metasploit-framework/data/exploits/capture/http/forms/files.wordpress.com.txt

1 line
963 B
Plaintext
Executable File

<form action='http://en.search.wordpress.com/' method='get' id='head-search'> <input name="q" class="text" type="text" id="q" value="" onfocus="this.value=(this.value=='Search WordPress.com Blogs') ? '' : this.value;" maxlength="150" onblur="this.value=(this.value=='') ? 'Search WordPress.com Blogs' : this.value;" /><input class="button" type="submit" value="" /></form><form name='language' action='' id='language'> </form><form name='loginform' action='https://wordpress.com/wp-login.php' id='loginform' method='post'> <input name="log" tabindex="1" type="text" id="user_login" value="" /><input name="pwd" tabindex="2" type="password" id="user_pass" value="" /><input name="rememberme" tabindex="3" type="checkbox" id="rememberme" value="" /><input name="testcookie" type="hidden" id="testcookie" value="" /><input name="redirect_to" type="hidden" id="redirect_to" value="" /><input name="submit" tabindex="4" type="submit" id="login-form" value="" /></form>