Solved

can POST be detected

Posted on 2011-03-01
3
315 Views
Last Modified: 2012-05-11
Im sending some info from a flash-file to a small PHP-script, both a larger string as POST and a small string as GET. My question is if a user through his browser or somewhere on his computer are able to see the url of the PHP-script, which by the way has another hostname, than the page from where its send from.
In that case is there a way to make sure that only POST or GET from a particular domain can send to the PHP-script.
0
Comment
Question by:petersego
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Assisted Solution

by:Kalpan
Kalpan earned 250 total points
ID: 35006772
$_POST will never detected unless you set that using the session ie $_SESSION['val'] - $_POST['val'] and that session gets hacked.

try to use the following

http://stackoverflow.com/questions/4243657/someone-has-hacked-my-database-how-did-this-guy-do-it
0
 
LVL 34

Accepted Solution

by:
Dave_Dietz earned 250 total points
ID: 35013237
Anyone half-competent with a network sniffer or any one of a number of other tools for debugging HTTP traffic would be able to see the POST and the GET if they decided to look for it.

If you want to limit the addresses that can send a POST or GET to your script you would need to lock that down at the server with some sort of IP or Domain restriction or at a firewall in a similar manner.

Dave Dietz
0
 

Author Closing Comment

by:petersego
ID: 35080149
Thank you both.
Im not sure what is absolutely correct here, but I understand that it take some skills to detect.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question