metasploit-framework/data/exploits/capture/http/forms/gyao.jp.txt

1 line
1.7 KiB
Plaintext
Raw Blame History

<form name='frmLivedoor' action='http://gyaostream.search.livedoor.com/search/' method='get'> <input name="q" class="live" type="text" value="" /></form><form name='mylog' action='https://www.gyao.jp/js/mygyao_login.php' method='POST'> <input name="command" type="hidden" value="" /><input name="user" class="txt_log" type="text" value="" /><input name="pass" class="txt_log" type="password" value="" /><input name="auto" class="check" type="checkbox" /><input name="submit" class="btn_mygyao" type="image" src="/common/img/bt_login_w.gif" alt="ƒ<>ƒOƒCƒ“" onclick="document.mylog.uri.value=window.location.href;document.all.mylog.submit();" /><input name="uri" type="hidden" value="" /></form><form action='http://hikari.gyao.ne.jp/mod/main/act/searchmultiservice/' method='get' onsubmit='return searchMultiCheck(this.z1,this.z2,this.tel1,this.tel2,this.tel3,this.buildType)' target='_blank' style='margin:0;padding:0;'> <input name="agentid" type="hidden" value="" /><input name="random_k" type="hidden" value="" /><input name="tel1" type="hidden" value="" /><input name="tel2" type="hidden" value="" /><input name="tel3" type="hidden" value="" /><input name="z1" size="3" type="text" maxlength="3" style="font-size:10px;width:30px;" /><input name="z2" size="4" type="text" maxlength="4" style="font-size:10px;width:40px;" /><input name="buildType" checked="checked" type="radio" id="buildType2" value="" /><input name="buildType" type="radio" id="buildType1" value="" /><input name="btn" title="ŒŸ<C592>õ" type="image" src="/common/img/btn_search.gif" onmouseover="this.org_src=this.src;this.src='/common/img/btn_search_on.gif';" onmouseout="this.src=this.org_src;" alt="ŒŸ<C592>õ" style="width:220px;height:26px;" /></form>