search
HomeBackend DevelopmentPHP TutorialPHP's Super Dilemma: Hackers brought by SuperGlobal_PHP Tutorial

Imperva is a pioneer and leader in new commercial security solutions. It is committed to providing security solutions for critical applications and high-value business data in data centers. It is the first to launch a new protection layer designed specifically for physical and virtual data centers. As the third pillar of enterprise security. Recently, the company released a September hacker intelligence action report - "PHP SuperGlobals: Supersized Trouble" (PHPSuperGlobals: Supersized Trouble), which conducted an in-depth analysis of recent attacks against PHP applications, including attacks involving PHP "SuperGlobal" parameters. , and further analyzed the general characteristics of attack activities and the significance of the overall integrity of the World Wide Web.

Amichai Shulman, chief technology officer at Imperva, said: "An compromised host can be used as a zombie slave to attack other servers, so attacks against PHP applications may affect the security and health of the entire network. These attacks will have very serious consequences. Consequences, since the PHP platform is the most commonly used web application development platform, powering more than 80% of websites, including Facebook and Wikipedia, it is clear that the security community must pay more attention to this issue now. ”

The report also found that hackers are increasingly able to combine advanced attack techniques with simple scripts. At the same time, the report believes that PHP SuperGlobals can bring high return on investment for attacks, so it has become the main target of hacker attacks.

PHP SuperGlobal parameters are increasingly popular in the hacker community because they can combine multiple security issues into the same advanced network threat, thereby disrupting application logic, compromising servers, causing fraudulent transactions and data theft. The Imperva research team noticed that over the course of a month, each application suffered an average of 144 attacks containing the SuperGlobal parameter attack path. In addition, researchers also found that attack activities can last for more than five months, and during peak request periods, each application will suffer up to 90 attacks per minute.

Highlights and recommendations from the report include:

• If keys are exposed to third-party infrastructure, a "fallback" security model is required: The report found a vulnerability in the widely used PhpMyAdmin (PMA) tool, which is used to manage MySQL databases in a PHP environment. Because the tool is often bundled with other applications that use MySQL databases, a weakness in it can expose a server to a code execution attack that could lead to an entire server takeover, even if the administrator is not using the tool. To solve this problem, it is recommended to adopt the "retreat" security mode.

•It is best to use the active security mode: The active security mechanism specifies the parameter names that can be used for each resource. Only this mode can prevent attackers from using external variables to manipulate weak links. This attack allows everyone to use the same internal variables. Name is sent as an external parameter, thus overwriting the original internal variable value.

•Hackers are becoming increasingly sophisticated: Imperva researchers have found that attackers are able to launch complex attacks and integrate them into simple and easy-to-use tools. However, while showing powerful attack capabilities, the PHP attack method also has flaws. An application security solution that detects and neutralizes one stage of an attack can render the entire attack useless.

• SuperGlobal parameters in requests should be blocked: These parameters have no reason to appear in requests; therefore they should be prohibited.

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/739149.htmlTechArticleImperva is a pioneer and leader in new commercial security solutions for critical applications in data centers and Providing security solutions for high-value business data, it pioneered...
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
php怎么把负数转为正整数php怎么把负数转为正整数Apr 19, 2022 pm 08:59 PM

php把负数转为正整数的方法:1、使用abs()函数将负数转为正数,使用intval()函数对正数取整,转为正整数,语法“intval(abs($number))”;2、利用“~”位运算符将负数取反加一,语法“~$number + 1”。

php怎么实现几秒后执行一个函数php怎么实现几秒后执行一个函数Apr 24, 2022 pm 01:12 PM

实现方法:1、使用“sleep(延迟秒数)”语句,可延迟执行函数若干秒;2、使用“time_nanosleep(延迟秒数,延迟纳秒数)”语句,可延迟执行函数若干秒和纳秒;3、使用“time_sleep_until(time()+7)”语句。

php怎么除以100保留两位小数php怎么除以100保留两位小数Apr 22, 2022 pm 06:23 PM

php除以100保留两位小数的方法:1、利用“/”运算符进行除法运算,语法“数值 / 100”;2、使用“number_format(除法结果, 2)”或“sprintf("%.2f",除法结果)”语句进行四舍五入的处理值,并保留两位小数。

php字符串有没有下标php字符串有没有下标Apr 24, 2022 am 11:49 AM

php字符串有下标。在PHP中,下标不仅可以应用于数组和对象,还可应用于字符串,利用字符串的下标和中括号“[]”可以访问指定索引位置的字符,并对该字符进行读写,语法“字符串名[下标值]”;字符串的下标值(索引值)只能是整数类型,起始值为0。

php怎么根据年月日判断是一年的第几天php怎么根据年月日判断是一年的第几天Apr 22, 2022 pm 05:02 PM

判断方法:1、使用“strtotime("年-月-日")”语句将给定的年月日转换为时间戳格式;2、用“date("z",时间戳)+1”语句计算指定时间戳是一年的第几天。date()返回的天数是从0开始计算的,因此真实天数需要在此基础上加1。

php怎么读取字符串后几个字符php怎么读取字符串后几个字符Apr 22, 2022 pm 08:31 PM

在php中,可以使用substr()函数来读取字符串后几个字符,只需要将该函数的第二个参数设置为负值,第三个参数省略即可;语法为“substr(字符串,-n)”,表示读取从字符串结尾处向前数第n个字符开始,直到字符串结尾的全部字符。

php怎么替换nbsp空格符php怎么替换nbsp空格符Apr 24, 2022 pm 02:55 PM

方法:1、用“str_replace(" ","其他字符",$str)”语句,可将nbsp符替换为其他字符;2、用“preg_replace("/(\s|\&nbsp\;||\xc2\xa0)/","其他字符",$str)”语句。

php怎么判断有没有小数点php怎么判断有没有小数点Apr 20, 2022 pm 08:12 PM

php判断有没有小数点的方法:1、使用“strpos(数字字符串,'.')”语法,如果返回小数点在字符串中第一次出现的位置,则有小数点;2、使用“strrpos(数字字符串,'.')”语句,如果返回小数点在字符串中最后一次出现的位置,则有。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use