metasploit-framework/data/exploits/capture/http/forms/friendster.com.txt

1 line
1.6 KiB
Plaintext
Executable File

<form name='headsearchform' action='http://www.friendster.com/headersearch.php' id='headersearch' method='get' target='_top'> <input name="search" type="hidden" value="" /><input name="sf" type="hidden" value="" /><input name="filter" type="hidden" value="" /><input name="loc" type="hidden" value="" /><input name="statpos" type="hidden" value="" /><input name="s" type="hidden" value="" /><input name="s" class="globnav_textbox" type="text" id="searchinput" value="" onfocus="this.value=''; this.onfocus=null;" maxlength="200" /><input name="search" type="hidden" value="" /></form><form name='login_form' action='/login.php' method='post'> <input name="_submitted" type="hidden" value="" /><input name="next" type="hidden" value="" /><input name="tzoffset" type="hidden" value="" /><input name="email" tabindex="1" size="22" type="text" value="" alt="Email Address" maxlength="100" style="width: 200px !important;" /><input name="password" tabindex="2" size="22" type="password" alt="Password" maxlength="10" style="width: 200px !important;" /><input name="remembermyemail" type="checkbox" id="remembermyemail" /><input name="btnLogIn" tabindex="3" type="submit" value="" /><input name="btnSignUp" tabindex="4" class="orangebutton" type="button" value="" onclick="window.location='join.php'" /></form><form name='usersearchform' action='/usersearch.php' method='get'> <input name="search" type="hidden" value="" /><input name="sf" type="hidden" value="" /><input name="usearch" type="text" maxlength="200" style="margin: 0 5px 0 0; width: 165px;" /><input name="cont" class="middlealign" type="submit" value="" style="margin: 0 0 7px 7px;" /></form>