VBcoders Guest



Don't have an account yet? Register
 


Forgot Password?



Checks for the following vulnerability types of a website: RFI (Remote File Inclusion) LFI (Local F

by xyr0x (7 Submissions)
Category: Internet/HTML
Compatability: Visual Basic 4.0 (32-bit)
Difficulty: Unknown Difficulty
Originally Published: Thu 27th September 2007
Date Added: Mon 8th February 2021
Rating: (1 Votes)

Checks for the following vulnerability types of a website: RFI (Remote File Inclusion) LFI (Local File Inclusion) and XSS (Cross Site

API Declarations



There are no Declarations. =)

Rate Checks for the following vulnerability types of a website: RFI (Remote File Inclusion) LFI (Local F



'Author: xyr0x                                    
'Date: September 27th, 2007                      
'Agreement of use of my Open sources are;         
'Give me full credit for where or what of mine    
'you decide to use, thanks. xyr0x                 

'NOTES: I MAY START THIS UP AGAIN EVEN THOUGH I'M GIVING 
'IT TO THE OPEN SOURCE COMMUNITY...    

Private Sub cmdAbout_Click()
Form2.Show
End Sub

Private Sub cmdChecksite_Click()
On Error Resume Next
If txtsite.Text = "" Then
MsgBox "Target site is not configured!", vbExclamation, App.Title
Else
If txtsyn = "" Then
MsgBox "Syntax field is not configured!", vbExclamation, App.Title
Else
If txtRFI.Text = "" Then
MsgBox "RFI Template is not included!", vbExclamation, App.Title
Else
If lstRFI.Text = "" Then
MsgBox "Please select an RFI line to include!", vbExclamation, App.Title
Else
txtsite.Text = txtsite.Text + txtsyn.Text + lstRFI.Text + txtRFI.Text
wb1.Navigate txtsite.Text + txtsyn.Text + lstRFI.Text + txtRFI.Text
End If
End If
End If
End If
End Sub

Private Sub cmdClear_Click()
lstRFI.Clear
End Sub

Private Sub cmdimpSyn_Click()
On Error Resume Next
List1.Clear
Dim item As String
With CD1
        .Filter = ".DAT(*.dat)|*.dat"
        .FilterIndex = 2
        .CancelError = True
        On Error GoTo ErrHandler
        .ShowOpen
        Open .FileName For Input As #3
            Do While Not EOF(3)
            Line Input #3, item
                If Len(item) > 0 Then
                    List1.AddItem item
                End If
            Loop
        Close #3
End With
Exit Sub
ErrHandler:
Exit Sub
End Sub

Private Sub cmdStop_Click()
On Error Resume Next
wb1.Stop
wb1.Navigate ":blank"
End Sub

Private Sub Command1_Click()
Form2.Show
End Sub

Private Sub Command2_Click()
Form3.Show
End Sub

Private Sub cmdXSSCheck_Click()
On Error Resume Next
If txtsite.Text = "" Then
MsgBox "Target site is not configured!", vbExclamation, App.Title
Else
If txtxss.Text = "" Then
MsgBox "XSS string is missing!", vbExclamation, App.Title
Else
txtsite.Text = txtsite.Text + txtxss.Text
wb1.Navigate txtsite.Text + txtxss.Text
End If
End If
End Sub

Private Sub Form_unload(Cancel As Integer)
End
End Sub

Private Sub GurhanButton2_Click()
txtsite.Text = ""
txtsyn.Text = ""
txtxss.Text = ""
lstRFI.Text = ""
txtRFI.Text = ""
End Sub

Private Sub GurhanButton6_Click()
List1.Clear
txtsyn.Text = ""
End Sub

Private Sub ldVulns_Click()
On Error Resume Next
lstRFI.Clear
Dim item As String
With CD1
        .Filter = "DAT(*.dat)|*.dat"
        .FilterIndex = 2
        .CancelError = True
        On Error GoTo ErrHandler
        .ShowOpen
        Open .FileName For Input As #3
            Do While Not EOF(3)
            Line Input #3, item
                If Len(item) > 0 Then
                    lstRFI.AddItem item
                End If
            Loop
        Close #3
End With
Exit Sub
ErrHandler:
Exit Sub
End Sub


Private Sub List1_Click()
Dim start
Dim lstindex
start = txtsyn.SelStart

txtsyn.Text = ""

lstindex = Len(List1.List(List1.ListIndex))

txtsyn.SelText = List1.List(List1.ListIndex)

txtsyn.SetFocus

txtsyn.SelStart = start + lstindex
End Sub

Download this snippet    Add to My Saved Code

Checks for the following vulnerability types of a website: RFI (Remote File Inclusion) LFI (Local F Comments

No comments have been posted about Checks for the following vulnerability types of a website: RFI (Remote File Inclusion) LFI (Local F. Why not be the first to post a comment about Checks for the following vulnerability types of a website: RFI (Remote File Inclusion) LFI (Local F.

Post your comment

Subject:
Message:
0/1000 characters