Table of Contents
1. SQL injection" >1. SQL injection
2. XSS" >2. XSS
3. CSRF" >3. CSRF
$hashedPassword = password_hash('password', PASSWORD_DEFAULT);password_verify('the wrong password', $hashedPassword); // falsepassword_verify('my super cool password', $hashedPassword); // true
Copy after login
Copy after login
" >
$hashedPassword = password_hash('password', PASSWORD_DEFAULT);password_verify('the wrong password', $hashedPassword); // falsepassword_verify('my super cool password', $hashedPassword); // true
Copy after login
Copy after login
/**防御:1. 限制次数2. 验证码3. 防火墙分析 类似 fail2ban*/
Copy after login
Copy after login
" >
/**防御:1. 限制次数2. 验证码3. 防火墙分析 类似 fail2ban*/
Copy after login
Copy after login
vi /etc/ssh/sshd_configfirewall-cmd --list-allfirewall-cmd --add-port=8888/tcp --permanentfirewall-cmd --reload# 如果是阿里云服务器,不要忘记修改阿里云安全组
Copy after login
Copy after login
" >
vi /etc/ssh/sshd_configfirewall-cmd --list-allfirewall-cmd --add-port=8888/tcp --permanentfirewall-cmd --reload# 如果是阿里云服务器,不要忘记修改阿里云安全组
Copy after login
Copy after login
# 修改 mysql 数据库中的 user 表,然后 flush privileges
Copy after login
Copy after login
" >
# 修改 mysql 数据库中的 user 表,然后 flush privileges
Copy after login
Copy after login
vi /etc/ssh/sshd_configPermitRootLogin
Copy after login
Copy after login
" >
vi /etc/ssh/sshd_configPermitRootLogin
Copy after login
Copy after login
5. 上传文件" >5. 上传文件
6. zip *" >6. zip *
7. session 劫持" >7. session 劫持
8. 密码存储" >8. 密码存储
9. 暴力破解" >9. 暴力破解
服务器安全" >服务器安全
1. 修改 22 端口" >1. 修改 22 端口
2. 修改 mysql root 名称" >2. 修改 mysql root 名称
3. 禁止 root 远程登陆" >3. 禁止 root 远程登陆
Home Backend Development PHP Tutorial Detailed explanation of PHP security examples

Detailed explanation of PHP security examples

Mar 06, 2018 am 10:27 AM
php Example Detailed explanation

1. SQL injection

#By inserting SQL commands into Web form submissions or entering query strings for domain names or page requests, it ultimately deceives the server into executing Malicious SQL commands.

Defense: First filter, then perform parameter binding.

2. XSS

Cross Site Scripting

Principle: Embed scripts into web pages in different ways to achieve attack purposes.

Defense: Filter input.

$id = (int) $_REQUEST['id'];if( $id > 0 ){}
Copy after login
Copy after login
$name = htmlentities($_REQUEST['name'], ENT_QUOTES, "UTF-8");// 注意,如果这里不进行转化也是可以的,// 只要在输出的时候进行转化(建立在已经参数绑定的情况下)。
Copy after login
Copy after login

3. CSRF

##Cross-site request forgery Cross-site request forgery

Principle: Helen logged into Weibo and then browsed a harmful site. A fake post on Weibo was forged on the harmful site. At this time, Helen posted a Weibo without knowing it.

Defense: Embed a random token in the Weibo page, and the Weibo server verifies the token value.

4. Clickjacking

ClickJacking

##Principle: Approximately There are two ways. One is that the attacker uses a transparent iframe, covering it on a web page, and then induces the user to operate on the page. At this time, the user will click on the transparent iframe page without knowing it; the other is The attacker uses an image to cover the web page, blocking the original location of the web page.

Defense: Use js to determine whether the frame is under the same domain name. Add header directive: X-Frame-Options.

// js if (top.location.hostname !== self.location.hostname) {    alert("您正在访问不安全的页面,即将跳转到安全页面!");    top.location.href = self.location.href;}// Apache 配置:Header always append X-Frame-Options SAMEORIGIN// nginx 配置:add_header X-Frame-Options SAMEORIGIN;
Copy after login
Copy after login
5. Upload files

Principle: Various types of illegal software may be uploaded.

Defense: detection type, detection size.

6. zip *

Principle: Some zip files look very small but are very large after decompression

Defense: Do not do this: decompress, process, and then compress compressed files uploaded by users. Because when you decompress, your server is likely to be crowded.

7. Session hijacking

Principle: When the client and server communicate, the hacker captures the packet and obtains the sessionid , and eventually the hacker communicates with the server.

Defense:

Set HttpOnly and reset sessionid from time to time.

8. Password storage

$hashedPassword = password_hash('password', PASSWORD_DEFAULT);password_verify('the wrong password', $hashedPassword); // falsepassword_verify('my super cool password', $hashedPassword); // true
Copy after login
Copy after login

9. Brute force cracking

/**防御:1. 限制次数2. 验证码3. 防火墙分析 类似 fail2ban*/
Copy after login
Copy after login

server Security

1. Modify port 22

vi /etc/ssh/sshd_configfirewall-cmd --list-allfirewall-cmd --add-port=8888/tcp --permanentfirewall-cmd --reload# 如果是阿里云服务器,不要忘记修改阿里云安全组
Copy after login
Copy after login

2. Modify mysql root name

# 修改 mysql 数据库中的 user 表,然后 flush privileges
Copy after login
Copy after login

3. Prohibit root remote login

vi /etc/ssh/sshd_configPermitRootLogin
Copy after login
Copy after login

             

web security

1. sql injection

By inserting SQL commands into Web form submissions or entering domain names or query strings for page requests, the server is ultimately tricked into executing malicious SQL commands.

Defense: First filter, then perform parameter binding.

2. XSS

Cross Site Scripting

Principle: Embed scripts into web pages in different ways to achieve attack purposes.

Defense: Filter input.

$id = (int) $_REQUEST['id'];if( $id > 0 ){}
Copy after login
Copy after login
$name = htmlentities($_REQUEST['name'], ENT_QUOTES, "UTF-8");// 注意,如果这里不进行转化也是可以的,// 只要在输出的时候进行转化(建立在已经参数绑定的情况下)。
Copy after login
Copy after login
3. CSRF

##Cross-site request forgery Cross-site request forgery

Principle: Helen logged into Weibo and then browsed a harmful site. A fake post on Weibo was forged on the harmful site. At this time, Helen posted a Weibo without knowing it.

Defense: Embed a random token in the Weibo page, and the Weibo server verifies the token value.

4. Clickjacking

ClickJacking

原理:大概有两种方式,一是攻击者使用一个透明的 iframe ,覆盖在一个网页上,然后诱使用户在该页面上进行操作,此时用户将在不知情的情况下点击透明的 iframe 页面;二是攻击者使用一张图片覆盖在网页,遮挡网页原有位置。

防御:使用 js 判断框架是否在同一个域名下。添加头部指令: X-Frame-Options。

// js if (top.location.hostname !== self.location.hostname) {    alert("您正在访问不安全的页面,即将跳转到安全页面!");    top.location.href = self.location.href;}// Apache 配置:Header always append X-Frame-Options SAMEORIGIN// nginx 配置:add_header X-Frame-Options SAMEORIGIN;
Copy after login
Copy after login

5. 上传文件

原理:可能会被上传各种类型的非法软件。

防御:检测类型,检测大小。

6. zip *

原理:有些 zip 文件看起来很小,解压后非常大

防御:不要做这样的操作:对用户上传的压缩文件解压,处理,再压缩。因为你解压的时候,很可能你的服务器就被挤爆了。

7. session 劫持

原理:客户端和服务端通信时候,黑客抓包,获取 sessionid ,最终黑客与服务器通信。

防御:
 设置 HttpOnly,时常重设 sessionid。

8. 密码存储

$hashedPassword = password_hash('password', PASSWORD_DEFAULT);password_verify('the wrong password', $hashedPassword); // falsepassword_verify('my super cool password', $hashedPassword); // true
Copy after login
Copy after login

9. 暴力破解

/**防御:1. 限制次数2. 验证码3. 防火墙分析 类似 fail2ban*/
Copy after login
Copy after login

服务器安全

1. 修改 22 端口

vi /etc/ssh/sshd_configfirewall-cmd --list-allfirewall-cmd --add-port=8888/tcp --permanentfirewall-cmd --reload# 如果是阿里云服务器,不要忘记修改阿里云安全组
Copy after login
Copy after login

2. 修改 mysql root 名称

# 修改 mysql 数据库中的 user 表,然后 flush privileges
Copy after login
Copy after login

3. 禁止 root 远程登陆

vi /etc/ssh/sshd_configPermitRootLogin
Copy after login
Copy after login

相关推荐:

PHP安全地上传图片

PHP安全开发库详解

php安全配置记录和常见错误的详细总结介绍

The above is the detailed content of Detailed explanation of PHP security examples. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian Dec 24, 2024 pm 04:42 PM

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

7 PHP Functions I Regret I Didn't Know Before 7 PHP Functions I Regret I Didn't Know Before Nov 13, 2024 am 09:42 AM

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

How To Set Up Visual Studio Code (VS Code) for PHP Development How To Set Up Visual Studio Code (VS Code) for PHP Development Dec 20, 2024 am 11:31 AM

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

PHP Program to Count Vowels in a String PHP Program to Count Vowels in a String Feb 07, 2025 pm 12:12 PM

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

How do you parse and process HTML/XML in PHP? How do you parse and process HTML/XML in PHP? Feb 07, 2025 am 11:57 AM

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

Explain late static binding in PHP (static::). Explain late static binding in PHP (static::). Apr 03, 2025 am 12:04 AM

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are PHP magic methods (__construct, __destruct, __call, __get, __set, etc.) and provide use cases? What are PHP magic methods (__construct, __destruct, __call, __get, __set, etc.) and provide use cases? Apr 03, 2025 am 12:03 AM

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.

See all articles