Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

can POST be detected

Posted on 2011-03-01
3
Medium Priority
?
323 Views
Last Modified: 2012-05-11
Im sending some info from a flash-file to a small PHP-script, both a larger string as POST and a small string as GET. My question is if a user through his browser or somewhere on his computer are able to see the url of the PHP-script, which by the way has another hostname, than the page from where its send from.
In that case is there a way to make sure that only POST or GET from a particular domain can send to the PHP-script.
0
Comment
Question by:petersego
3 Comments
 
LVL 14

Assisted Solution

by:Kalpan
Kalpan earned 750 total points
ID: 35006772
$_POST will never detected unless you set that using the session ie $_SESSION['val'] - $_POST['val'] and that session gets hacked.

try to use the following

http://stackoverflow.com/questions/4243657/someone-has-hacked-my-database-how-did-this-guy-do-it
0
 
LVL 34

Accepted Solution

by:
Dave_Dietz earned 750 total points
ID: 35013237
Anyone half-competent with a network sniffer or any one of a number of other tools for debugging HTTP traffic would be able to see the POST and the GET if they decided to look for it.

If you want to limit the addresses that can send a POST or GET to your script you would need to lock that down at the server with some sort of IP or Domain restriction or at a firewall in a similar manner.

Dave Dietz
0
 

Author Closing Comment

by:petersego
ID: 35080149
Thank you both.
Im not sure what is absolutely correct here, but I understand that it take some skills to detect.
0

Featured Post

Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question