


PHP cross-site attack instance analysis, PHP cross-instance analysis_PHP tutorial
php cross-site attack instance analysis, php cross-instance analysis
The examples in this article describe the principles and prevention techniques of PHP cross-site attacks. Share it with everyone for your reference. The specific method analysis is as follows:
Cross-site attacks are carried out by exploiting some details or bugs in the program. So how can we prevent cross-site attacks? Below is an example of preventing cross-site attacks. I hope it will be helpful to you.
/**
* enc
*/
function encrypt($token_time) {
return md5('!@##$@$$#%43' . $token_time);
}
$token_time = time();
$token = encrypt($token_time);
$expire_time = 10;
if ($_POST) {
$_token_time = $_POST['token_time'];
$_token = $_POST['token'];
if ((time() – $_token_time) > $expire_time) {
echo “expired token”;
echo “
”;
}
echo $_token;
echo “
”;
$_token_real = encrypt($_token_time);
echo $_token_real;
//compare $_token and $_token_real
}
?>
By including a verification code in your form, you have virtually eliminated the risk of a cross-site request forgery attack. You can use this flow in any form that needs to perform an action
Of course, it is better to store the token in the session. Here is just a simple example
Simple analysis:
Token attack prevention is also called token. When the user accesses the page, we generate a random token to save the session and form. When the user submits, if the token we obtain is different from the session, we can submit and re-enter the submission. Data
I hope this article will be helpful to everyone’s PHP programming design.
if($rw_uid = intval($rws[0])) { $rw_uid seems to be a cross-site scripting vulnerability caused by judgment
Example: $_GET['rewrite'] = '123_js';
Then the ideal result according to the judgment method is $_GET['uid'] = 123; $_GET['do'] = 'js';
But if $_GET['rewrite'] = 'js '; According to the judgment result, it is equal to $_GET['do'] = 'js';
This is caused by lax verification. If it is strictly required that the intrusion must be a number_string in this format, then you have to Strictly filter parameters
The prevention methods are also simple:
1. Program code vulnerabilities, which require security-conscious programmers to fix. Usually, you only know which aspect to fix after the horse is hung;
2. It can also be solved through a security company. In China, security companies such as Sinesafe and NSFOCUS are more professional.
3. "Read", "Write" and "Execute" the server directory permissions. "Whether scripts are allowed", etc. Using the space of a virtual space provider that has been operating for a long time can effectively reduce the chance of being hacked.
I am engaged in the IDC industry. The above are also questions that I often encounter in my daily work. I hope my answers will be helpful to you.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



In this chapter, we will understand the Environment Variables, General Configuration, Database Configuration and Email Configuration in CakePHP.

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

To work with date and time in cakephp4, we are going to make use of the available FrozenTime class.

Working with database in CakePHP is very easy. We will understand the CRUD (Create, Read, Update, Delete) operations in this chapter.

To work on file upload we are going to use the form helper. Here, is an example for file upload.

In this chapter, we are going to learn the following topics related to routing ?

CakePHP is an open-source framework for PHP. It is intended to make developing, deploying and maintaining applications much easier. CakePHP is based on a MVC-like architecture that is both powerful and easy to grasp. Models, Views, and Controllers gu

Validator can be created by adding the following two lines in the controller.
