I. Preface:Version: Okphp BBS v1.3 open-source EditionDue to PHP and MYSQL, injection of PHP + MYSQL is more difficult than that of asp, especially the construction of statements during injection, this article mainly analyzes some files in Okphp BBS
I. apache server Security Settings1. Run with a Nobody userGenerally, Apache is installed and run by the Root user. If the Apache Server process has the Root user privilege, it will pose a great threat to system security. Ensure that the Apache
1, first good site after the site all and database backupDEDECMS Click System-Database Backup/restore-Select---submit-----wait for full backup.Where is the backup file: Data/backupadta---2, packaging the program to compress the entire
Due to PHP and MYSQL, injection of PHP + MYSQL is more difficult than that of asp, especially the construction of statements during injection, this article mainly analyzes some OkphpBBSv1.3 files to talk about the php + mysql injection statement
Mysql_query error. the username and password in my database are both MD5 encrypted. & lt ;? Phpsession_start (); require_once .. dataconfig. inc. php; get account password POST submit if (isset ($ _ POST [& quot; username & quot;]) {$ usernam
Go to the blank page on the header (& quot; Location: empManage. php & quot;) page to find loginProcess. php: & lt ;? Php accepts user data 1.id$ id $ _ POST [& quot; id & quot;]; 2. password $ _ POST [& quot; password & quot;]; to the number header
The injection vulnerability exists in the message files of the navigation program on the 114 website of Yulin Mufeng. Attackers can use EXP to obtain the Administrator account and MD5 password. Version: 1.5EXP :? Php $ sbcopyright -------------------
This article introduces a piece of code for user login and verification implemented in php. the login and database query are not separated. If you need a friend, you can refer to the simple login class for learning, login and database query are not
Today I learned the basic skills of SQL injection from the Internet. SQL injection focuses on the construction of SQL statements, only the flexible use of SQL
Statement to construct the injected string of the bull ratio. After finishing the study, I
One, Apache server security settings1, to nobody users to run
In general, Apache is installed and run by root. If the Apache server process has root user privileges, it poses a significant threat to the security of the system and should ensure that
Md5 verification for login passwords of thinkphp members. When a member registers, the password md5 is encrypted and saved to the database. now, after the member logs on to the database, how can he write the md5 password? Why is it different when I
Simple login class, not separate login and database query
Copy the Code code as follows:/** Example** $Auth =new Auth ();* $Auth->login ("123@123.com", "123");* $Auth->logout ();* Echo $r->init ();***/
Verify the Login class
Copy CodeThe code is as
Two days ago, after the myBB Forum exploit disappeared, the password cracked was abnormal ~ It is in the form of md5 (salt). md (pass ~ No progress ~ Today I wrote a small exploitation program ~ Hope everyone can use it ~ Pass.txt is the password
supposed input
$name = "Ilia"; DELETE from users; ";
mysql_query ("SELECT * from users WHERE name= ' {$name} '");
Copy CodeIt is clear that the last command executed by the database is:
SELECT *
I. Data Encryption/Encoding
Algorithm List
Common encryption or encoding algorithms used to ensure security are as follows:
1. Common Key Algorithms
Key algorithms are used to encrypt sensitive data, summaries, signatures, and other information.
Go to the blank page on the header (& quot; Location: empManage. php & quot;) page to find loginProcess. php: & lt ;? Php // accept user data // 1.id$ id =$ _ POST [& quot; id & quot;]; // 2 header ("Location: empManage. php ") jump to the blank
Where are the two login verification methods wrong? the first one is PHPcode & lt ;? Php $ id = $ _ POST ['id']; $ password = $ _ POST ['password']; $ conn = mysql_connect (& quot; localhost & quot ;, & quot; root & quot;, & quot; root & q
First:
Controller inside: ElseIf (! $model->validatepassword ($data->password))
Copy the Code code as follows:
Class Xbasemodel extends Cactiverecord{/*** User Password detection** @return Boolean*/Public Function ValidatePassword ($password){return
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.