Guest User

Untitled

a guest
May 21st, 2018
89
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.86 KB | None | 0 0
  1. 1. Because of our wide customer base, we are focus on a lot of content, could you please provide the access list and the corresponding price, we will purchase according to customer demands.
  2.  
  3. 2. The following list includes all the relevant content that we needs, if you have related resources, please feel free to contact us anytime.
  4.  
  5.  
  6. Demand List is as following:
  7. 1. WIN platform system, various components loophole information and related applications vulnerability.
  8. 2. various cross-site using code(such as some XSS for some common website)
  9. 3. WIN platform’s common types of application vulnerability, such as: office, ppt, pdf, rar, zip and other applications.
  10. 4. Database’s related application, such as: Oracle, MySQL, Sybase, DB2.
  11. 5. Various Remote control software( which has high penetrability during types of complicated network) ; including Non-WIN system, like Mac, Unix system’s remote control software.
  12. 6. Common WEB loophole information, such as discuz and so on.
  13. 7. Common email service hacking loopoles
  14. 8. Various loopholes information of Mac system and related loophole applications.
  15. 9. Various loopholes information of UNIX system and related loopholes applications.
  16. 10. Access and control to gmail’s password.
  17. 11. The cracking program of dynamic password.
  18. 12. Various cellphone information’s snatching (especially smart phone,such as Linux, BlackBerry, Windows Mobile, Palm, Symbian, Android, Iphone), and remote control implant method.
  19. 13. DDOS platform software.
  20. 14. Purchase the intranet entrance of sensitive department(including national government departments, Transnational Corporations and so on)
  21. 15. Purchase data of sensitive departments(including national government departments, transnational corporations and so on)
  22. 16. Other loopholes, tools and information that you think is valuable.
Add Comment
Please, Sign In to add comment