metasploit-framework/data/exploits/capture/http/forms/veoh.com.txt

1 line
1.2 KiB
Plaintext
Executable File

<form name='topnav_search' action='/search.html' id='topnav_search' method='get'> <input name="type" type="hidden" id="type" /><input name="searchId" type="hidden" value="" /><input name="search" type="text" id="query" onclick="fieldClear('topnav_search');" /></form><form name='homepage_search' action='/search.html' id='homepage_search' method='get' onsubmit='$(searchId2).value=getNewSearchId();searchClear(homepage_search); document.homepage_search.submit();'> <input name="type" type="hidden" id="searchType" value="" /><input name="searchId" type="hidden" id="searchId2" value="" /><input name="search" type="text" oncontextmenu="searchClear('homepage_search');" value="" onclick="searchClear('homepage_search');" /></form><form name='loginForm' class='loginForm' action='https://www.veoh.com/j_acegi_security_check.html' method='post' id='loginForm' onsubmit='return validateLoginForm(loginForm);'> <input name="_acegi_security_remember_me" type="hidden" value="" /><input name="j_username" class="inputbox" type="text" id="j_username" /><input name="j_password" class="inputbox" onkeypress="if (checkEnter(event)){document.loginForm.submit();}" type="password" id="j_password" /></form>