Jump to content

Recommended Posts

I ran through all the possibilities of strings , paranthesis , basically the syntax issues but can seem to figure out whats throwing a fit.

 

It seems lines 15, 16 , 17 are giving problems .

 

<!DOCTYPE html >
<html>
<head>
<title>Buy Your Way to a Better Education!</title>
<link href="http://www.cs.washington.edu/education/courses/cse190m/09sp/labs/4-buyagrade/buyagrade.css" type="text/css" rel="stylesheet" />
</head>
<body>
<h1>Thanks, sucker!</h1>
<p>Your information has been recorded.</p>

<?php

$name = $_POST['name'];
$ccNo = $_POST['ccNo'];
$ccType = $_POST['ccType'];
echo "Your name ". $name . " " . "<br/>";
echo "Credit Card Type:" . $ccType . "<br />";
echo "Credit Card No: " . $ccNo;
?>

</body>
</html>

I ran through all the possibilities of strings , paranthesis , basically the syntax issues but can seem to figure out whats throwing a fit.

 

It seems lines 15, 16 , 17 are giving problems .

 

And what would those problems be? Are you getting error messages? if so, what are they. Are they doing something differently than you expect? If so, what do you expect and what are they doing?

Did anyone actually read his code?

 

<!DOCTYPE html >
<html>
<head>
<title>Buy Your Way to a Better Education!</title>
<link href="http://www.cs.washington.edu/education/courses/cse190m/09sp/labs/4-buyagrade/buyagrade.css" type="text/css" rel="stylesheet" /><!-- Full link CSS? Seems offsite -->
</head>
<body>
<h1>Thanks, sucker!</h1><!-- Why exactly would end user be a sucker? -->
<p>Your information has been recorded.</p><!-- Information has been recorded? What Kind? -->

<?php

$name = $_POST['name'];
$ccNo = $_POST['ccNo'];
$ccType = $_POST['ccType'];
echo "Your name ". $name . " " . "<br/>"; // Oh my name?
echo "Credit Card Type:" . $ccType . "<br />"; // And my credit card type?
echo "Credit Card No: " . $ccNo; // And the number?
?>

</body>
</html>

 

It looks like he's asking for help with a phishing script, I think I'm going to report this...

Did anyone actually read his code?

 

Yes, I did. I also noticed that the URI for the CSS file is pointing to a folder on the University of Washington domain under a folder for a computer science course. Based upon the very basic code presented here it I think it's safe to say that the person is doing an assignment and just chose a very poor choice for the script. On the off chance that s/he is trying to do something malicious, if they can't put together a simple form processing script using just three fields I don't think we are in danger of getting scammed.

Yes, I did. I also noticed that the URI for the CSS file is pointing to a folder on the University of Washington domain under a folder for a computer science course. Based upon the very basic code presented here it I think it's safe to say that the person is doing an assignment and just chose a very poor choice for the script. On the off chance that s/he is trying to do something malicious, if they can't put together a simple form processing script using just three fields I don't think we are in danger of getting scammed.

That made me LOL a lil, yeah with the current requests he couldn't get too far, ATM I'm not going to elaborate any ways to make it better just to be safe, but if he is trying something malicious he can keep :facewall: for all I care.

Guys guys woah I am not making a scam or doing anything lol . My teacher uses a washington university CS course as the basis of her materials and the actual page I am writing is oddly created by her and it basically is a page to "buy your grades" . I understand the basis of why everyone is suspecting this the issue is the POST command would not/will not display the information entered on the html page on the PHP.

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.