On Sunday 30 June 2002 09:52, Justin French wrote:
> on 29/06/02 3:20 AM, Tamas Arpad ([EMAIL PROTECTED]) wrote:
> >> I was thinking if you use 90 character long filenames, assuming you
> >> only use the letters of the alphabet and the digits then you would
> >> have 62^90 different filenames, which is roughly 2E161 (2 followed by
> >> 161 zeros), which is quite a bit. Hopefully the numbers involved
> >> would make it infeasible for an attacker to loop through all the
> >> permutations.
> > But what if the attacker just knows one file's name, for example
> > index.php or something that's in the url in the browser. Then he/she
> > can stole that file, read it, and gets other filenames because of
> > includes/requires. With some work he/she can get all the files without
> > any bruteforce filename guessing.
> If you adopt some of the practices (I think) included earlier in this
> thread by me, you could restrict browser access to your inc files by the
> use of smart file naming, dedicated directories and .htaccess files,
> then this should cover the basics of people grabbing your included files
> (with passwords etc) via http (browser).
> It doesn't cover people within the server (others on a shared server,
> etc) though.
Yes, but I think we were talking about the latter, when users have shell
access on a shared server. Preventing from getting the php source through
the web server is relatively easy, there are really a dozen of ways.
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php