Find Jobs
Hire Freelancers

Analyze log files in order to find security issues. (WP website was hacked)

$8-15 USD / hour

Closed
Posted over 9 years ago

$8-15 USD / hour

My WordPress Website was hacked and used for Phishing. I deleted the injected Securepay files, but I would like to know where the weak points are that made this possible. I have security meassures on place like secret admin url, no "admin" user, etc. But now I need somebody that can look at the log files and detect where the attack came through (where are the security holes) so I can prevent it for the future. Thanks, Demian
Project ID: 6682860

About the project

6 proposals
Remote project
Active 9 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
6 freelancers are bidding on average $21 USD/hour for this job
User Avatar
Dear Sir, I have read your Project Description and can you provide me URL of your WordPress website or access to the source code? After reviewing the files, we can give you our estimated Man-Hours. Look forward to hearing from you. Regards, YK LEADconcept
$20 USD in 40 days
5.0 (25 reviews)
7.8
7.8
User Avatar
share ur file as i am a licenced peniteration tester certified from USA with ec- council with ceh,esca,chfi . share me the details we can do patches of loopholes too.
$33 USD in 68 days
0.0 (0 reviews)
0.0
0.0
User Avatar
We are group of highly qualified verified web developers and security analysts. We will carry penetration test in a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system vulnerabilities, including OS, service and application flaws, improper configurations, and even risky end-user behavior. Our three way security audit follow following steps 1: Determining the feasibility of a particular set of attack vectors 2:Identifying higher-risk vulnerabilities that result from a combination of lower-risk vulnerabilities exploited in a particular sequence 3:Identifying vulnerabilities that may be difficult or impossible to detect with automated network or application vulnerability scanning software 4: Testing the ability of network defenders to successfully detect and respond to the attacks A fully documented report will be complied and handed over at end of project
$12 USD in 3 days
0.0 (0 reviews)
0.0
0.0

About the client

Flag of ECUADOR
Ecuador
0.0
0
Member since Aug 3, 2014

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.