Guest Null Posted March 5, 2010 Posted March 5, 2010 Will someone that knows alot about security give me like a small modification or something to do, and then inspect it and tell me if i missed something, or if a function could be used better somewhere. Im still learning about security but i want to test my knowledge. Quote
Nicholas Posted March 6, 2010 Posted March 6, 2010 im learning security at the moment, what ive learnt is (hopefully this is correct) {$ir['username']} and replace it with ".htmlentities($ir['username'])." ($r['username']} and replace it with ".htmlentities($r['username'])." money=money+{$r['money']} replace it with money=money+".abs(intval($r['money']))." ______________________________________________________________________________________ Remember, the money=money+ bit could be confusing but if you understand what i mean, thats good :) ______________________________________________________________________________________ WHERE userid={$r['userid']}"); and replace it with WHERE userid= ".abs(intval($r['userid']))." WHERE userid={$_GET['ID']}"); and replace it with WHERE userid=".abs(intval($_GET['ID']))."")); WHERE userid={$_POST['QTY']}"); and replace it with WHERE userid=".abs(intval($_POST['QTY']))."")); remember im learning security at the moment only started learning fully about 1 week ago... so i could be wrong... Quote
a_bertrand Posted March 6, 2010 Posted March 6, 2010 That's just part of the issues Nicholas. This about, what tools the user can access, for example are you sure the user have the right to open this page? And even then, are you sure the user have access to this data? Let's take an example, I have a read_message.php which uses a id=xxx where xxx is the message_id. If I let the users put whatever number there, they could have access to messages for other people. So you should check in your queries that the user have access to the message he/she's asking. Other example, you have a admin_panel.php make sure the person is requesting do really have access to the file and it's not simply somebody trying url. All those are part of securing a game. Without yet talking about XSS (http://en.wikipedia.org/wiki/Cross-site_scripting) or SQL Injection (http://en.wikipedia.org/wiki/SQL_injection) And funny enough people forget to check those basic things. Quote
Maniak Posted March 6, 2010 Posted March 6, 2010 Well, instead of asking for a Script, couldn't you just go through the free modifications section, and look for an un-secured mod, secure it and ask someone to check it? Or get a standard MCCodes Script and secure that, then ask if it is okay? Just a suggestion. :thumbsup: Quote
Guest Null Posted March 6, 2010 Posted March 6, 2010 I know all about csrf,xss,sql, meta, w/e. And thanks nicholas. already new those, but :). And yes alan great info. Quote
Zero-Affect Posted March 8, 2010 Posted March 8, 2010 csrf,xss,sql, meta, w/e. XSS and META would be the same right? Quote
Guest Null Posted March 8, 2010 Posted March 8, 2010 Yea i believe the meta ones are xss. You know the ones that refresh others, redirect, etc. Basically XSS though. Quote
Zero-Affect Posted March 9, 2010 Posted March 9, 2010 no clues what META attacks could be XDlol <meta http-equiv="refresh" content="1;url=http://www.crimgame.com"> something like the above ran via input - output data. Quote
Guest Drizzle Posted March 11, 2010 Posted March 11, 2010 yea. it is XSS but sometimes i seperate certain things from others. Quote
Zero-Affect Posted March 11, 2010 Posted March 11, 2010 no clues what META attacks could be XD saying XSS is easier than saying image, meta, iframe, link Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.