around 3-4 weeks. No other sites are affected, but as all four sites are on the same account, any of the sites very well may be hosting the file, code generating the injection, or vulnerability leading to the attack. The webhost cannot find the file or code as all files appear clean, no permission errors, ect. Log files do not assist in the matter. This is NOT a matter of ftp attack or stolen passwords at we have a strick ftp allow and deny that allows only our ip to access ftp. Sites on server include two wordpress sites and two oscommerce sites. The oscommerce site in question is heavily modified.
We are NOT in need of someone removing the actual iframe injection as it is easily spotted and removed by our team.
The audit is NOT to inhibit the use of the sites by customers. If you need to copy the sites to a closed system, bidder will be expected to do so. We expect the total downtime to the site as a result of modifications to be a matter of minutes, not days or hours. NO modifications, uploads, or file deletions should be enacted until authorized by our project manager.
The iframe injection problem is what we expect the bidder to isolate. If this is a shell script, modified code, xss attack, ect this should be completed first in regards to the iframe injection. Several oscommerce security patches are enabled on the oscommerce sites including Security Pro, SiteMonitor, htaccess protection, Anti XSS.
The iframe injection links appear to be outdated as the links end up redirecting to the actual Google homepage, not a spoof page. PMB for iframe code being injected.
Do not bid if you cannot finish the iframe problem within five days (or less). Do not bid if this is your first project on freelancer.
Winning bidder agrees to receive two escrow payments to be released in line with completion of project. The first payment for finding, isolating, and fixing the iframe injection problem, whatever it may be. The second to verify changes have worked, we will hold the second escrow for a week after completion, and release as long as the site is without an iframe attack. The payments will be split 50/50. Obviously if the injection persists the job will be considered incomplete and the second payment will not be released until a week has persisted without attack.
The winning bidder amount will be split into two payments. For example: If you bid $500, it will be two escrows of $250.
10 freelanceria on tarjonnut keskimäärin %project_bid_stats_avg_sub_26% %project_currencyDetails_sign_sub_27% tähän työhön
Hi Good day, Web hacker Bid. Expert in testing and securing website and server against hacking. And having extensive knowledge in iframe injection. Please check ur inbox for more details. Regards [login to view URL] B.E