hi guys,
i would have, is it's possible, a list of the usual types of attacks to php applications, can you help me to find it?
thanks a lot!
list
Moderator: General Moderators
Well, I can sum up some of knowledge.
Upload-attacks, uploading PHP-files (extremely dangerous) and accessing them in the upload-folder.
SQL-injection, unquoted/slashed queries with GET-data is fed to the database allowing them to do pretty nasty stuff.
These are the 2 basic most dangerous and commonly overlooked ones. There are many more "subclasses" and specifik targets such as simply trying all files looking for possible leaking in URL-arguments etc.
EDIT: oh, one commonly overlooked thing (very stupid too) is the 0=="X" (also "0"=="00") statement... which evaluate to true, since the integer is not converted to a string, but the string converted to an integer resulting in it being 0==0. This is commonly not a security issue, but it could be and this is generally unknown (but still very stupid).
Upload-attacks, uploading PHP-files (extremely dangerous) and accessing them in the upload-folder.
SQL-injection, unquoted/slashed queries with GET-data is fed to the database allowing them to do pretty nasty stuff.
These are the 2 basic most dangerous and commonly overlooked ones. There are many more "subclasses" and specifik targets such as simply trying all files looking for possible leaking in URL-arguments etc.
EDIT: oh, one commonly overlooked thing (very stupid too) is the 0=="X" (also "0"=="00") statement... which evaluate to true, since the integer is not converted to a string, but the string converted to an integer resulting in it being 0==0. This is commonly not a security issue, but it could be and this is generally unknown (but still very stupid).
Last edited by Syranide on Fri Jun 02, 2006 7:17 am, edited 1 time in total.
- aerodromoi
- Forum Contributor
- Posts: 230
- Joined: Sun May 07, 2006 5:21 am
Re: list
One more specific point of interest: Header injections (contact forms)sourcebay wrote:hi guys,
i would have, is it's possible, a list of the usual types of attacks to php applications, can you help me to find it?
thanks a lot!
In a nutshell: Never trust user input!
aerodromoi
xss
Set Search Time - A google chrome extension. When you search only results from the past year (or set time period) are displayed. Helps tremendously when using new technologies to avoid outdated results.
- Maugrim_The_Reaper
- DevNet Master
- Posts: 2704
- Joined: Tue Nov 02, 2004 5:43 am
- Location: Ireland
Re: list
List of some + links to full descriptions: http://llaik.rivil.com/?p=82sourcebay wrote:hi guys,
i would have, is it's possible, a list of the usual types of attacks to php applications, can you help me to find it?
thanks a lot!