Advertisement
Guest User

Untitled

a guest
Jul 23rd, 2017
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.29 KB | None | 0 0
  1. $(".login").click(function(){
  2. var type = "login";
  3. var login = $(".btc-login").val();
  4. if(login=="" || login==null || login==undefined){
  5. alert("Please put your Bitcoin wallet for login/register");
  6. return;
  7. }
  8. var values = "type="+type+"&login="+login+"&tr="+getCookie("tr");
  9. $.ajax({
  10. url: "ajax.php",
  11. type: "post",
  12. data: values,
  13. success: function (response){
  14. // you will get response from your php page (what you echo or print)
  15. if(response=="success"){
  16. window.location.href = "account.php";
  17. }else if(response=="login"){
  18. window.location.href = "account.php";
  19. }else{
  20. alert(response);
  21. }
  22. },
  23. error: function(jqXHR, textStatus, errorThrown){
  24. alert(textStatus, errorThrown);
  25. }
  26. });
  27. });
  28.  
  29. $servername = "localhost";
  30. $username = "root";
  31. $password = "";
  32. $dbname = "qwe";
  33.  
  34. try{
  35. $conn = new PDO("mysql:host=$servername;dbname=$dbname", $username, $password);
  36. // set the PDO error mode to exception
  37. $conn->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION);
  38. $conn->setAttribute(PDO::ATTR_EMULATE_PREPARES, false);
  39. //echo "Connected successfully";
  40. }catch(PDOException $e){
  41. //echo "Connection failed: " . $e->getMessage();
  42. }
  43.  
  44. $type = $_POST['type'];
  45. if($type=="login"){
  46. $login = trim($_POST['login']);
  47. $BTC = new Btc_address_validator();
  48. if(!$BTC->validate($login)){
  49. exit("Invalid bitcoin address");
  50. }
  51. $tr = $_POST['tr'];
  52. if($tr!="undefined" && $tr!=""){
  53. if(!$BTC->validate($tr)){
  54. exit("Invalid affiliate bitcoin address");
  55. }
  56. }
  57. $register_time = date("Y-m-d H:i:s");
  58. $total_deposits = 0.00000000;
  59. $total_deposited = 0.00000000;
  60. $total_paid = 0.00000000;
  61.  
  62.  
  63. $stmt1 = $conn->prepare("SELECT * FROM qweqw WHERE login=?");
  64. $stmt1->bindParam(1, $login, PDO::PARAM_INT);
  65. $stmt1->execute();
  66. $row = $stmt1->fetch(PDO::FETCH_ASSOC);
  67.  
  68. if(!$row){
  69. //register & login
  70. $sql = "INSERT INTO eldoradiki(login,tr,total_deposits,total_deposited,total_paid,register_time) VALUES
  71. (:login,:tr,:total_deposits,:total_deposited,:total_paid,:register_time)";
  72. $stmt = $conn->prepare($sql);
  73. $stmt->bindParam(':login', $login, PDO::PARAM_STR);
  74. $stmt->bindParam(':tr', $tr, PDO::PARAM_STR);
  75. $stmt->bindParam(':total_deposits', $total_deposits, PDO::PARAM_STR);
  76. $stmt->bindParam(':total_deposited', $total_deposited, PDO::PARAM_STR);
  77. $stmt->bindParam(':total_paid', $total_paid, PDO::PARAM_STR);
  78. $stmt->bindParam(':register_time', $register_time, PDO::PARAM_STR);
  79. if($stmt->execute()){
  80. exit("success");
  81. }else{
  82. exit("fail");
  83. }
  84. }else{
  85. $_SESSION['login'] = $login;
  86. //login
  87. exit("login");
  88. }
  89.  
  90. robot@kali:~$ nikto -h https://ban***.club/
  91. - Nikto v2.1.6
  92. ---------------------------------------------------------------------------
  93. + Target IP: 31.170.165.49
  94. + Target Hostname: bancobit.club
  95. + Target Port: 443
  96. ---------------------------------------------------------------------------
  97. + SSL Info: Subject: /OU=Domain Control Validated/OU=PositiveSSL/CN=ban****.club
  98. Ciphers: ECDHE-RSA-AES256-GCM-SHA384
  99. Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA
  100. + Start Time: 2017-05-18 14:50:48 (GMT3)
  101. ---------------------------------------------------------------------------
  102. + Server: openresty
  103. + Retrieved x-powered-by header: PHP/7.0.19
  104. + The anti-clickjacking X-Frame-Options header is not present.
  105. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  106. + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  107. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  108. + Cookie PHPSESSID created without the secure flag
  109. + Cookie PHPSESSID created without the httponly flag
  110. + No CGI Directories found (use '-C all' to force check all possible dirs)
  111. + Server leaks inodes via ETags, header found with file /ban****.tar, fields: 0x58be8093 0x97c
  112. + The Content-Encoding header is set to "deflate" this may mean that the server is vulnerable to the BREACH attack.
  113. + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
  114. + OSVDB-3092: /test.txt: This might be interesting...
  115. + OSVDB-3268: /images/: Directory indexing found.
  116. + OSVDB-3268: /images/?pattern=/etc/*&sort=name: Directory indexing found.
  117. + /login.php: Admin login page/section found.
  118. + 7446 requests: 0 error(s) and 14 item(s) reported on remote host
  119. + End Time: 2017-05-18 15:29:27 (GMT3) (2319 seconds)
  120. ---------------------------------------------------------------------------
  121. + 1 host(s) tested
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement