SMOLNET PORTAL home about changes
This is a test
(UNKN) CNN HTTPS ((null))
(UNKN) zdo gopher ((null))
(UNKN) HTML quote "this is a quote" test.
(UNKN) HTML quote 'this is a apostrophe' test.
(UNKN) HTML insertion attack test ((null))
(UNKN) HTML insertion attack test
(HTML) CNN HTTP GET (www.cnn.com) text/html
(HTML) CNN HTTP GET (www.cnn.com) text/html
(UNKN) CNN US with a port in the URL ((null))
(FILE) HTTP GET to a text file with type 0 gophertype (should work in squid, and fail everywhere else) (www.rfc-editor.org) text/plain
(UNKN) Weird type w, but with the GET hack. (www.cnn.com)
Information line <b>with HTML that should not be rendered</b>
Inline javascript? popups up if you are vulnerable<script>alert("Your browser, which is probably libwww based, is vulnerable to arbitrary HTML and javascript insertion.");</script>
End of test
Response: application/gopher-menu
Original URLgopher://gopher.zcrayfish.soy/1/irc/test/
Content-Typeapplication/gopher-menu; charset=utf-8