Solved

can POST be detected

Posted on 2011-03-01
3
318 Views
Last Modified: 2012-05-11
Im sending some info from a flash-file to a small PHP-script, both a larger string as POST and a small string as GET. My question is if a user through his browser or somewhere on his computer are able to see the url of the PHP-script, which by the way has another hostname, than the page from where its send from.
In that case is there a way to make sure that only POST or GET from a particular domain can send to the PHP-script.
0
Comment
Question by:petersego
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Assisted Solution

by:Kalpan
Kalpan earned 250 total points
ID: 35006772
$_POST will never detected unless you set that using the session ie $_SESSION['val'] - $_POST['val'] and that session gets hacked.

try to use the following

http://stackoverflow.com/questions/4243657/someone-has-hacked-my-database-how-did-this-guy-do-it
0
 
LVL 34

Accepted Solution

by:
Dave_Dietz earned 250 total points
ID: 35013237
Anyone half-competent with a network sniffer or any one of a number of other tools for debugging HTTP traffic would be able to see the POST and the GET if they decided to look for it.

If you want to limit the addresses that can send a POST or GET to your script you would need to lock that down at the server with some sort of IP or Domain restriction or at a firewall in a similar manner.

Dave Dietz
0
 

Author Closing Comment

by:petersego
ID: 35080149
Thank you both.
Im not sure what is absolutely correct here, but I understand that it take some skills to detect.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Here's a look at newsworthy articles and community happenings during the last month.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses
Course of the Month6 days, 15 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question