Guest User

notify php

a guest
Dec 13th, 2014
378
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.72 KB | None | 0 0
  1. <?php include "header.php"; ?>
  2. <div class="row">
  3. <div class="col-md-12">
  4. <div class="widget">
  5. <div class="widget-content-white glossed">
  6. <div class="padded">
  7. <form action="notify_act.php" method="post" role="form">
  8. <div class="widget-controls pull-right">
  9. <a href="#" class="widget-link-remove"><i class="icon-minus-sign"></i></a>
  10. <a href="#" class="widget-link-remove"><i class="icon-remove-sign"></i></a>
  11. </div>
  12. <h3 class="form-title form-title-first"><i class="icon-file"></i> Input Notify</h3>
  13. <div class="row">
  14. <div class="col-md-12">
  15. <div class="form-group">
  16. <label>Notifier (Nick Name)</label>
  17. <input type="text" class="form-control" placeholder="Nick Name" name="hacker">
  18. </div>
  19. <div class="form-group">
  20. <label>Team</label>
  21. <input type="text" class="form-control" placeholder="Team Name" name="team">
  22. </div>
  23. <div class="form-group">
  24. <label>Domain</label>
  25. <input type="text" class="form-control" placeholder="http://example.com" name="url">
  26. </div>
  27. <!--<div class="form-group">
  28. <label>Proof of Concept</label>
  29. <select class="form-control">
  30. <option value="">--------SELECT--------</option>
  31. <option
  32. value="1" >known vulnerability (i.e. unpatched system)</option>
  33. <option
  34. value="2" >undisclosed (new) vulnerability</option>
  35. <option
  36. value="3" >configuration / admin. mistake</option>
  37. <option
  38. value="4" >brute force attack</option>
  39. <option
  40. value="5" >social engineering</option>
  41. <option
  42. value="6" >Web Server intrusion</option>
  43. <option
  44. value="7" >Web Server external module intrusion</option>
  45. <option
  46. value="8" >Mail Server intrusion</option>
  47. <option
  48. value="9" >FTP Server intrusion</option>
  49. <option
  50. value="10" >SSH Server intrusion</option>
  51. <option
  52. value="11" >Telnet Server intrusion</option>
  53. <option
  54. value="12" >RPC Server intrusion</option>
  55. <option
  56. value="13" >Shares misconfiguration</option>
  57. <option
  58. value="14" >Other Server intrusion</option>
  59. <option
  60. value="15" >SQL Injection</option>
  61. <option
  62. value="16" >URL Poisoning</option>
  63. <option
  64. value="17" >File Inclusion</option>
  65. <option
  66. value="18" >Other Web Application bug</option>
  67. <option
  68. value="19" >Remote administrative panel access through bruteforcing</option>
  69. <option
  70. value="20" >Remote administrative panel access through password guessing</option>
  71. <option
  72. value="21" >Remote administrative panel access through social engineering</option>
  73. <option
  74. value="22" >Attack against the administrator/user (password stealing/sniffing)</option>
  75. <option
  76. value="23" >Access credentials through Man In the Middle attack</option>
  77. <option
  78. value="24" >Remote service password guessing</option>
  79. <option
  80. value="25" >Remote service password bruteforce</option>
  81. <option
  82. value="26" >Rerouting after attacking the Firewall</option>
  83. <option
  84. value="27" >Rerouting after attacking the Router</option>
  85. <option
  86. value="28" >DNS attack through social engineering</option>
  87. <option
  88. value="29" >DNS attack through cache poisoning</option>
  89. <option
  90. value="30" >Not available</option>
  91. <option
  92. value="31" >Cross-Site Scripting</option>
  93. </select>
  94. </div>-->
  95. </div>
  96. </div>
  97. <input type="hidden" name="key" value="kucing"/>
  98. <input type="hidden" name="secret" value="tai"/>
  99. <button class="btn btn-primary">Submit Site</button>
  100. <button class="btn btn-default">Cancel</button>
  101. </form>
  102. </div>
  103. <div class="col-md-6">
  104. </div>
  105. </div>
  106. </div>
  107. </div>
  108. </div>
  109.  
  110. <?php include "footer.php"; ?>
Advertisement
Add Comment
Please, Sign In to add comment