Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1. Because of our wide customer base, we are focus on a lot of content, could you please provide the access list and the corresponding price, we will purchase according to customer demands.
- 2. The following list includes all the relevant content that we needs, if you have related resources, please feel free to contact us anytime.
- Demand List is as following:
- 1. WIN platform system, various components loophole information and related applications vulnerability.
- 2. various cross-site using code(such as some XSS for some common website)
- 3. WIN platform’s common types of application vulnerability, such as: office, ppt, pdf, rar, zip and other applications.
- 4. Database’s related application, such as: Oracle, MySQL, Sybase, DB2.
- 5. Various Remote control software( which has high penetrability during types of complicated network) ; including Non-WIN system, like Mac, Unix system’s remote control software.
- 6. Common WEB loophole information, such as discuz and so on.
- 7. Common email service hacking loopoles
- 8. Various loopholes information of Mac system and related loophole applications.
- 9. Various loopholes information of UNIX system and related loopholes applications.
- 10. Access and control to gmail’s password.
- 11. The cracking program of dynamic password.
- 12. Various cellphone information’s snatching (especially smart phone,such as Linux, BlackBerry, Windows Mobile, Palm, Symbian, Android, Iphone), and remote control implant method.
- 13. DDOS platform software.
- 14. Purchase the intranet entrance of sensitive department(including national government departments, Transnational Corporations and so on)
- 15. Purchase data of sensitive departments(including national government departments, transnational corporations and so on)
- 16. Other loopholes, tools and information that you think is valuable.
Add Comment
Please, Sign In to add comment