User Controls
Pretty cool chemistry website
-
2016-01-27 at 5:10 AM UTC
-
2016-01-27 at 4:03 PM UTCLooks like its from the early 90s . those banners are sexy
-
2016-01-31 at 10:55 PM UTC"This site was created using Macromedia Dreamweaver 3.0. Other softwares used are: Adobe Photoshop 5.5, Microsoft Excel 97, Microsoft PowerPoint 97, Macromedia Flash 4.0, and Macromedia Fireworks 3.0."
Holy fucking lol.
-
2016-02-01 at 12:51 AM UTC
"This site was created using Macromedia Dreamweaver 3.0. Other softwares used are: Adobe Photoshop 5.5, Microsoft Excel 97, Microsoft PowerPoint 97, Macromedia Flash 4.0, and Macromedia Fireworks 3.0."
Its probably hosted on spectrals unpatched windows 98 machine.
Holy fucking lol.
-
2016-02-17 at 6:33 PM UTCJFC. Such old. How vulnerable is this site?
-
2016-04-28 at 7:07 PM UTCThis is going to turn into a thread with all my chemistry links, im sure of it.
[SIZE=12px]Illustrated Glossary of Organic Chemistry:[/SIZE] http://www.chem.ucla.edu/~harding/IGOC/IGOC.html
Random sciencemadness thread on homemade spec: http://www.sciencemadness.org/talk/viewthread.php?tid=4831
UV spec: http://www2.chemistry.msu.edu/faculty/reusch/virttxtjml/spectrpy/UV-Vis/uvspec.htm#uv1
vis and uv spec: http://www2.chemistry.msu.edu/faculty/reusch/virttxtjml/spectrpy/UV-Vis/spectrum.htm#uv1 -
2016-04-28 at 9:09 PM UTC
JFC. Such old. How vulnerable is this site?
Well, the fundamental issue with web applications is user input. Seeing as this site is mostly static HTML and some javascript thrown in here and there without any forms you'd be hard pressed to find any significant vulnerabilities as far as the web app is concerned. They're also hosted on a VPS. Here's the admin login.
https://203.117.178.58:19638/webhost/services/virtualhosting/siteadmin?ocw_login_domain=separationprocesses.com
Other than that they also have their FTP port open at 203.117.178.58:21 and SSH at 203.117.178.58:22. Their SSH version is up to date as well.
-
2016-04-29 at 11:31 PM UTC
Well, the fundamental issue with web applications is user input. Seeing as this site is mostly static HTML and some javascript thrown in here and there without any forms you'd be hard pressed to find any significant vulnerabilities as far as the web app is concerned. They're also hosted on a VPS. Here's the admin login.
https://203.117.178.58:19638/webhost/services/virtualhosting/siteadmin?ocw_login_domain=separationprocesses.com
Other than that they also have their FTP port open at 203.117.178.58:21 and SSH at 203.117.178.58:22. Their SSH version is up to date as well.Well, the fundamental issue with web applications is user input. Seeing as this site is mostly static HTML and some javascript thrown in here and there without any forms you'd be hard pressed to find any significant vulnerabilities as far as the web app is concerned. They're also hosted on a VPS. Here's the admin login.
https://203.117.178.58:19638/webhost/services/virtualhosting/siteadmin?ocw_login_domain=separationprocesses.com
Other than that they also have their FTP port open at 203.117.178.58:21 and SSH at 203.117.178.58:22. Their SSH version is up to date as well.
Top shit.