ورود

View Full Version : Mass Poster



Tasnim
چهارشنبه 13 آبان 1388, 09:38 صبح
سلام دوستان
من ميخام يه برنامه بنويسم که يه سري اطلاعات رو توي سايت zone-h ثبت کنه اما با اون مشکل دارم کد رو ميذارم دوستان ببينن چه مشکلي داره
ممنون
اينم آدرس صفحه اي که بايد اطلاعات توش درج بشه:
http://www.zone-h.net/notify/mass

procedure TForm1.btSendClick(Sender: TObject);
var
ARequestContent : TStringList;
AResponse: String;
begin
ARequestContent := TStringList.Create;
try
ARequestContent.Add('defacer=' + edName.Text);
ARequestContent.Add('domain1=' + edPass.Text);
ARequestContent.Add('domain2=' + Edit1.Text);
ARequestContent.Add('domain3=' + Edit2.Text);
ARequestContent.Add('domain4=' + Edit3.Text);
ARequestContent.Add('domain5=' + Edit4.Text);
ARequestContent.Add('domain6=' + Edit5.Text);
ARequestContent.Add('domain7=' + Edit6.Text);
ARequestContent.Add('domain8=' + Edit7.Text);
ARequestContent.Add('domain9=' + Edit8.Text);
ARequestContent.Add('domain10=' + Edit9.Text);
ARequestContent.Add('hackmode=' + IntToStr(Comb_Mode.ItemIndex));
ARequestContent.Add('dreason=' +IntToStr(Comb_Reson.ItemIndex) );
ARequestContent.Add('submit=' + 'Send');
AResponse := IdHTTPTest.Post('http://www.zone-h.net/notify/mass', ARequestContent);
ShowMessage(AResponse);
finally
ARequestContent.Free;
end;
end;

Tasnim
چهارشنبه 13 آبان 1388, 09:47 صبح
در ضمن اينم خروجيه که برمي گردونه ولي چيزي توي سايت ثبت نمي شه

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
<title></title>
<link href="/css/style.css" rel="stylesheet" type="text/css"/>
<META NAME="Description" CONTENT="">
<META NAME="Keywords" CONTENT="">
<script type="text/javascript" src="/js/zh.js"></script>
</head>

<body>
<div id="content">
<div id="logo"><img src="/images/logo.gif"/></div>
<div id="menu">
<ul>
<li><a href="/">Home</a></li>
<li><a href="/listingnews">News</a></li>
<li><a href="/archive">Archive</a></li>
<li><a href="/archive/special=1">Archive <img src="/images/star.gif" border="0"></a></a></li>
<li><a href="/archive/published=0">Onhold</a></li>
<li><a href="/notify/single">Notify</a></li>
<!-- <li style="float:right;"><input id ="searchinput" type="text" name="search" value="search..."/></li> -->
</ul>
</div>
<div id="bodyy">
<div id="propdeface">
<br/>
<a
href="/notify/single">SINGLE</a> | MASS <br/><br/>
<h2>Warning</h2>
<p class="warning">
A defacement is considered in all countries an unauthorized computer access, a denial of service action therefore a CRIME under all means, even if you don't think so. The activity of defacing to warn the administrator of a bugged server about its vulnerable status is considered a crime too and a questionable ethical conduct.<br/>
Zone-H accepts your notifications but doesn't support, condone, justify at all any defacing activity. Instead, we welcome you to stop such activity or else you might face the same destiny of some notorious defacers who got arrested and jailed. See the following examples:<br/><br/>

http://www.theregister.com/2005/06/28/deceptive_duo_hacker_jailed<br/>
http://www.theregister.co.uk/2005/10/27/secfocus_hacker_deport/page2.html<br/>
http://www.zone-h.org/content/view/4446/31<br/><br/>

You might want to consider instead, the possibility to quit your ILLEGAL activity before getting jailed (because you will) as other defacers did before you. See this example:<br/><br/>

http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=12044&mode=thread&order=0&thold=0<br/><br/>

If you have any question or if you need any help or advice to convince you about all of the above, feel free to contact any of the Zone-H staff members.
</p>
<font color="red">ERROR:<br/>Please select a reason.<br/>
</font> <form method="post" action="/notify/mass">
<ul>
<li>
<ul>
<li>Defacer :</li>
<li><input type="text" name="defacer" value="Tasnim"/> </li>
</ul>
</li>
<li>
<ul>
<li>Domain 1</li>

<li><input type="text"
name="domain1"
value="http://www.test1.ir"/></li>
</ul>
</li>
<li>
<ul>
<li>Domain 2</li>

<li><input type="text"
name="domain2"
value="http://www.test2.ir"/></li>
</ul>
</li>
<li>
<ul>
<li>Domain 3</li>

<li><input type="text"
name="domain3"
value="http://www.test3.ir"/></li>
</ul>
</li>
<li>
<ul>
<li>Domain 4</li>

<li><input type="text"
name="domain4"
value="http://"/></li>
</ul>
</li>
<li>
<ul>
<li>Domain 5</li>

<li><input type="text"
name="domain5"
value="http://"/></li>
</ul>
</li>
<li>
<ul>
<li>Domain 6</li>

<li><input type="text"
name="domain6"
value="http://"/></li>
</ul>
</li>
<li>
<ul>
<li>Domain 7</li>

<li><input type="text"
name="domain7"
value="http://"/></li>
</ul>
</li>
<li>
<ul>
<li>Domain 8</li>

<li><input type="text"
name="domain8"
value="http://"/></li>
</ul>
</li>
<li>
<ul>
<li>Domain 9</li>

<li><input type="text"
name="domain9"
value="http://"/></li>
</ul>
</li>
<li>
<ul>
<li>Domain 10</li>

<li><input type="text"
name="domain10"
value="http://"/></li>
</ul>
</li>
<li>
<ul>
<select name="hackmode">
<option value="">--------SELECT--------</option>
<option
value="1" >known vulnerability (i.e. unpatched system)</option>
<option
value="2" >undisclosed (new) vulnerability</option>
<option
value="3" >configuration / admin. mistake</option>
<option
value="4" >brute force attack</option>
<option
value="5" >social engineering</option>
<option
value="6" >Web Server intrusion</option>
<option
value="7" >Web Server external module intrusion</option>
<option
value="8" >Mail Server intrusion</option>
<option
value="9" >FTP Server intrusion</option>
<option
value="10" >SSH Server intrusion</option>
<option
value="11" >Telnet Server intrusion</option>
<option
value="12" >RPC Server intrusion</option>
<option
value="13" >Shares misconfiguration</option>
<option
value="14" >Other Server intrusion</option>
<option
value="15" SELECTED>SQL Injection</option>
<option
value="16" >URL Poisoning</option>
<option
value="17" >File Inclusion</option>
<option
value="18" >Other Web Application bug</option>
<option
value="19" >Remote administrative panel access through bruteforcing</option>
<option
value="20" >Remote administrative panel access through password guessing</option>
<option
value="21" >Remote administrative panel access through social engineering</option>
<option
value="22" >Attack against the administrator/user (password stealing/sniffing)</option>
<option
value="23" >Access credentials through Man In the Middle attack</option>
<option
value="24" >Remote service password guessing</option>
<option
value="25" >Remote service password bruteforce</option>
<option
value="26" >Rerouting after attacking the Firewall</option>
<option
value="27" >Rerouting after attacking the Router</option>
<option
value="28" >DNS attack through social engineering</option>
<option
value="29" >DNS attack through cache poisoning</option>
<option
value="30" >Not available</option>
</select> </ul>
</li>
<li>
<ul>
<select name="reason">
<option value="">--------SELECT--------</option>
<option
value="1" >Heh...just for fun!</option>
<option
value="2" >Revenge against that website</option>
<option
value="3" >Political reasons</option>
<option
value="4" >As a challenge</option>
<option
value="5" >I just want to be the best defacer</option>
<option
value="6" >Patriotism</option>
<option
value="7" >Not available</option>
</select> <font color="red">ERROR</font> </ul>
</li>
<li>
<ul><input type="submit" value="Send"/></ul>
</li>
</ul>
</form>
</div>
</div>
<div id="footer">..</div>
</div>
</body>
</html>

Tasnim
پنج شنبه 14 آبان 1388, 08:49 صبح
از دوستان کسي تا حالا با اين مشکل مواجه نشدند يا توي اين زمينه کار نکردن که بتونن راهنمايي کنن؟

Tasnim
یک شنبه 17 آبان 1388, 17:15 عصر
اساتيد کسي با اين مشکل تا حالا مواجه نشدن

Tasnim
سه شنبه 19 آبان 1388, 14:50 عصر
جالبه کسي نميدونه چطور ميشه اين مشکل رو حل کرد؟!!!!!!!!!!!!!!