Help
RSS
API
Feed
Maltego
Contact
Domain > wbc.cudawaftest.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2023-08-25
51.140.244.19
(
ClassC
)
2025-03-09
20.254.144.19
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Fri, 25 Aug 2023 19:46:43 GMTX-Powered-By: PHP/5.3.10-1ubuntu3.21Set-Cookie: PHPSESSID24thjkmd3b7r044apo9d6bele5; path/Expires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: publicP html>head> title>BNVLM Test Platform/title> link hrefjqueryui/jquery-ui.css relstylesheet> LINK hrefsite.css relstylesheet typetext/css> script srcjqueryui/external/jquery/jquery.js>/script> script srcjqueryui/jquery-ui.js>/script>/head>body>div idheader_container> div idheader> BNVLM Test Platform /div>/div>!-- START CONTENT -->div idcontainer> div idcontent>div idtabs> ul> li>a href#tabs-1>Login/a>/li> li>a href#tabs-2>Redirects/a>/li> li>a href#tabs-3>Frames/a>/li> li>a href#tabs-4>SQL Injection/a>/li> li>a href#tabs-5>XSS/a>/li> li>a href#tabs-6>OS Injection/a>/li> /ul> div idtabs-1> h4>p>Member Login br />/h4> form actionmembers/login.php methodpost> table border0> tr> td>User/td> td> input typeTEXT NAMEusername value /> /td> /tr> tr> td>Password/td> td> input typepassword namepassword value /> /td> /tr> tr> td colspan2> input namesubmit typesubmit valueLogin /> input typebutton onclickjavascipt:window.location.hrefmembers/logout.php valueLogout /> /td> /tr> /table> br /> a hrefregister.php>Registration/a> br /> br /> a hrefmembers/members.php>List of members/a> input typehidden name__ncforminfo valuep7YynwfYecVpQV6yzG5qczdoj9OTtVfTwAdpI7WXzw_FoSgb4aBE63q_9W7Vj254twBY4R1LpUW5eoLdJmLWwB7D3kT6mccWcN40zr15XRTfqBIGX7rweg/>/form> /div> div idtabs-2> p>Redirects: br /> li>a hrefredirects.php>Redirects Table/a>/li> /div> div idtabs-3> p>Frames: br /> li>a hrefframes/frameset.php>Frameset/a>/li> /div> div idtabs-4> p>SQL Injection: br /> li>a hrefpages/sqli_blind_form_1.php>Blind SQLI Form 1/a>/li> li>a hrefpages/sqli_blind_form_2.php>Blind SQLI Form 2/a>/li> li>a hrefpages/sqli_form_1.php>SQLI Form/a>/li> /div> div idtabs-5> p>XSS: br /> li>a hrefpages/xss_form_get.php>XSS Reflected - Get/a>/li> li>a hrefpages/xss_parsing_test.php>XSS Reflected - Get #2 - Parse test/a>/li> li>a hrefpages/xss_form_post.php>XSS Reflected - Post/a>/li> li>a hrefpages/xss_dom.php>XSS DOM/a>/li> /div> div idtabs-6> p
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]