コード例 #1
0
ファイル: index.php プロジェクト: KinG-InFeT/0xSentinel
/*
 *
 * @project 0xSentinel
 * @author KinG-InFeT
 * @licence GNU/GPL
 *
 * @file index.php
 *
 * @link http://0xproject.netsons.org#0xSentinel
 *
 */
session_start();
include "config.php";
include "lib/layout.class.php";
$layout = new layout();
$layout->header();
if (isset($_SESSION['0xSentinel']['admin'])) {
    $layout->admin_menu();
} else {
    $layout->menu();
}
switch (@$_GET['act']) {
    case 'banner':
        print "\n<div align=\"center\">" . "\n<img src=\"/0xSentinel/banner.php\" />" . "\n<br /><br />" . "\n<p>Per aggiungere il banner dinamico al vostro portale, basta copiare ed incollare il seguente codice HTML:</p>" . "\n<br />" . "\n<textarea cols=\"50\" rows=\"6\">" . "\n<a href=\"/0xSentinel/about.php\" target=\"_blank\"><img border=\"0\" src=\"/0xSentinel/banner.php\" alt=\"0xSentinel Dinamic Banner\" title=\"0xSentinel Dinamic Banner\"></a>" . "\n</textarea>" . "\n</div>";
        break;
    default:
        print "\n<br /><br />" . "\n0xSentinel nella sua release attuale è in grado di protegge una qualsiasi applicazione in PHP dai seguenti tipi di attacchi:<br />" . "\n<br />" . "<li>Scanning/crawling di software come Acunetix o simili</li>\n" . "<li>Blind SQL Injection</li>\n" . "<li>SQL Injection</li>\n" . "<li>RFI (Remote File Inclusion)</li>\n" . "<li>LFI (Local File Inclusion)</li>\n" . "<li>Log Poisoning</li>\n" . "<li>RCE (Remote Code Execution)</li>\n" . "<li>Directory Traversal</li>\n" . "<li>Full Path Disclosure</li>\n" . "<li>XSS (Cross Site Scripting)</li>\n" . "<li>CSRF (Cross Site Request Forgery)</li>\n" . "<li>Blocco Script in PERL (Exploit)</li>\n" . "<br /><br />\n";
        if (file_exists('./install.php')) {
            print "<a href='install.php'><u><b><font color=\"red\">0xSentinel non è ancora installato, installalo ora!.</font></b></u></a>\n";
        }
        break;