metasploit-framework/data/exploits/capture/http/forms/xing.com.txt

1 line
790 B
Plaintext
Executable File

<form name='usearchform' action='/app/search' method='get' id='usearchform'> <input name="op" type="hidden" value="" /><input name="universal" type="text" id="search-field" value="" maxlength="255" /></form><form name='registerform' action='https://www.xing.com/app/register' method='get'> </form><form name='loginform' action='https://www.xing.com/app/user' method='post'> <input name="op" type="hidden" value="" /><input name="dest" type="hidden" value="" /><input tabindex="1" name="login_user_name" class="text" type="text" id="login_user_name" maxlength="80" style="width:99%;" /><input tabindex="2" name="login_password" class="text" type="password" id="login_password" maxlength="25" style="width:99%;" /><input name="perm" tabindex="3" class="fl" type="checkbox" id="perm" /></form>