Detailed explanation of PHP security examples
1. SQL injection
#By inserting SQL commands into Web form submissions or entering query strings for domain names or page requests, it ultimately deceives the server into executing Malicious SQL commands.
Defense: First filter, then perform parameter binding.
2. XSS
Cross Site Scripting
Principle: Embed scripts into web pages in different ways to achieve attack purposes.
Defense: Filter input.
$id = (int) $_REQUEST['id'];if( $id > 0 ){}
$name = htmlentities($_REQUEST['name'], ENT_QUOTES, "UTF-8");// 注意,如果这里不进行转化也是可以的,// 只要在输出的时候进行转化(建立在已经参数绑定的情况下)。
3. CSRF
##Cross-site request forgery Cross-site request forgery
Principle: Helen logged into Weibo and then browsed a harmful site. A fake post on Weibo was forged on the harmful site. At this time, Helen posted a Weibo without knowing it.
Defense: Embed a random token in the Weibo page, and the Weibo server verifies the token value.
4. Clickjacking
5. Upload filesClickJacking
##Principle: Approximately There are two ways. One is that the attacker uses a transparent iframe, covering it on a web page, and then induces the user to operate on the page. At this time, the user will click on the transparent iframe page without knowing it; the other is The attacker uses an image to cover the web page, blocking the original location of the web page.Defense: Use js to determine whether the frame is under the same domain name. Add header directive: X-Frame-Options.
// js if (top.location.hostname !== self.location.hostname) { alert("您正在访问不安全的页面,即将跳转到安全页面!"); top.location.href = self.location.href;}// Apache 配置:Header always append X-Frame-Options SAMEORIGIN// nginx 配置:add_header X-Frame-Options SAMEORIGIN;Copy after loginCopy after login
Principle: Various types of illegal software may be uploaded.6. zip *Defense: detection type, detection size.
Principle: Some zip files look very small but are very large after decompression7. Session hijackingDefense: Do not do this: decompress, process, and then compress compressed files uploaded by users. Because when you decompress, your server is likely to be crowded.
Principle: When the client and server communicate, the hacker captures the packet and obtains the sessionid , and eventually the hacker communicates with the server.8. Password storageDefense:
Set HttpOnly and reset sessionid from time to time.
$hashedPassword = password_hash('password', PASSWORD_DEFAULT);password_verify('the wrong password', $hashedPassword); // falsepassword_verify('my super cool password', $hashedPassword); // true
Copy after loginCopy after login
9. Brute force cracking$hashedPassword = password_hash('password', PASSWORD_DEFAULT);password_verify('the wrong password', $hashedPassword); // falsepassword_verify('my super cool password', $hashedPassword); // true
/**防御:1. 限制次数2. 验证码3. 防火墙分析 类似 fail2ban*/
Copy after loginCopy after login
server Security/**防御:1. 限制次数2. 验证码3. 防火墙分析 类似 fail2ban*/
1. Modify port 22
vi /etc/ssh/sshd_configfirewall-cmd --list-allfirewall-cmd --add-port=8888/tcp --permanentfirewall-cmd --reload# 如果是阿里云服务器,不要忘记修改阿里云安全组
Copy after loginCopy after login
2. Modify mysql root namevi /etc/ssh/sshd_configfirewall-cmd --list-allfirewall-cmd --add-port=8888/tcp --permanentfirewall-cmd --reload# 如果是阿里云服务器,不要忘记修改阿里云安全组
# 修改 mysql 数据库中的 user 表,然后 flush privileges
Copy after loginCopy after login
3. Prohibit root remote login# 修改 mysql 数据库中的 user 表,然后 flush privileges
vi /etc/ssh/sshd_configPermitRootLogin
Copy after loginCopy after login
vi /etc/ssh/sshd_configPermitRootLogin
web security
1. sql injection
By inserting SQL commands into Web form submissions or entering domain names or query strings for page requests, the server is ultimately tricked into executing malicious SQL commands.2. XSSDefense: First filter, then perform parameter binding.
Cross Site Scripting3. CSRFPrinciple: Embed scripts into web pages in different ways to achieve attack purposes.
Defense: Filter input.
$id = (int) $_REQUEST['id'];if( $id > 0 ){}Copy after loginCopy after login$name = htmlentities($_REQUEST['name'], ENT_QUOTES, "UTF-8");// 注意,如果这里不进行转化也是可以的,// 只要在输出的时候进行转化(建立在已经参数绑定的情况下)。Copy after loginCopy after login
##Cross-site request forgery Cross-site request forgery
Principle: Helen logged into Weibo and then browsed a harmful site. A fake post on Weibo was forged on the harmful site. At this time, Helen posted a Weibo without knowing it.
Defense: Embed a random token in the Weibo page, and the Weibo server verifies the token value.
4. Clickjacking
ClickJacking
原理:大概有两种方式,一是攻击者使用一个透明的 iframe ,覆盖在一个网页上,然后诱使用户在该页面上进行操作,此时用户将在不知情的情况下点击透明的 iframe 页面;二是攻击者使用一张图片覆盖在网页,遮挡网页原有位置。
防御:使用 js 判断框架是否在同一个域名下。添加头部指令: X-Frame-Options。
// js if (top.location.hostname !== self.location.hostname) { alert("您正在访问不安全的页面,即将跳转到安全页面!"); top.location.href = self.location.href;}// Apache 配置:Header always append X-Frame-Options SAMEORIGIN// nginx 配置:add_header X-Frame-Options SAMEORIGIN;
5. 上传文件
原理:可能会被上传各种类型的非法软件。
防御:检测类型,检测大小。
6. zip *
原理:有些 zip 文件看起来很小,解压后非常大
防御:不要做这样的操作:对用户上传的压缩文件解压,处理,再压缩。因为你解压的时候,很可能你的服务器就被挤爆了。
7. session 劫持
原理:客户端和服务端通信时候,黑客抓包,获取 sessionid ,最终黑客与服务器通信。
防御:
设置 HttpOnly,时常重设 sessionid。
8. 密码存储
$hashedPassword = password_hash('password', PASSWORD_DEFAULT);password_verify('the wrong password', $hashedPassword); // falsepassword_verify('my super cool password', $hashedPassword); // true
9. 暴力破解
/**防御:1. 限制次数2. 验证码3. 防火墙分析 类似 fail2ban*/
服务器安全
1. 修改 22 端口
vi /etc/ssh/sshd_configfirewall-cmd --list-allfirewall-cmd --add-port=8888/tcp --permanentfirewall-cmd --reload# 如果是阿里云服务器,不要忘记修改阿里云安全组
2. 修改 mysql root 名称
# 修改 mysql 数据库中的 user 表,然后 flush privileges
3. 禁止 root 远程登陆
vi /etc/ssh/sshd_configPermitRootLogin
相关推荐:
The above is the detailed content of Detailed explanation of PHP security examples. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

In this chapter, we will understand the Environment Variables, General Configuration, Database Configuration and Email Configuration in CakePHP.

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

To work with date and time in cakephp4, we are going to make use of the available FrozenTime class.

To work on file upload we are going to use the form helper. Here, is an example for file upload.

In this chapter, we are going to learn the following topics related to routing ?

CakePHP is an open-source framework for PHP. It is intended to make developing, deploying and maintaining applications much easier. CakePHP is based on a MVC-like architecture that is both powerful and easy to grasp. Models, Views, and Controllers gu

Validator can be created by adding the following two lines in the controller.

Working with database in CakePHP is very easy. We will understand the CRUD (Create, Read, Update, Delete) operations in this chapter.
