Imperva is a pioneer and leader in new commercial security solutions. It is committed to providing security solutions for critical applications and high-value business data in data centers. It is the first to launch a new protection layer designed specifically for physical and virtual data centers. As the third pillar of enterprise security. Recently, the company released a September hacker intelligence action report - "PHP SuperGlobals: Supersized Trouble" (PHPSuperGlobals: Supersized Trouble), which conducted an in-depth analysis of recent attacks against PHP applications, including attacks involving PHP "SuperGlobal" parameters. , and further analyzed the general characteristics of attack activities and the significance of the overall integrity of the World Wide Web.
Amichai Shulman, chief technology officer at Imperva, said: "An compromised host can be used as a zombie slave to attack other servers, so attacks against PHP applications may affect the security and health of the entire network. These attacks will have very serious consequences. Consequences, since the PHP platform is the most commonly used web application development platform, powering more than 80% of websites, including Facebook and Wikipedia, it is clear that the security community must pay more attention to this issue now. ”
The report also found that hackers are increasingly able to combine advanced attack techniques with simple scripts. At the same time, the report believes that PHP SuperGlobals can bring high return on investment for attacks, so it has become the main target of hacker attacks.
PHP SuperGlobal parameters are increasingly popular in the hacker community because they can combine multiple security issues into the same advanced network threat, thereby disrupting application logic, compromising servers, causing fraudulent transactions and data theft. The Imperva research team noticed that over the course of a month, each application suffered an average of 144 attacks containing the SuperGlobal parameter attack path. In addition, researchers also found that attack activities can last for more than five months, and during peak request periods, each application will suffer up to 90 attacks per minute.
Highlights and recommendations from the report include:
• If keys are exposed to third-party infrastructure, a "fallback" security model is required: The report found a vulnerability in the widely used PhpMyAdmin (PMA) tool, which is used to manage MySQL databases in a PHP environment. Because the tool is often bundled with other applications that use MySQL databases, a weakness in it can expose a server to a code execution attack that could lead to an entire server takeover, even if the administrator is not using the tool. To solve this problem, it is recommended to adopt the "retreat" security mode.
•It is best to use the active security mode: The active security mechanism specifies the parameter names that can be used for each resource. Only this mode can prevent attackers from using external variables to manipulate weak links. This attack allows everyone to use the same internal variables. Name is sent as an external parameter, thus overwriting the original internal variable value.
•Hackers are becoming increasingly sophisticated: Imperva researchers have found that attackers are able to launch complex attacks and integrate them into simple and easy-to-use tools. However, while showing powerful attack capabilities, the PHP attack method also has flaws. An application security solution that detects and neutralizes one stage of an attack can render the entire attack useless.
• SuperGlobal parameters in requests should be blocked: These parameters have no reason to appear in requests; therefore they should be prohibited.

php把负数转为正整数的方法:1、使用abs()函数将负数转为正数,使用intval()函数对正数取整,转为正整数,语法“intval(abs($number))”;2、利用“~”位运算符将负数取反加一,语法“~$number + 1”。

实现方法:1、使用“sleep(延迟秒数)”语句,可延迟执行函数若干秒;2、使用“time_nanosleep(延迟秒数,延迟纳秒数)”语句,可延迟执行函数若干秒和纳秒;3、使用“time_sleep_until(time()+7)”语句。

php除以100保留两位小数的方法:1、利用“/”运算符进行除法运算,语法“数值 / 100”;2、使用“number_format(除法结果, 2)”或“sprintf("%.2f",除法结果)”语句进行四舍五入的处理值,并保留两位小数。

php字符串有下标。在PHP中,下标不仅可以应用于数组和对象,还可应用于字符串,利用字符串的下标和中括号“[]”可以访问指定索引位置的字符,并对该字符进行读写,语法“字符串名[下标值]”;字符串的下标值(索引值)只能是整数类型,起始值为0。

判断方法:1、使用“strtotime("年-月-日")”语句将给定的年月日转换为时间戳格式;2、用“date("z",时间戳)+1”语句计算指定时间戳是一年的第几天。date()返回的天数是从0开始计算的,因此真实天数需要在此基础上加1。

在php中,可以使用substr()函数来读取字符串后几个字符,只需要将该函数的第二个参数设置为负值,第三个参数省略即可;语法为“substr(字符串,-n)”,表示读取从字符串结尾处向前数第n个字符开始,直到字符串结尾的全部字符。

方法:1、用“str_replace(" ","其他字符",$str)”语句,可将nbsp符替换为其他字符;2、用“preg_replace("/(\s|\ \;||\xc2\xa0)/","其他字符",$str)”语句。

php判断有没有小数点的方法:1、使用“strpos(数字字符串,'.')”语法,如果返回小数点在字符串中第一次出现的位置,则有小数点;2、使用“strrpos(数字字符串,'.')”语句,如果返回小数点在字符串中最后一次出现的位置,则有。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

WebStorm Mac version
Useful JavaScript development tools

Dreamweaver CS6
Visual web development tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Chinese version
Chinese version, very easy to use
