metasploit-framework/data/exploits/capture/http/forms/naver.com.txt

1 line
1.1 KiB
Plaintext
Executable File

<form name='search' action='http://search.naver.com/search.naver' id='search' method='get' onsubmit='nvSetAction(this);'> <input name="query" tabindex="2" title="검색창" class="tx" type="text" id="query" accesskey="s" /><input tabindex="3" class="btn" type="image" src="" onmouseover="this.src='http://static.naver.com/w8/btn_sch_over.gif'" onmousedown="this.src='http://static.naver.com/w8/btn_sch_down.gif'" onmouseout="this.src='http://static.naver.com/w8/btn_sch.gif'" alt="검색" /><input name="sm" type="hidden" value="" /><input name="frm" type="hidden" value="" /></form><form action='http://search.naver.com/search.naver' method='get'> <input name="where" type="hidden" value="" /><input name="frm" type="hidden" value="" /><input name="sm" type="hidden" value="" /><input name="searchBtn" type="submit" value="" /></form><form action='http://stock.naver.com/sise/item_search.nhn' method='get'> <input name="command" type="hidden" value="" /><input name="ref" type="hidden" value="" /><input name="query" title="주가조회" class="tx" type="text" id="fncsch" value="" /><input class="btn" type="image" src="" alt="조회" /></form>