metasploit-framework/data/exploits/capture/http/forms/verizon.net.txt

1 line
1.0 KiB
Plaintext
Executable File

<form name='header_search' focus='this.q' action='vzc.portal' method='get'> <input name="_nfpb" type="hidden" value="" /><input name="_pageLabel" type="hidden" value="" /><input name="rs" type="hidden" value="" /><input name="web_search_type" type="hidden" value="" /><input name="channel" type="hidden" value="" /><input name="clientid" type="hidden" value="" /><input name="q" size="0" type="text" style="width:451px;" /><input name="imageField" type="image" src="/central/framework/skins/surround/images/go_button.png" border="0" height="25" alt="Search Button" align="top" width="25" /></form><form name='scot' method='post' onsubmit='return submitScotForm("http://ad.doubleclick.net/clk;171718904;22893903;n?http://research.scottrade.com/public/stocks/snapshot/snapshot.asp?id=1&verizon=2&symbol=");' target='_blank'> <input name="Symbol" size="12" class="textfieldcolor" type="text" value="" onfocus="getBlank (this, 'Enter Symbol');" maxlength="110" /><input type="image" src="resources/images/scotTrade/scotTrade_goBtn.gif" border="0" height="12" width="24" /></form>