Wireshark ackprojekty

Filtruj

Moje ostatnie wyszukiwania
Pokaż:
Budżet
dla
dla
dla
Typ
Umiejętności
Języki
    Stan Projektu
    1,813 wireshark ack znalezione projekty, cennik w USD
    Napisz oprogramowanie Zakończone left

    1. Aplikacja uruchamiana w trybie usługi Windows (Win7,8,10, server) - bramka HL7 FUNKCJA NASŁUCHU 2. Nasłuchuje TCP na wskaz...Otrzymany pakiet zapisuje do pliku txt o unikatowej nazwie we wskazanym w pliku konfiguracyjnym folderze i kodowaniu znaków. b) Odsyła w ramach tej samej sesji IP:port pakiet z odpowiedzią ACK. FUNKCJA NADAWANIA 3. Wysyła pakiet zapisany w każdym nowym pliku txt w folderze wskazanym w pliku konfiguracyjnym a po wysłaniu kopiuje plik do podfolderu i kasuje - na adres IP i port wskazany w pliku konfiguracyjnym w kodowaniu znaków wskazanym również w pliku konfiguracyjnym. a) oczekuje na odpowiedź w formie pakietu w tej samej sesji i zapisuje ją pliku tekstowego o unikatowej nazwie z przedrostkiem "ACK" we wskazanym ...

    $101 (Avg Bid)
    $101 Średnia Oferta:
    1 składanie ofert
    Computer Networking Zakończone left

    Using "Wireshark" software Confidential Project Price negotiation

    $12 / hr (Avg Bid)
    $12 / hr Średnia Oferta:
    6 składanie ofert

    Szukam kogoś kto wgrywa firmware w Linksys SRW224G4 (chip js28f640j3d75) Uwaliłem go złym firmware i teraz mam tylko kolorowe światełka. Teraz zamiast switcha. Port CONSOLE nie współpracuje ze mną. Zero komunikacji z puttym przez port szeregowy. Zero reakcji w karcie sieciowej (wireshark milczy) Zaprogramować trzeba dwa chipy. Uwaliłem dwa switche :)

    $9 - $15 / hr
    $9 - $15 / hr
    0 składanie ofert

    ...kolejne zapytanie dotyczy tego samego rekordu i domeny to dostarczający odpowiedź ze swojego cache’u.  Musi obsługiwad zapytania wysyłane przez protokół UDP. Wskazówki  Najłatwiej zorientowac się jak działa protokół DNS śledząc zapytania generowane przez poszczególne programy (np. przeglądarkę internetową) i odpowiedzi serwera DNS przy pomocy snifera (np. Wireshark),  Przykładowa implementacja serwera DNS w JAVAie dostępna jest pod adresem:  Proszę spróbowac ustawic Panstwa serwer DNS jako domyślny serwer DNS w Panstwa komputerze i przetestowac, czy normalne użytkowanie komputera i Internetu jest możliwe, a także czy działają wszystkie typowe usługi używane przez Panstwa. Jeśli ta...

    min $2
    min $2
    0 składanie ofert

    Aplikacja ma pracować pod systemem linux - preferowany Fedora Celem aplikacji ma być możliwość przeanalizowania systemów pracujących w sieci pod kątem bezpieczeństwa i podatności na ataki z zewnątrz. dostęp do skanera ma być poprzez www. W celu skanowania należy podać: - adres skanowanej maszyny (domena lub IP) - zakres portów - wybrać metodę skanowania (Connect Scan, SYN Scan, ACK Scan) Proszę o oferty z czasem wykonania, jak i kosztem.

    min $2
    min $2
    0 składanie ofert

    I'm aiming to create a beginner-level educational website focusing on the AWS EC2 service. This is an individual project with an objective to learn and teach AWS technologies. Key tasks are: 1. Webs...Development: - Build an informative and user-friendly website. - Experience in educational website creation is preferred. 2. AWS EC2 Teaching Material: - Develop easy-to-understand content covering basic AWS EC2 topics. - Hands-on AWS experience is necessary, especially with the EC2 service. 3. Log Capture & Processing: - Configure logs to be captured in Wireshark, processed in Splunk. - Experience in Wireshark and Splunk would be beneficial. Freelancers with a teaching background in technology, AWS expertise, and experience in log management will ...

    $76 (Avg Bid)
    $76 Średnia Oferta:
    8 składanie ofert

    ...needs to be capable of conducting precise user authentication using usernames and passwords over the network. I also expect the system to integrate Wireshark or a similar tool to capture network traffic effectively. Key Responsibilities: - Designing and implementing a network application with advanced security features - Ensuring the integrity of user identification through username/password inputs - Using Wireshark to deliver comprehensive network traffic capture Ideal Skills: - Proficiency in Networks and Security, especially with the use of Sockets API - Practical experience in application/network development - Good understanding of Wireshark or similar network traffic analysis tools The captured network traffic will be used to: - Gauge the performance of ...

    $96 (Avg Bid)
    $96 Średnia Oferta:
    1 składanie ofert

    ...requirements: - Implement DTLS in C: The primary goal of this project is to introduce DTLS to an existing system for secure communication. - Tight deadline: This project needs to be completed within two weeks. Timeliness and reliability are crucial. I need the data coming from the server to the client over UDP socket to be encrypted with DTLS, and it should appear as DTLS in the protocol section of Wireshark. In addition, the code should be able to handle streaming video or live feed over the socket accordingly. This code should work in linux and windows. Ideal Skills and Experience: - Proficiency in C: Extensive experience with C language is a must. - DTLS Knowledge: Prior experience implementing DTLS is highly preferred. - Security Background: Strong understanding of encrypt...

    $520 (Avg Bid)
    $520 Średnia Oferta:
    8 składanie ofert

    I'm seeking an experienced cellular engineer with strong expertise in smartphone field testing. You should have significant understanding of the intricate complexities of 3G/4G/5G technologies. Key Expectations: - Carry out testing on hardware, software, and the network. - Have practical experience with smartphones and smartwatches. - Be proficient with logging tools including QxDM, QCAT, Wireshark, STT, ELT, etc. - Capable of performing daily testing and providing a concise report to myself concerning the results. Specifically, I am interested in evaluating: - Battery performance - Camera quality - Understanding of GNSS/GPS technical concepts. This is considered a significant advantage. Your excellent interpersonal relationships and proven written/verbal communication sk...

    $100 (Avg Bid)
    $100 Średnia Oferta:
    4 składanie ofert

    ...in-depth Android application security assessment. Skills in the following areas are required: Static Application Analysis: Understanding of tools like PEView, Dependency Walker (for analyzing dependencies in a Windows environment), APKTool, Androguard, or similar. Dynamic Application Analysis: Experience with tools like Process Explorer/Monitor (for analyzing processes in a Windows environment), Wireshark, or comparable tools. Code Analysis & Reverse Engineering: Proficiency in Ghidra, SMALI/BAKSMALI, dex2jar, and similar disassemblers/decompilers for Android code. Key Requirements: Proficiency in Volatility, APKTool, and Ghidra Intermediate level of experience in Android application security assessment. Ideal Skills and Experience: Demonstrated experience in Android appl...

    $221 (Avg Bid)
    $221 Średnia Oferta:
    7 składanie ofert

    ...conducting network analysis and troubleshooting, as well as port scanning and service enumeration on my local network using Netcat and Wireshark. As a part of this project, I expect the freelancer to: - Conduct a thorough analysis of my network using Netcat and Wireshark - Implement solutions for any network troubleshooting issues identified - Perform a comprehensive port scan and service enumeration on my network - Provide recommendations for improving network security based on the findings - Ensure no sensitive data is exposed in the process Ideal candidates for this project should have: - Proficiency in using network analysis tools such as Netcat and Wireshark - Strong experience in network security testing and vulnerability assessment - Excellent troubleshooti...

    $177 (Avg Bid)
    $177 Średnia Oferta:
    20 składanie ofert

    ...Skills: Hands-on experience with Security Information and Event Management (SIEM) tools. Proficiency in Python, Linux, and SQL. Knowledge of CIA Triad, governance, risk analysis, compliance, and business continuity planning. Familiarity with Linux and Windows server configuration, Active Directory, network architecture, operations, and security. Experience in areas such as Wireshark, email security, wireless security, cryptography, port scanning, cloud security, and virtualization. Proficiency with tools like Splunk, Burp Suite, Metasploit, Zenmap, etc. Certification experience in Security+ and CEH. Additional Assets: Knowledge and experience with Google Cloud Platform. Responsibilities: Setting realistic schedules, deadlin...

    $11 - $18 / hr
    Wyróżniony Ukryte
    $11 - $18 / hr
    9 składanie ofert

    ...characteristics consisting of 9 hosts, 3 switches, and a controller. where a trio of hosts are connected to each switch and the three switches are connected to the controller. must be done in virtual box, S.O. ubuntu, using mininet, openflow, opendaylight controller. at the end you should use wireshark tool to see latency, bandwidth, delay, bitstream and network transfer rate and do ping between different hosts Every step that involves the creation of the network, use of controller, wireshark, be recorded minimum quality 1080p hd (You can do it in a single video in general or several, the important thing is to see each step) And specify which versions were used for each software tool Key Skills: - Experience with network engineering and SDN The timeline for this...

    $124 (Avg Bid)
    $124 Średnia Oferta:
    83 składanie ofert

    I need a skilled network analyst who can examine an ARP request and reply...ARP request and reply message within my network. The purpose of this project is network troubleshooting. - Use Wireshark - Focus on personal computers - Generate a report outlining patterns or oddities - You should be knowledgeable about detecting intrusion, maintaining network security, and problem-solving in complex network environments. Experience with the Wireshark tool is essential. Your goal is to give a clear snapshot of the situation with the ARP request and reply messages. Here are the deliverables: - ARP request and reply messages log - A detailed report about these ARP messages and potential problems Please, only bid if you have a concrete understanding of Wireshark Network An...

    $33 (Avg Bid)
    $33 Średnia Oferta:
    5 składanie ofert

    I am looking for an expert in Yeastar p560 VoIP systems to implement a solution for a trunk to trunk call forwarding inclusive of ...implement a solution for a trunk to trunk call forwarding inclusive of Direct Inward Dialing (DIDs). The task is troubleshooting headers, the trunks / solution is already setup. The key functionality includes: - Trunk to trunk hand off with headers (in and out) - Forwarding calls over VoIP Your expertise should span the configuration of VoIP systems for diverse and specific users. Knowledge of wireshark and pcap analysis, understanding of SIP headers. With your understanding of my needs, you'll enable seamless communication within my organization. Prior experience in similar setups is a necessity. Your bid will be a value-add to the success o...

    $96 (Avg Bid)
    Pilny
    $96 Średnia Oferta:
    10 składanie ofert

    ... specifically for Windows and Linux platforms - Working on Jupyter, a malware variant associated with the SolarMaker family. - Proven track record in both static and dynamic malware analysis - Ability to work under tight schedules - Excellent problem-solving and analytical skills - Sound understanding of malware techniques and exploits - Familiarity with tools such as IDA Pro, Ghidra, and Wireshark - Detailed malware analysis - Code Analysis of the malware Responsibilities: - Conduct comprehensive static and dynamic malware analysis - Provide actionable insights and detection strategies - Clearly document findings for technical and non-technical audience If you believe you're equipped for this critical task, I'd be more than excited to see your proposal. Please g...

    $445 (Avg Bid)
    $445 Średnia Oferta:
    16 składanie ofert

    I'm seeking professional assistance with network traffic analysis. The task includes conducting analysis to provide a concise overview of total data usage. The ideal candidate will be proficient with Wireshark and possess a comprehensive understanding of network security. Key Tasks: - Analyze network traffic - Report on total data usage Desired Skills: - Proficiency in Wireshark - Strong understanding of network security - Excellent report writing skills.

    $116 (Avg Bid)
    $116 Średnia Oferta:
    34 składanie ofert

    I am at the beginner level in using QXDM and Wireshark. I am aiming to learn more about Protocol Analysis and Troubleshooting. I would like to focus on the 5G and LTE wireless technologies and protocols during my training. Ideal skills: - Strong understanding of QXDM and Wireshark - Ability to teach protocol analysis and troubleshooting - Deep knowledge of 5G and LTE technologies Experience: - At least 3 years' experience in using and teaching QXDM and Wireshark - Comprehensive knowledge of 5G and LTE protocols - Background in mentorship or training would be favorable.

    $13 / hr (Avg Bid)
    $13 / hr Średnia Oferta:
    2 składanie ofert

    I am planning to configure a Windows PC equipped with Wireshark, which will be connected to the network via Wi-Fi. The purpose is to conduct a comprehensive network assessment. For this assessment, I require a continuous monitoring period of 48 hours. During this time, Wireshark will capture and log all network traffic, including packets transmitted and received. Following the 48-hour monitoring period, I will perform an in-depth analysis of the captured data. This analysis will involve examining the network traffic to identify patterns, anomalies, and potential security threats. Each device connected to the network will undergo thorough scrutiny to understand its communication patterns, bandwidth usage, and any potential issues. The detailed network evaluation will include...

    $22 (Avg Bid)
    $22 Średnia Oferta:
    3 składanie ofert

    ... specifically for Windows and Linux platforms - Working on Jupyter, a malware variant associated with the SolarMaker family. - Proven track record in both static and dynamic malware analysis - Ability to work under tight schedules - Excellent problem-solving and analytical skills - Sound understanding of malware techniques and exploits - Familiarity with tools such as IDA Pro, Ghidra, and Wireshark - Detailed malware analysis - Code Analysis of the malware Responsibilities: - Conduct comprehensive static and dynamic malware analysis - Provide actionable insights and detection strategies - Clearly document findings for technical and non-technical audience If you believe you're equipped for this critical task, I'd be more than excited to see your proposal. Please g...

    $354 (Avg Bid)
    $354 Średnia Oferta:
    6 składanie ofert

    ...developer to create an advanced C# streaming app that will facilitate real-time capture of video streams. Key Attributes Required: - Versed in C# language and have experience in app development that involves real-time video monitoring. - Proven experience in implementing streaming protocols, specifically HTTP Live Streaming (HLS). - Professional understanding of stream monitoring tools, similar to Wireshark, is essential. - Prevoen experience websocket development. The Project Scope: - Develop an application capable of real-time capture of video streams, thus raw data monitoring. - The application should provide comprehensive protocol analysis capabilities. - Specifically, the application should support the HLS protocol directly targeting video streams. - The developed system...

    $459 (Avg Bid)
    $459 Średnia Oferta:
    42 składanie ofert

    Need a cyber security specialist to decrypt an AES-CTR encryption for a CTF flag. provided information : pcapng file for wireshark and the encryption method written in python

    $24 (Avg Bid)
    $24 Średnia Oferta:
    6 składanie ofert

    ...from scratch. • Perform Internal and external penetration tests against systems to identify vulnerabilities. • Collaborate with the application development teams and develop test cases, which can check the security of applications, databases and authentication mechanisms. • Experience using a wide variety of security tools to include Kali-Linux, Checkmarx CxSAST, CxIAST, Burp Suite Pro, Wireshark, Nmap, Nessus, Metasploit, and Nexpose. • Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications. &bul...

    $25 / hr (Avg Bid)
    $25 / hr Średnia Oferta:
    29 składanie ofert

    I am in need of a system that can command a PTZ camera to perform a horizontal rotation every 30 seconds. The specifications for the project are: - The main purpose of sending the signal is to control the movement of the camera. - Upon receiving the signal, the PTZ camera should go to a specified Preset. At present, I have to log...present, I have to log into a camera, choose Preset 1, and Execute. A command is then sent to the camera via the browser and the camera moves to that position. Same if I create another Preset 2, and the camera will move. i would like an webpage that I can put the camera IP Address, Username, password and the presets, and it automatically sends the command every 30 seconds. At present, you can use wireshark or something similar to see what is sent to t...

    $150 (Avg Bid)
    $150 Średnia Oferta:
    20 składanie ofert

    Implementation of live game cancellation function

    $469 (Avg Bid)
    $469 Średnia Oferta:
    30 składanie ofert

    ONSITE ONLY in NJ USA We are a small IT company that is currently look...networks small to medium size - Exceptional problem-solving and analytical abilities The network in question is of medium complexity. Thus, the ideal candidate should have: - Understanding of networks, domains, comms and internal/external testing - Ability to identify and resolve network security vulnerabilities within this setup - Expertise in Pen testing tools such as: Kali Linux, Burp Suite, Wireshark, John the Ripper, Hashcat, Nmap & Invicti Your role is to ensure our network is as secure as possible and to suggest improvements where necessary. Provide all technical information and data used to report the overall security of a customer and actions for remediation. Looking forward to productive c...

    $21 / hr (Avg Bid)
    $21 / hr Średnia Oferta:
    18 składanie ofert

    The project consists of the following: (1) code on ESP32-S3 in PlatformIO that sends small packet containing text and numerical data to backend on AWS. (2) backend parses packet and stores in MySQL database. (3) backend sends ACK to ESP32-S3 with packet received. (3) ESP32-S3 confirms ACK packet matches sent packet. (4) Frontend app with user login and a page to scroll through database rows.

    $150 (Avg Bid)
    $150 Średnia Oferta:
    32 składanie ofert

    As the client, I'm seeking an expert Flutter and BLE developer to help me integrate Bluetooth devices like smartwatches...should have: - Experience with Flutter development. - Good understanding of Bluetooth Low Energy (BLE) technology and its integration with flutter_blue_plus package - Experience in working with different Bluetooth devices, especially smartwatches, fitness trackers, and proximity sensors. - Experience in working with sensor data and custom ATT. - Understand reverse engineering BLE protocol from Wireshark / Android Bluetooth HCI logs - Problem-solving abilities to overcome integration challenges Once this integration is successfully completed, we will have a stronger foundation for delivering a seamless user experience. Therefore, your skills will make a sign...

    $171 (Avg Bid)
    $171 Średnia Oferta:
    5 składanie ofert

    ...to manage user remote control of two washingmachine relais. - Android App with GUI to be used by regular users (3-8 expected) - Reads data from DB (tables provided by me) and sends string commands over BLE to an ESP32. - Receives commands from an ESP32 and writes the data to the DB. Programming technologies: - I have a LAMP server already - DB (MySql) tables will be created by myself; you will ack or suggest changes, if needed - Code will be written using C#, python or RUST. - You will use Jira management and BitBucket source control. - You will provide a basic design and code documentation. App installation: - (a) New user? (b) Existing user but new phone? (users can have several phones) - User creates account with full-name and address (no password required; DB stores phone-n...

    $213 (Avg Bid)
    $213 Średnia Oferta:
    21 składanie ofert

    I'm taking a course online related to Security Analysis SOC SIEM or incident response, all sorts of tools related to those fields, such as Splunk, ELK, YARA, Sigma, Windows Event logs, Wireshark, Suricata, etc. I'm looking for an experienced Security Analysis SIEM or incident response, someone with working experience in the field to mentor me and explain some concepts. Note: There will be a lot of screen sharing. -------------------- in return for your help, I'll also give you the highest rating & best recommendation after we finish

    $21 / hr (Avg Bid)
    $21 / hr Średnia Oferta:
    7 składanie ofert

    ...around a TCP NAT port binding timeout issue on the WAN network that our system uses. This is somewhat of a special case because the WAN is through satcoms. Specifically, clients on the GGSN tun0 connection may keep TCP sessions open but silent for >5 minutes, and the satcoms closes unused TCP ports after silence for 5 minutes. All we need is the GGSN to periodically generate a few additional TCP ACK messages for ports that have been silent for 2 minutes. We don't want to use the similar Linux global settings for tcp_keepalive_time because that impacts other TCP sockets. I have a lab system available with source code on a public IP address you can access. I expect this will take about 10-15 lines of code and around 2-3 hours. More precise detail and explanation is i...

    $198 (Avg Bid)
    Pilny
    $198 Średnia Oferta:
    5 składanie ofert
    Wireshark Tasks Zakończone left

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $39 (Avg Bid)
    $39 Średnia Oferta:
    12 składanie ofert

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $51 (Avg Bid)
    $51 Średnia Oferta:
    6 składanie ofert

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $140 (Avg Bid)
    $140 Średnia Oferta:
    9 składanie ofert

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $44 (Avg Bid)
    $44 Średnia Oferta:
    8 składanie ofert

    ...need a professional who has expertise in Wireshark to complete two distinct tasks for me. Here are the key requirements: - Complete Task 1 and Task 2 using Wireshark: You should be experienced in using this tool and be able to to walk me through the steps you took to complete the tasks. - Data Capture: For both tasks, we are focusing on capturing and analyzing both network traffic and the content of the packets. A comprehensive understanding of how to navigate this data is a must. - Operating System: All work should be completed on a Windows Machine. Your ability to comfortably use Windows as an operating system is integral to this project. Ideally, you'll have a robust background in networking, data analysis, and have worked on similar Wireshark assignment...

    $26 (Avg Bid)
    $26 Średnia Oferta:
    2 składanie ofert

    I am looking for a freelancer who can help me discover the endpoints of an existing app. I need someone who is experienced in using tools like Wireshark or any other tool to extract the endpoints. App is called XCWeather, just the the End points: ???????? Requirements: - Proficiency in using tools like Wireshark or any other tool to analyze network traffic and extract endpoints - Familiarity with API endpoints and database endpoints - Ability to work with limited access to the application's source code Ideal Skills and Experience: - Experience in discovering and extracting API endpoints and database endpoints - Strong understanding of network traffic analysis - Ability to work with limited access to source code Expected Outcome: - Provide a comprehensive list of disc...

    $16 (Avg Bid)
    $16 Średnia Oferta:
    5 składanie ofert

    I am looking for a graphic designer to create a whimsical envelope liner graphic for me. The graphic should include the following elements: - A black cat - A beagle - An airplane - Champagne glasses - A beer stein - A kitchen aid mixer - Mountains - A bicycle - A ninja - The airport code ACK - The airport code DCA - The airport code PBI - The airport code JFK I would love for this to be a blue toile (example: ) I am open to the designer's interpretation. Skills and Experience: - Strong graphic design skills - Experience in creating whimsical illustrations - Ability to work with a monochrome color scheme - Creative and able to interpret a client's vision - Attention to detail in arranging the

    $145 (Avg Bid)
    Gwarantowany
    $145
    81 zgłoszenia

    Proszę, Zarejestruj się lub Zaloguj, żeby zobaczyć szczegóły.

    Pilny Projekt z Umową o Zachowaniu Poufności

    I am looking for a freelancer who can help me discover the endpoints of an existing app. I need someone who is experienced in using tools like Wireshark or any other tool to extract the endpoints. App is called XCWeather, just the the End points: ???????? Requirements: - Proficiency in using tools like Wireshark or any other tool to analyze network traffic and extract endpoints - Familiarity with API endpoints and database endpoints - Ability to work with limited access to the application's source code Ideal Skills and Experience: - Experience in discovering and extracting API endpoints and database endpoints - Strong understanding of network traffic analysis - Ability to work with limited access to source code Expected Outcome: - Provide a comprehensive list of disc...

    $24 (Avg Bid)
    $24 Średnia Oferta:
    6 składanie ofert

    Hi everyone I'm posting this job twice and i hope i can get what i want so here is the requirement. Budget: 35000 Following experience should be needed before you read full description. must be familiar with java networking programming. must have created VPN app before. must know how Wireshark sniff network packets and how can we do this in java android. What I'm looking? My goal is to create a VPN app that track the network packets ok let me clear. Let's suppose I'm searching something on a browser like chrome or Firefox. I visit any of the website where there are a lots of pictures and now i want to block some pictures through vpn app running at background. Here when my app will receive packets of network app should decrypt packet and find url of images ...

    $335 (Avg Bid)
    $335 Średnia Oferta:
    7 składanie ofert

    I want expert here , my kamailio in 60 sec sending ack for supplier if no reply within 60 seconds kamailio or freeswitch is hang up calls , I don't want my kamalio to hangup any call unless customer did hangup or supplier

    $30 (Avg Bid)
    $30 Średnia Oferta:
    2 składanie ofert
    wireshark analysis Zakończone left

    I am looking for a freelancer who can assist me with a Wireshark analysis project. The purpose of this analysis is to conduct a security analysis of my network. I have specific protocols and traffic types that I would like to be analyzed. I require a detailed report with recommendations based on the analysis. Skills and Experience: - Strong knowledge of Wireshark and network analysis - Expertise in conducting security analysis - Ability to provide detailed reports with recommendations - Familiarity with various protocols and traffic types for analysis

    $26 (Avg Bid)
    $26 Średnia Oferta:
    22 składanie ofert

    I am looking for Computer Networks experts who have experience in Network Design and Architecture. Specific requirements f...network performance and security The ideal freelancer for this project should have: - Strong knowledge and experience in computer networks - Proficiency in network design and architecture - Familiarity with network security protocols and best practices - Ability to troubleshoot and resolve network issues The specific tools and software preferred for this project are: - Cisco Packet Tracer - Wireshark - GNS3 However, I am open to suggestions if the freelancer has alternative tools or software that can meet the project requirements. Please provide examples of previous work in computer networks and specify your level of expertise in network design and arc...

    $29 (Avg Bid)
    $29 Średnia Oferta:
    17 składanie ofert
    disiprouter Zakończone left

    i want to i...when asterisk send request to dsiprouter the request cannot find the endpoint i tried (realm-outbound proxy and etc) but i didnt make it. the error just changed from 407 proxy and still can't find the endpoint . i can see the logs and i guess the problem is dsiprouter . it cant route the calls through endpoint in this way. because when the call reaches the dsiprouter it hangs i debugged using wireshark and the 503 is from voip.ariyanasoft.net. i tried to change outbound carriers and dial executes in asterisk but no ring on sip phone. so i presume the problem is outbound rules inside dsiprouter . please help me with configuration of outbound rulse and carriers for tel to ip calls because ip to tel works fine and i didnt configure anything except connecting dsiprout...

    $699 (Avg Bid)
    $699 Średnia Oferta:
    9 składanie ofert
    Cybersecurity Zakończone left

    Project Title: Cybersecurity Specific Areas of Assistance: - Network Security - NMAP AND WIRESHARK Cybersecurity Frameworks or Standards: - Please specify the cybersecurity frameworks or standards that need to be followed Level of Threat Detection and Response: - Advanced Ideal Skills and Experience: - Extensive knowledge and experience in network security - Familiarity with industry-standard cybersecurity frameworks and standards - Proficiency in advanced threat detection and response techniques - Ability to customize and implement cybersecurity measures based on specific requirements - Strong problem-solving and analytical skills in identifying and addressing cybersecurity vulnerabilities - Excellent communication and collaboration skills to effectively work with the client an...

    $18 / hr (Avg Bid)
    $18 / hr Średnia Oferta:
    8 składanie ofert

    ...the host is not requesting, sends a REPLY immediately; 2. If the host receives a REQUEST message and the host is also requesting: a) the host has a vector time earlier than that of REQUEST, defer the REPLY and put the REQUEST in the queue; b) the host has a vector time later than that of REQUEST, sends a REPLY immediately. 3. If the host receives an other message, e.g., HELLO, replies an ACK immediately. The communication between the spawned thread and the main thread (distributed_mutex_lock()) can be done through pthread semaphore: int distributed_mutex_lock(void) { // parameter setting is up to you sem_init(&sem, 0, 4); // creatte a semaphore with a value of 5 (assuming there are 5 hosts, so we need to collect 4 REPLYs to proceed) ### sem_init(&sem, 0, 0)...

    $13 (Avg Bid)
    $13 Średnia Oferta:
    7 składanie ofert
    Cybersecurity Zakończone left

    Project Title: Cybersecurity Specific Areas of Assistance: - Network Security - NMAP AND WIRESHARK Cybersecurity Frameworks or Standards: - Please specify the cybersecurity frameworks or standards that need to be followed Level of Threat Detection and Response: - Advanced Ideal Skills and Experience: - Extensive knowledge and experience in network security - Familiarity with industry-standard cybersecurity frameworks and standards - Proficiency in advanced threat detection and response techniques - Ability to customize and implement cybersecurity measures based on specific requirements - Strong problem-solving and analytical skills in identifying and addressing cybersecurity vulnerabilities - Excellent communication and collaboration skills to effectively work with the client an...

    $93 (Avg Bid)
    $93 Średnia Oferta:
    14 składanie ofert
    TCP protocols Zakończone left

    ...Title: TCP/IP Protocol Analysis Project Description: I am looking for a freelancer who can assist me with the analysis of the TCP/IP protocol. Specific requirements: - Expertise in TCP/IP protocol analysis - Strong understanding of network protocols and packet analysis - Ability to identify and troubleshoot TCP/IP protocol issues - Familiarity with network monitoring tools and protocols such as Wireshark - Experience in analyzing network traffic and identifying performance bottlenecks - Familiarity with TCP/IP protocol stacks and their functionalities - Knowledge of common TCP/IP vulnerabilities and security best practices Ideal skills and experience: - Intermediate level of understanding of the TCP/IP protocol - Previous experience in analyzing network protocols and identify...

    $21 (Avg Bid)
    $21 Średnia Oferta:
    5 składanie ofert

    I am looking for a freelancer who can help me discover the endpoints of an existing app. I need someone who is experienced in using tools like Wireshark or any other tool to extract the endpoints. App is called XCWeather, just the the End points: ???????? Requirements: - Proficiency in using tools like Wireshark or any other tool to analyze network traffic and extract endpoints - Familiarity with API endpoints and database endpoints - Ability to work with limited access to the application's source code Ideal Skills and Experience: - Experience in discovering and extracting API endpoints and database endpoints - Strong understanding of network traffic analysis - Ability to work with limited access to source code Expected Outcome: - Provide a comprehensive list of dis...

    $19 (Avg Bid)
    $19 Średnia Oferta:
    34 składanie ofert