Home > Backend Development > PHP Tutorial > PHP method to quickly find malicious code in the database_PHP tutorial

PHP method to quickly find malicious code in the database_PHP tutorial

WBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWB
Release: 2016-07-13 09:58:41
Original
986 people have browsed it

How to quickly find malicious code in the database in php

This article describes an example of how to quickly find malicious code in the database in php. Share it with everyone for your reference. The details are as follows:

The database has been entered with malicious code. In order to ensure the security of your database, you must clean it carefully. With the following super convenient function, you can quickly remove malicious code from your database.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

function cleanInput($input) {

$search = array(

'@]*?>.*?@si', // Strip out javascript

'@<[/!]*?[^<>]*?>@si', // Strip out HTML tags

'@

]*?>.*?

@siU', // Strip style tags properly

'@@' // Strip multi-line comments

);

$output = preg_replace($search, '', $input);

return $output;

}

function sanitize($input) {

if (is_array($input)) {

foreach($input as $var=>$val) {

$output[$var] = sanitize($val);

}

}

else {

if (get_magic_quotes_gpc()) {

$input = stripslashes($input);

}

$input = cleanInput($input);

$output = mysql_real_escape_string($input);

}

return $output;

}

// Usage:

$bad_string = "Hi! It's a good day!";

$good_string = sanitize($bad_string);

// $good_string returns "Hi! It's a good day!"

// Also use for getting POST/GET variables

$_POST = sanitize($_POST);

$_GET = sanitize($_GET);

1 2

34 5 6 7 8 9
10
11
12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34
function cleanInput($input) { $search = array( '@]*?>.*?@si', // Strip out javascript '@<[/!]*?[^<>]*?>@si', // Strip out HTML tags '@ ]*?>.*? @siU', // Strip style tags properly '@@' // Strip multi-line comments ); $output = preg_replace($search, '', $input); return $output; } function sanitize($input) { if (is_array($input)) { foreach($input as $var=>$val) { $output[$var] = sanitize($val); } } else { if (get_magic_quotes_gpc()) { $input = stripslashes($input); } $input = cleanInput($input); $output = mysql_real_escape_string($input); } return $output; } // Usage: $bad_string = "Hi! It's a good day!"; $good_string = sanitize($bad_string); // $good_string returns "Hi! It's a good day!" // Also use for getting POST/GET variables $_POST = sanitize($_POST); $_GET = sanitize($_GET);
http://www.bkjia.com/PHPjc/977167.htmlwww.bkjia.comtruehttp: //www.bkjia.com/PHPjc/977167.htmlTechArticleHow to quickly find malicious code in the database using php. This example describes how to quickly find malicious code in the database using php. Share it with everyone for your reference. The details are as follows: The database is...
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Latest Issues
php data acquisition?
From 1970-01-01 08:00:00
0
0
0
PHP extension intl
From 1970-01-01 08:00:00
0
0
0
How to learn php well
From 1970-01-01 08:00:00
0
0
0
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template