Building Secure PHP Apps

Retired

This book is no longer available for sale.

Building Secure PHP Apps

is your PHP app truly secure? Let's make sure you get home on time and sleep well at night.

About the Book

Do you ever wonder how vulnerable you are to being hacked?  Do you feel confident about storing your users sensitive information? Imagine feeling confident in the integrity of your software when you store your user's sensitive data.  No more fighting fires with lost data, no more late nights, your application is secure. In this short book I'll give you clear, actionable details on how to secure various parts of your web application.  You will also find scenarios to handle and improve existing legacy issues.

Several years ago I was writing a web application for a client in the CodeIgniter PHP framework, *shudder*, but CodeIgniter didn't include any type of authentication system built in.  I of course did what any good/lazy developer would do and went on the hunt for a well made library to supply authentication capabilities.  To my chagrin I discovered that there weren't any clean, concise libraries that fit my needs for authentication in CodeIgniter.  Thus began my journey of creating Ion Auth, a simple authentication library for CodeIgniter, and a career long crusade for securing web applications as well as helping other developers do the same.

Here we are years later, a lot of us have moved on to other frameworks or languages, but I still repeatedly see basic security being overlooked.  So let's fix that.  I want to make sure that you'll never have to live the horror of leaking user passwords, or have someone inject malicious SQL into your database, or the suite of other "hacks" that could have been easily avoided.  Let's make sure we all get home on time and sleep well at night.

Topics

This is a quick read, at just over 100 pages.  This is a handbook style guide to specific items you can act on.  The following sections will be covered:

  • Never trust your users - escape all input
  • HTTPS/SSL/BCA/JWH/SHA and other random letters, some of them actually matter
  • Password Encryption and Storage for Everyone
  • Authentication, Access Control, and Safe File Handing
  • Safe Defaults, Cross Site Scripting and other Popular Hacks

Format

 All code examples are written in PHP with accompanying source code on GitHub.

Progress

This book is now 100% complete and ready to school you.  There will be occasional releases for errata and to keep things up to date. 

About the Author

Ben.edmunds@gmail.com
Ben Edmunds

Ben Edmunds leads development teams to create cutting-edge web and mobile applications. He is an active leader, developer, and speaker in various development communities, especially the CodeIgniter and Laravel PHP framework communities. He has been developing software professionally for over 10 years and in that time has worked on everything from robotics to government projects.  

PHP Town Hall podcast co-host.  Portland PHP Usergroup co-organizer.  Open source advocate.

About the Contributors

Aken Roberts
Aken Roberts

Eric "Aken" Roberts is the Director of Application Development at Swarming Technology in Milwaukee, Wisconsin. You can often find him helping out in #Laravel and pinging people on Twitter. Outside of a text editor, he writes and reviews various publications (okay, that's may happen in a text editor, too), plays tennis and drums, collects Hot Wheels, torments his cats, and drinks too much Mountain Dew. And he's getting married in October!

You can find Aken on Twitter @cryode, on GitHub @cryode, or at his website, Cryode.com.

David Stanley
David Stanley

Tech Reviewer

father, husband , grunt, geek, triathlete... pretty much in that order. PHP, Python, JS. Co-organizer of the Portland PHP User Group.
Mike Wales
Mike Wales

Tech Reviewer & Grammar Freak

Lead Full Stack Developer. Co-Founder & CTO, Students Gone Global. Founder, WoWCensus. Worked at NSA, DIA, JFCC-Space.

Table of Contents

  • Constructor
    • Format
    • Errata
    • Sample Code
    • About the Author
  • Chapter 1 - Never Trust Your Users. Sanitize ALL Input!
    • SQL Injection
    • Mass Assignment
    • Typecasting
    • Sanitizing Output
  • Chapter Two - HTTPS/SSL/BCA/JWH/SHA and Other Random Letters; Some of Them Actually Matter.
    • What is HTTPS
    • Limitations
    • When to use HTTPS
    • Implementing HTTPS
    • Paths
  • Chapter 3 - Password Encryption and Storage for Everyone
    • The Small Print
    • What is a Hash?
    • Popular Attacks
    • A Pinch of Salt
    • Hashing Algorithms
    • Storage
    • Validation
    • Putting It All Together
    • Brute Force Protection
    • Upgrading Legacy Systems
    • Resources
  • Chapter 4 - Authentication, Access Control, and Safe File Handing
    • Authentication
    • Access Control
    • Validating Redirects
    • Obfuscation
    • Safe File Handing
  • Chapter 5 - Safe Defaults, Cross Site Scripting, and Other Popular Hacks
    • Never Trust Yourself - Use Safe Defaults
    • Never Trust Dynamic Typing. It’s Not Your Friend.
    • Cross Site Scripting
    • Attack Entry Points
    • Cross Site Request Forgery
    • Multiple Form Submits
    • Race Conditions
    • Outdated Libraries / External Programs
  • Destructor
    • About the Author
    • Security Audit / Consulting
  • Notes

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub