[vc_row 0=””][vc_column 0=””][vc_column_text 0=””]We wrote about WordPress security on a shared hosting and what to do if you get hacked. Here we will write about general programming practices to include in your web development projects. This is a technical article so good for your development team as well as should be made standard practice in all IT concerns.
Web security is often assumed out of the box and something even the best practices can’t always cover. Its important cover all your bases and be on your toes. Websites are a complex beast and need tending to constantly.
The basic rule for securing web application is to always filter input and escape output. Do not trust user data and always make it validate and filter properly. To validate means to verify that the data is valid while filter means to remove unwanted characters from the data. Sometimes we trust user data because we never even know it’s actually user data. For example; consider
$_SERVER[‘HTTP_HOST’] which is a PHP global variable and some developers become confused that its server variable and not user data. So they used this variable in form action or site_url like
<form action=”<?= $_SERVER[‘HTTP_HOST’]?>/page”>
$config[‘site_url’] = ‘HTTP://’.$_SERVER[‘HTTP_HOST’];
However a user (attacker) can modify this variable by sending a different host header. So we should avoid using $_SERVER[‘HTTP_HOST’] and use the domain name instead. E.g
$domain_name = 'mydomain.com';
$config['site_url'] = 'HTTP://'. $domain_name;
This type of security vulnerabilities leads to phishing attacks and cache poisoning.[/vc_column_text][/vc_column][/vc_row][vc_row 0=””][vc_column 0=””][vc_column_text 0=””]
<input type="text" value="user" />
So an attacker comes and insert script like this
"<script>alert(‘website hacked’);</script><input type="text" value="
so it becomes
<input type="text" value="" /> <script> alert(‘website hacked’);</script> <input type="text" value="" />
In this way attacker can execute the script he/she wants to execute and can steal user cookie, spread malwares and perform many other tasks.[/vc_column_text][vc_column_text el_class=”check-list”]
The prevention for this type of web security vulnerability is to encode and properly validate user input both on the client side as well on the server side.[/vc_column_text][/vc_column][/vc_row][vc_row 0=””][vc_column 0=””][vc_column_text 0=””]
In this type of web security vulnerability, malicious website sends a request to a web application that a user is already authenticated against. The attacker inspects the website and finds the form action and then submit the form from a malicious website to the found action url with the desired values.
To prevent this type of security attacks always include an unpredictable token to each request and verify request again that token.[/vc_column_text][/vc_column][/vc_row][vc_row 0=””][vc_column 0=””][vc_column_text 0=””]
This type of security attack arises because of security weakness which allows attacker to take control of application’s database. Thus the attacker can view, modify, delete records or even drop tables. For example, let’s say we have a website that displays student result based on the student id.
The actual SQL query is
SELECT * FROM std_result WHERE std_id=1005
So it will fetch the user result but what if the user type 1005 or 1=1 into the box. The query will become
SELECT * FROM std_result WHERE std_id=1005 or 1=1
In this case the first condition will become false but the second condition will become true and it will fetch all the rows. The attacker can also drop the whole table if he/she types
1005; DROP table std_result; into the box.
This type of attacks can be prevented by using PDO and mysqli with strongly typed parameterized queries.[/vc_column_text][/vc_column][/vc_row][vc_row 0=””][vc_column 0=””][vc_column_text 0=””]
In this type of security vulnerability an attacker explicitly sets session identifier of a session for a user. It’s typically performed by making a URL like
http://www.example.com/index.php...?session_name=sessionid. This URL is then passed to the victim. As soon as the victim clicks on the link, the attack is succeeded.
This type of security vulnerability can be prevented by
[/vc_column_text][/vc_column][/vc_row][vc_row 0=””][vc_column 0=””][vc_column_text 0=””]
In this type of security vulnerability an attacker gets hold of a session identifier and thus attacker becomes able to send requests as if they were the actual user. As the attacker has got the identifier, so they can perform any thing that can be done by the actual user.
We can’t really prevent session hijacking but we can make it difficult and harder to use by using strong hash identifier, setting additional entropy, changing session name from default PHPSESSID etc.
Note that the difference between session fixation and session hijacking is that of how the attacker gets access to identifier. In session fixation the identifier is set to a value that the attacker knows while in hijacking the identifier is being stolen from the user or being guessed by the attacker. The impact of both is the same.[/vc_column_text][/vc_column][/vc_row][vc_row 0=””][vc_column 0=””][vc_column_text 0=””]
Sometimes you may get hacked even when its not your fault. There have been some severe hacks recently such as Heartbleed and WannaCry. It would be very helpful when you can patch your webservers against such wide ranging hacking techniques. Kernel hardening or OS hardening is a valid technique. For large websites and business concerns, its important to patch your servers, even every week if need be. You can setup a server cron job (scheduled task) to send you list of outdated packages so you can update manually. We do this regularly for our dedicated clients.[/vc_column_text][/vc_column][/vc_row][vc_row 0=””][vc_column 0=””][vc_column_text 0=””]Finally, you can ask a software company specializing in web security to look into your setup. They will do stress tests, performance tests and penetration tests to find of any vulnerabilities. If you are looking to get your website tested then you can discuss with us.[/vc_column_text][/vc_column][/vc_row]