Building Secure PHP Apps

is your PHP app truly secure? Let's make sure you get home on time and sleep well at night.

Learn the security basics that a senior developer usually acquires over years of experience, all condensed down into one quick and easy handbook.

176 readers

100% Happiness guarantee Learn more

Minimum: $22.99

Suggested: $27.99+

Ways to buy

  • Free sample read /download
  • 176 readers
  • 85 pages
  • 90% complete
  • Book language: English
  • Updated

About the Book

Do you ever wonder how vulnerable you are to being hacked?  Do you feel confident about storing your users sensitive information?

Imagine feeling confident in the integrity of your software when you store your user's sensitive data.  No more fighting fires with lost data, no more late nights, your application is secure.

In this short book I'll give you clear, actionable details on how to secure various parts of your web application.  You will also find scenarios to handle and improve existing legacy issues.

Several years ago I was writing a web application for a client in the CodeIgniter PHP framework, *shudder*, but CodeIgniter didn't include any type of authentication system built in.  I of course did what any good/lazy developer would do and went on the hunt for a well made library to supply authentication capabilities.  To my chagrin I discovered that there weren't any clean, concise libraries that fit my needs for authentication in CodeIgniter.  Thus began my journey of creating Ion Auth, a simple authentication library for CodeIgniter, and a career long crusade for securing web applications as well as helping other developers do the same.

Here we are years later, a lot of us have moved on to other frameworks or languages, but I still repeatedly see basic security being overlooked.  So let's fix that.  I want to make sure that you'll never have to live the horror of leaking user passwords, or have someone inject malicious SQL into your database, or the suite of other "hacks" that could have been easily avoided.  Let's make sure we all get home on time and sleep well at night.

Topics

I'm aiming for a short book, hopefully around 70-100 pages, that is a quick read with handbook style references to specific items you can act on.  The following sections will be covered:

  • Never trust your users - escape all input
  • HTTPS/SSL/BCA/JWH/SHA and other random letters, some of them actually matter
  • Password Encryption and Storage for Everyone
  • Authentication, Access Control, and Safe File Handing
  • Safe Defaults, Cross Site Scripting and other Popular Hacks

This is a work in progress so if there are any topics you'd like more information on please let me know.

Format

I plan to release a few editions of this book, each focusing on a different programming languages.  The languages slated for eventual release are PHP, Python, Ruby, and JS.  This first edition will be in PHP.  I will offer heavily discounted copies of the future editions to customers of this book.

Progress

All of the inital writing is complete.  Four of the five chapters are finished/published/done.  The last chapter is still being edited.  Purchasing now allows you to have access to each chapter as it is completed as well as enabling you to purchase at a discounted rate.  Once the final chapter is done the price will be going up so buy now to save.

Buy A Bundle, And Save

  • Building Secure PHP Apps cover page
    • Build APIs You Won't Hate cover page

    Phil & Ben's Excellent adventures in Code => PHP APIs and Security Bundle

    2 books for $56.98 $34.99

About the Author

Ben Edmunds leads development teams to create cutting-edge web and mobile applications. He is an active leader, developer, and speaker in various development communities, especially the CodeIgniter and Laravel PHP framework communities. He has been developing software professionally for over 10 years and in that time has worked on everything from robotics to government projects.  

PHP Town Hall podcast co-host.  Portland PHP Usergroup co-organizer.  Open source advocate.

About the Contributors

  • Aken Roberts

    Img_1735

    Eric "Aken" Roberts is the Director of Application Development at Swarming Technology in Milwaukee, Wisconsin. You can often find him helping out in #Laravel and pinging people on Twitter. Outside of a text editor, he writes and reviews various publications (okay, that's may happen in a text editor, too), plays tennis and drums, collects Hot Wheels, torments his cats, and drinks too much Mountain Dew. And he's getting married in October!

    You can find Aken on Twitter @cryode, on GitHub @cryode, or at his website, Cryode.com.

  • David Stanley Tech Reviewer

    Dstanley_bio_pic_for_book

    father, husband , grunt, geek, triathlete... pretty much in that order. PHP, Python, JS. Co-organizer of the Portland PHP User Group.

  • Mike Wales Tech Reviewer & Grammar Freak

    44601_1171807791409_1714455051_314151_2705991_n

    Lead Full Stack Developer. Co-Founder & CTO, Students Gone Global. Founder, WoWCensus. Worked at NSA, DIA, JFCC-Space.

The Leanpub Unconditional, No Risk, 100% Happiness Guarantee

♥♥♥♥♥

Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks. We process the refunds manually, so they may take a few days to show up. See full terms.

If you buy a Leanpub book you get all the updates to the book for free! All books are available in PDF, EPUB (for iPad) and MOBI (for Kindle). There is no DRM. There is no risk, just guaranteed happiness or your money back.

Table of Contents

  • Constructor
  • Chapter 1 - Never Trust Your Users. Sanitize ALL Input!
    • SQL Injection
    • Mass Assignment
    • Typecasting
    • Sanitizing Output
  • Chapter Two - HTTPS/SSL/BCA/JWH/SHA and other random letters, some of them actually matter
    • What is HTTPS
    • Limitations
    • When to use HTTPS
    • Implementing HTTPS
    • Paths
  • Chapter 3 - Password Encryption and Storage for Everyone
    • The Small Print
    • What is a Hash?
    • Popular Attacks
    • A Pinch of Salt
    • Hashing Algorithms
    • Storage
    • Validation
    • Putting It All Together
    • Brute Force Protection
    • Upgrading Legacy Systems
    • Resources
  • Chapter 4 - Authentication, Access Control, and Safe File Handing
    • Authentication
    • Access Control
    • Validating Redirects
    • Obfuscation
    • Safe File Handing

Last updated

This Book is for Sale Through Leanpub

Authors and publishers use Leanpub to publish amazing in-progress and completed books like this one.

Leanpub_logo_medium

Read

Leanpub has a wide selection of in-progress and completed books available to browse, purchase, and enjoy.

Browse the Bookstore

Write

Leanpub is free for authors and publishers to use. We pay authors or publishers 90% royalties minus 50 cents per sale.

Write a Book