HTTP-REFERER這個變數已經越來越不可靠了,完全就是可以偽造出來的東東。
1.php 請求 2.php 。
1.php代碼:
| 代碼如下 |
複製代碼 |
$ch = curl_init(); curl_setopt($ch, CURLOPT_URL, "http://localhost/2.php"); curl_setopt($ch, CURLOPT_HTTPHEADER, array('X-FORWARDED-FOR:8.8.8.8', 'CLIENT-IP:8.8.8.8')); //構造IP curl_setopt($ch, CURLOPT_REFERER, "http://www.google.com/ "); //構造來路 curl_setopt($ch, CURLOPT_HEADER, 1); $out = curl_exec($ch); curl_close($ch);
|
2.php代碼如下:
| 代碼如下 |
複製代碼 |
function getClientIp() { if (!empty($_SERVER["HTTP_CLIENT_IP"])) $ip = $_SERVER["HTTP_CLIENT_IP"]; else if (!empty($_SERVER["HTTP_X_FORWARDED_FOR"])) $ip = $_SERVER["HTTP_X_FORWARDED_FOR"]; else if (!empty($_SERVER["REMOTE_ADDR"])) $ip = $_SERVER["REMOTE_ADDR"]; else $ip = "err"; return $ip; } echo "IP: " . getClientIp() . ""; echo "referer: " . $_SERVER["HTTP_REFERER"];
|
偽造成功,這是不是給“刷票”的朋友提供了很好的換IP的方案!!
再看一下相對複雜的處理辦法
以下是偽造方法:
| 代碼如下 |
複製代碼 |
PHP(前提是裝了curl): PHP代碼 $ch = curl_init(); curl_setopt ($ch, CURLOPT_URL, "http://www.111cn.net"); curl_setopt ($ch, CURLOPT_REFERER, "http://www.111cn.net/"); curl_exec ($ch); curl_close ($ch); PHP(不裝curl用sock) |
PHP代碼
| 代碼如下 |
複製代碼 |
$server = '127.0.0.1'; $host = '127.0.0.1'; $target = '/xxx.asp'; $referer = 'http://127.0.0.1/'; // Referer $port = 80; $fp = fsockopen($server, $port, $errno, $errstr, 30); if (!$fp) { echo "$errstr ($errno)<br />n"; } else { $out = "GET $target HTTP/1.1rn"; $out .= "Host: $hostrn"; $out .= "Cookie: ASPSESSIONIDSQTBQSDA=DFCAPKLBBFICDAFMHNKIGKEGrn"; $out .= "Referer: $refererrn"; $out .= "Connection: Closernrn"; fwrite($fp, $out); while (!feof($fp)) { echo fgets($fp, 128); } fclose($fp); } |
IP也可以偽造
| 代碼如下 |
複製代碼 |
$fp = fsockopen ("192.168.0.128", 80, $errno, $errstr, 30); if (!$fp) { echo "$errstr ($errno)<br>n"; } else { $msg="GET /003.php HTTP/1.0rn"; $msg.="Host: 192.168.0.128rn"; $msg.="Referer: http://www.baidu.comrn"; $msg.="Client-IP: 1.1.1.1rn"; $msg.="X-Forwarded-For: 1.1.1.1rn"; //主要是這裡來構造IP $msg.="Connection: Closernrn"; fputs ($fp, $msg); while (!feof($fp)) { echo fgets ($fp,1024); } fclose ($fp); } |
記住用fsockopen時,命令最後一定要有rnrn,不然會逾時。
其實這個可以用$_SERVER['REMOTE_ADDR']來得到正確IP,但是人們為了得到代理訪問IP,而採用的得到IP的方法往往不是$_SERVER['REMOTE_ADDR'],這就為我們提供了機會。
這裡另外一篇關於 curl 偽造 ip地址的文章有興趣的同學可以參考一下
http://www.111cn.net/phper/php-cy/39779.htm