I am a Cyber and information security expert. I invest my time and skills to help people protect their business from Cybercriminals. Specialties/ 10-years experience: Information Security and Assurance, Vulnerability Assessment, Cyber Security, Penetration Testing, IT security, Cyber Security Consultant, API Security, Mobile Application Security, Source Code Audit, Web Server Pen-testing. I started my journey in the information security domain in 2010. I have a team to collaborate with on different Cyber Security projects.
My base programming skills are in PHP and Python. I am a highly-skilled framework of PHP especially Laravel, Codeigniter, and vastly experienced in Django. As a developer, I have both experienced in frontend and backend. I can manage Database MySql and MongoDB.
I have worked as System Admin/ Network Administration so many years.
Excellent work done by the seller. I nevertheless found him to be extremely responsive, highly professional, and immensely intelligent in the field of IT and cyber security. He provided excellent 5-star service and delivered an excellent report. Very smooth experience and good communication. He is highly recommended and you should not hesitate to use his 1st class service.
Although Delwar did some of the things I asked he didn't do all of them. I even had to google some examples to send to him so he understood what I wanted done. He told me during the review process that he was an expert in security. An expert would know what needs to be done to secure a form from hackers and spammers without help from me. He also told me he had a good grasp of the English language yet he stated he didn't understand what I wanted numerous times. I will now have to seek more help
Paul S. @nootkan
1 an în urmă
Cyber Security Specialist
aug. 2016 - Prezent
Cyber Security research, Pentester
BSc in software engineering
Daffodil International University,
Bangladesh 2010 – 2014
Certified Ethical Hacker
Certified Ethical Hacker is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems
Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF
2016 Sixth International Conference on Digital Information and Communication Technology and its
In a sophisticated and coordinated cyber-attack $100 million has been stolen from Bangladesh's account. Attackers introduced malicious code remotely into the Bangladesh Bank's server, which allowed them to process and authorize the transactions. Advanced attack techniques poses threats to all web application systems. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF)
A Study of the Effects of Heartbleed Vulnerability in Bangladesh
The Fourth International Conference on Computer Science
One of the most critical and talked about Open Secure Socket Layer (SSL) and Transport Layer Security (TLS) threats is Heartbleed vulnerability. This vulnerability affects the " Heartbeat protocol " of the open SSL library. HeartBleed manipulates the Heartbeat protocol to get access and read the memory of the vulnerable web servers. OpenSSL is used in HTTPS for internet security.
Study of the Dirty Copy On Write, A Linux Kernel Memory Allocation Vulnerability
EasyChair for CEEIT 2017
Dirty Copy On Write also known as Dirty COW is a Linux based server vulnerability. This vulnerability allows attackers to escalate the file system protection of Linux Kernel, get root privilege and thus compromise the whole system. Linux kernel version 2.6.22 and higher are affected by this vulnerability. The patch for this vulnerability has been released very recently.
Study of Race Condition: A Privilege Escalation Vulnerability
WMSCI 2017 Secretariat
The Race condition is a privilege vulnerability that manipulates the small window of time between appliance of a security control and use of services in a system. This vulnerability is a result of interferences caused by multiple threads running in the system and sharing the same resources. These processes might include trusted process such as operating system files and un-trusted processes.
Ia legătura cu Delwar A. în privința proiectului
Conectează-te ca să discuți prin chat despre detalii.
Programul Freelancer preferat
Metodă de plată confirmată
Număr de telefon confirmat
Adresă de e-mail confirmată
Conectat(ă) prin Facebook
Preferred Freelancer Program SLA 1 89% US English 1 77%