PHP code audit documents were updated last year. they were not well written, and some were not fully written. I have referenced many documents.
The owasp codereview should also be 2.0.
Let's give some suggestions.
Directory
1. Overview 3
2. input verification and output display 3
2.1 Command Injection 42.2 XSS 42.3 file contains 52.4 code injection 52.5 SQL injection 62.6 XPath injection 62.7 HTTP response splitting 6 2.8 File management 62.9 f
} + returnsb.tostring (); - } the * $ Panax Notoginseng}String title = Htmlfilter.filter (Request.getparameter ("title"));String content = Htmlfilter.filter (request.getparameter ("content"));Encode it before you join the database. Although XSS forms a variety, it is difficult to defend. But this is basically enough for small and medium companies.If you don't feel enough, you can refer to using owasp Esapi, not only to prot
0x00 Index Description
6.30 share in owasp, a vulnerability detection model for business security. Further extension of the popular science.0X01 Identity Authentication Security
1 Brute force hackWhere there is no verification code limit or where a verification code can be used multiple times, use a known user to brute force the password or use a generic password to brute force the user. Simple verification Code blasting. url:http://zone.w
Native PHP, do some security precautions on the Internet. (a bit old 2012)
There is a JS script injected, I input the infinite alert in the data database a script, found that the query results can not be displayed, blank, other HTML tags can be displayed correctly, for example, H1 tags.
And then tried it, as long as there was
The third article on this site is a bit of a long story.
Reply content:
Native PHP, do some security precautions on the Internet. (a bit old 2012)There is a
method may not be good enough. We need to monitor the number of failures of all passwords in the system's full local area. Of course, this requires data that is not normally supported when we are not attacked. For example, if your system has an average of 5000 password errors every day, you can think that when the number of password errors exceeds the limit, and the time is relatively concentrated, it indicates that there is a hacker attack. What do you do at this time? Generally, the most comm
become performance and bad. These are called Demonic Evil regexes:
To group repeating text
Duplicate content within a repeating group([a-zA-Z]+)*, (a+)+ or (a|a?)+ in the aaaaaaaaaaaaaaaaaaaaaaaa! face of such input, are fragile. This can cause a lot of computation. For more details, refer to Redos.
You can use the Node.js tool Safe-regex this to detect your regular:‘(beep|boop)*‘true $ node safe.js ‘(a+){10}‘false Error handling error code, stack informationSome error scena
as Twitter, Sina Weibo, oauth2 protocol, but no OAUTH2 server has been built yet.4. Rich Text editor, CKEditor.5. File Related: File upload, upload files, upload progress, drag upload, file download, file encryption and decryption. AmazonS3 Data cloud storage. Multimedia processing, video (transcoding), audio.6. Pki,ssl/tls, OpenSSL, which is encrypted and decrypted by the file and then contacted.7. Mail processing.8. Message Queuing, ActiveMQ, Stomp, Apache SOLR.9. Search, Lucene search.10. Si
the site can call files on the local server or remote public servers." By using injection technology, an attacker can let a Web site display information, including a password file or a list of user names in a Web server, and execute the code that they want to run. ”Fix Web site security vulnerabilities"Organizations must adhere to security best practices from the very beginning of the development process, such as best practices for opening Web application Security Projects (
-point PHP Mentor Organization
Other Websites SitesWeb development-related useful sites
The Open WEB Application Security Project (OWASP)-An open software safety community
Websec io-A Web Security community resource
Web advent-a web Developer calendar
Semantic versioning-a Web site with a parsed semantic version
Atlassian git tutorials-a git tutorial series
Hg init-a Mercurial tutorial series
Servers for hackers-a
per day, so you can think that when the password error significantly exceeds this number, and the time is relatively concentrated, it indicates a hacker attack. What will you do at this time? The most common way to use it is to increase the time cost for all users to try again after the wrong password.
Finally, again, it's a good choice to use third-party OAuth and OpenID for user login. Reference articles
OWASP Guide to Authentication
0x00 Index DescriptionShare in owasp, A vulnerability detection model for business Security.0X01 Identity Authentication Security1 Brute force hackWhere there is no verification code limit or where a verification code can be used multiple times, use a known user to brute force the password or use a generic password to brute force the User. Simple Verification Code Blasting. url:http://zone.wooyun.org/content/20839Some tools and scriptsBurpsuiteThe nec
In advance: Just talking about, I also used this component a little bit.And to an important XX period (hopefully this article to meet the needs of the colleagues to help), a Web application for the first time to face the security requirements, AppScan Security test report is very refreshing, comprehensive content, hints suggest in place, and is noon Oh, of course some Chinese obviously Dog.Before this application of the back-end architecture is relatively solid, so the important problem is near
wafw00fWAFW00F identification and fingerprint Web application Firewall (WAF) products.It works by first sending a normal HTTP request, and then observing that it returns no feature characters, and then judging the WAF that is used by sending a malicious request that triggers a WAF interception to get its returned features.Supported WAF Products$./WAFW00F-L^ ^ _ __ _ ____ _ __ _ _ ____ ///7/ /.'\/__////7//,'\ ,' \ / __/ | V V//O//_/| V V//0//0//_/|_n_,'/_n_//_/|
JavaScript), intercepting requests from the browser and before changing it to the application that is being tested by the Web site.3 directory scanning (violence) mainly through the dictionary file directly access to the directory in the form of the directory, can be used to find management background, dictionary file directory: G:\program files\owasp\zed Attack Proxy\dirbuster4 Fuzzy Testing (Fuzzer): Fuzzy testing refers to a large number of invali
"Editor's note" The writer is Casey Dunham. Casey is a professional software developer with more than more than 10 years of experience and is known for its unique approach to application security issues. This article is a domestic ITOM management platform OneAPM engineer compiled and collated.As a security advisor, I evaluate a variety of applications. In all of the applications I've tested, I've found that they typically encounter some processing of exception problems and insufficient logging.
404 Not FoundHere's a detailed introduction to the Fundamentals of SQL injectionWhat is SQL injection?In the case of a foreigner, SQL injection is described as follows:SQL injection is a code injection technique, used to attack Data-driven applications, in which malicious SQL statements AR e inserted into a entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example when user input
applications should be part of any software or security development lifecycle. There are a lot of resources in the Software Development Lifecycle (SDLC), such as those provided by Microsoft and the U.S. Department of Homeland Security Network Safety Service. The Open Web Application Security Project (OWASP) also provides development guidance, including DEVELOPMENTGUIDE2010, which discusses ways to secure Web application development. As part of the so
. Second, most cloud applications are web-based, which means it is likely to face security threats from a wide range of standards that are not yet popular with Web applications, including cross-site scripting, SQL injection, and directory traversal.
An information security team should recommend that its developers seriously consider the top Ten Network application attacks presented by the Open Network Application Security Project (OWASP), and then de
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.