PHP Security-Brute Force Attack
Violent attack
## Brute force attack is an attack method that exhausts all possibilities without using any special means. Its more formal name is an exhaustive attack - an attack that exhausts all possibilities.
For access control, a typical brute force attack involves an attacker trying to log into the system through a large number of attempts. In most cases, the username is known and the password only needs to be guessed.
Although there is no skill in brute force attacks, there seems to be some skill in dictionary attacks. The biggest difference is the intelligence in making guesses. Dictionary attacks only exhaust the list of most likely situations, rather than exhausting all possible situations like brute force attacks.
Preventing verification attempts or limiting the number of allowed errors is a relatively effective security measure, but the dilemma in doing so is how to identify and block attackers without affecting legitimate users.
In this case, a determination of consistency can help you distinguish between the two. This method is very similar to the method for preventing session hijacking described in Chapter 4, but the difference is that you want to identify an attacker rather than a legitimate user.
Consider the following HTML form:
CODE: <form action="http://example.org/login.php" method="POST"> <p>Username: <input type="text" name="username" /></p> <p>Password: <input type="password" name="password" /></p> <p><input type="submit" /></p> </form>
The attacker will view This form creates a script to POST legal data to http://www.php.cn/:
CODE: <?php $username = 'victim'; $password = 'guess'; $content = "username=$username&password=$password"; $content_length = strlen($content); $http_request = ''; $http_response = ''; $http_request .= "POST /login.php HTTP/1.1\r\n"; $http_request .= "Host: example.org\r\n"; $http_request .= "Content-Type: application/x-www-form-urlencoded\r\n"; $http_request .= "Content-Length: $content_length\r\n"; $http_request .= "Connection: close\r\n"; $http_request .= "\r\n"; $http_request .= $content; if ($handle = fsockopen('example.org', 80)) { fputs($handle, $http_request); while (!feof($handle)) { $http_response .= fgets($handle, 1024); } fclose($handle); /* Check Response */ } else { /* Error */ } ?>
With this script, an attacker could also simply add a loop to continue trying different passwords and check the $http_response variable after each attempt. Once the $http_response variable changes, it can be considered that the correct password has been guessed.
There are many security measures you can take to prevent this type of attack. We noticed that in a brute force attack, each HTTP request is exactly the same except for the password, which is very valuable.
Although temporarily freezing accounts after a certain number of failed attempts is an effective defense, you may want to consider a more deterministic approach to freezing accounts so that attackers have less impact on legitimate users of your application. Normal use.
There are also processes that can make a brute force attack more difficult, making it less likely to succeed. A simple containment mechanism can effectively do this:
CODE: <?php /* mysql_connect() */ /* mysql_select_db() */ $clean = array(); $mysql = array(); $now = time(); $max = $now - 15; $salt = 'SHIFLETT'; if (ctype_alnum($_POST['username'])) { $clean['username'] = $_POST['username']; } else { /* ... */ } $clean['password'] = md5($salt . md5($_POST['password'] . $salt)); $mysql['username'] = mysql_real_escape_string($clean['username']); $sql = "SELECT last_failure, password FROM users WHERE username = '{$mysql['username']}'"; if ($result = mysql_query($sql)) { if (mysql_num_rows($result)) { $record = mysql_fetch_assoc($result); if ($record['last_failure']> $max) { /* Less than 15 seconds since last failure */ } elseif ($record['password'] == $clean['password']) { /* Successful Login */ } else { /* Failed Login */ $sql = "UPDATE users SET last_failure = '$now' WHERE username = '{$mysql['username']}'"; mysql_query($sql); } } else { /* Invalid Username */ } } else { /* Error */ } ?>
The above example will restrict the last validation failure How often to try again later with the same user. If you try again within 15 seconds of a failed attempt, the verification will fail regardless of whether the password is correct. This is the key point of this plan. But simply blocking access for 15 seconds after a failed attempt is not enough - at this point the output will be consistent no matter what the input is, and will only differ after a successful login. Otherwise, an attacker could simply examine the inconsistent output to determine whether the login was successful.
The above is the content of PHP security-violent attack. For more related content, please pay attention to the PHP Chinese website (www.php.cn)!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

Working with database in CakePHP is very easy. We will understand the CRUD (Create, Read, Update, Delete) operations in this chapter.

To work with date and time in cakephp4, we are going to make use of the available FrozenTime class.

To work on file upload we are going to use the form helper. Here, is an example for file upload.

In this chapter, we are going to learn the following topics related to routing ?

CakePHP is an open-source framework for PHP. It is intended to make developing, deploying and maintaining applications much easier. CakePHP is based on a MVC-like architecture that is both powerful and easy to grasp. Models, Views, and Controllers gu

Validator can be created by adding the following two lines in the controller.

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c
