# 防御
## **magic\_quotes\_sybase**
作用:影响 addslashes() 函数。 PHP 5.3.0 起*废弃*并将自 PHP 5.4.0 起*移除*
magic\_quotes\_sybase=0 时(默认),在启用magic\_quotes\_gpc或magic\_quotes\_runtime时addslashes 将对 ' " \\ 进行 \\ 转义操作;
magic\_quotes\_sybase=1 时,在启用magic\_quotes\_gpc或magic\_quotes\_runtime时addslashes 将对`'`转义成两个单引号`''`。
> 注意,当magic\_quotes\_sybase=On时,它完全覆盖了magic\_quotes\_gpc。在这种情况下,即使启用了magic\_quotes\_gpc,也不会转义双引号、反斜杠或NUL
```
<pre class="calibre10">```
<span class="token">//http://www.test.com/?name='</span>
echo $_GET<span class="token3">[</span><span class="token2">'name'</span><span class="token3">]</span><span class="token3">;</span><span class="token">//''</span>
<span class="token">//将会覆盖magic_quotes_gpc的设置,注意'转义为'' \和"没有转义</span>
<span class="token">//http://www.test.com/?name='@"@\</span>
<span class="token">//http://www.test.com/?name=%27@%22@\</span>
echo $_GET<span class="token3">[</span><span class="token2">'name'</span><span class="token3">]</span><span class="token3">;</span><span class="token">//''@"@\</span>
```
```
## **magic\_quotes\_gpc**
作用:当php.ini中magic\_quotes\_gpc=on时,对php服务器端接收的 GET POST COOKIE 的值执行 addslashes() 操作即自动转换`'和\和"和NULL`(php5.4移除此选项)
作用范围是:WEB客户服务端。
作用时间:请求开始时,例如当脚本运行时。
`get_magic_quotes_gpc()`可以获取当前 magic\_quotes\_gpc 的配置选项设置(5.4移除后始终返回false)
```
<pre class="calibre10">```
<span class="token">//http://www.test.com/?name='@"@\</span>
<span class="token">//http://www.test.com/?name=%27@%22@\</span>
echo $_GET<span class="token3">[</span><span class="token2">'name'</span><span class="token3">]</span><span class="token3">;</span><span class="token">//\'@\"@\\</span>
<span class="token">//注意不会转义QUERY_STRING php4是可以转义_SERVER的php5取消了,所以我们需要addslashes()转义 $_SERVER</span>
echo $_SERVER<span class="token3">[</span><span class="token2">'QUERY_STRING'</span><span class="token3">]</span><span class="token3">;</span><span class="token">//name=%27@%22@\</span>
```
```
## **magic\_quotes\_runtime**
作用:对通过 fread()、file\_get\_contents() 返回的文本执行 addslashes() 操作,对执行sql查询的结果执行 addslashes() 操作。 自 PHP 5.3.0 起*废弃*并将自 PHP 5.4.0 起*移除*
作用范围:从文件中读取的数据或执行 exec() 的结果或是从SQL查询中得到的。
作用时间:每次当脚本访问运行状态中产生的数据。
`get_magic_quotes_runtime()`可以获取magic\_quotes\_runtime配置的值
`set_magic_quotes_runtime()`可以在脚本中设置magic\_quotes\_runtime配置的值
如果启用了`magic_quotes_runtime`,大多数返回任何形式外部数据的函数,包括数据库和文本段将会用反斜线转义引号。 如果启用了[magic\_quotes\_sybase](https://www.php.net/manual/zh/sybase.configuration.php#ini.magic-quotes-sybase),单引号会被单引号转义而不是反斜线
```
<pre class="calibre10">```
受 magic_quotes_runtime 影响的函数(不包括 PECL 里的函数):
<span class="token4">get_meta_tags</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">file_get_contents</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">file</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">fgets</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">fwrite</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">fread</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">fputcsv</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">stream_socket_recvfrom</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">exec</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">system</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">passthru</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">stream_get_contents</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">bzread</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">gzfile</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">gzgets</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">gzwrite</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">gzread</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">exif_read_data</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">dba_insert</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">dba_replace</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">dba_fetch</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">ibase_fetch_row</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">ibase_fetch_assoc</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">ibase_fetch_object</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">mssql_fetch_row</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">mssql_fetch_object</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">mssql_fetch_array</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">mssql_fetch_assoc</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">mysqli_fetch_row</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">mysqli_fetch_array</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">mysqli_fetch_assoc</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">mysqli_fetch_object</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">pg_fetch_row</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">pg_fetch_assoc</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">pg_fetch_array</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">pg_fetch_object</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">pg_fetch_all</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">pg_select</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">sybase_fetch_object</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">sybase_fetch_array</span><span class="token3">(</span><span class="token3">)</span>
<span class="token4">sybase_fetch_assoc</span><span class="token3">(</span><span class="token3">)</span>
SplFileObject<span class="token3">:</span><span class="token3">:</span><span class="token4">fgets</span><span class="token3">(</span><span class="token3">)</span>
SplFileObject<span class="token3">:</span><span class="token3">:</span><span class="token4">fgetcsv</span><span class="token3">(</span><span class="token3">)</span>
SplFileObject<span class="token3">:</span><span class="token3">:</span><span class="token4">fwrite</span><span class="token3">(</span><span class="token3">)</span>
```
```
```
<pre class="calibre10">```
<span class="token">// 如果启用了魔术引号 即magic_quotes_gpc=on时</span>
echo $_POST<span class="token3">[</span><span class="token2">'lastname'</span><span class="token3">]</span><span class="token3">;</span> <span class="token">// O\'reilly </span>
echo <span class="token4">addslashes</span><span class="token3">(</span>$_POST<span class="token3">[</span><span class="token2">'lastname'</span><span class="token3">]</span><span class="token3">)</span><span class="token3">;</span> <span class="token">// O\\\'reilly</span>
```
```
由于5.4移除了magic\_quotes\_gpc配置get\_magic\_quotes\_gpc始终返回false
```
<pre class="calibre10">```
<span class="token">// 适用各个 PHP 版本的用法</span>
<span class="token5">if</span> <span class="token3">(</span><span class="token4">get_magic_quotes_gpc</span><span class="token3">(</span><span class="token3">)</span><span class="token3">)</span> <span class="token3">{</span>
<span class="token">//删除由 addslashes() 函数添加的反斜杠</span>
$lastname <span class="token1">=</span> <span class="token4">stripslashes</span><span class="token3">(</span>$_POST<span class="token3">[</span><span class="token2">'lastname'</span><span class="token3">]</span><span class="token3">)</span><span class="token3">;</span>
<span class="token3">}</span>
<span class="token5">else</span> <span class="token3">{</span>
$lastname <span class="token1">=</span> $_POST<span class="token3">[</span><span class="token2">'lastname'</span><span class="token3">]</span><span class="token3">;</span>
<span class="token3">}</span>
```
```
如果使用 MySQL
```
<pre class="calibre10">```
<span class="token5">if</span> <span class="token3">(</span><span class="token4">get_magic_quotes_gpc</span><span class="token3">(</span><span class="token3">)</span><span class="token3">)</span> <span class="token3">{</span>
<span class="token">//删除由 addslashes() 函数添加的反斜杠</span>
$lastname <span class="token1">=</span> <span class="token4">stripslashes</span><span class="token3">(</span>$_POST<span class="token3">[</span><span class="token2">'lastname'</span><span class="token3">]</span><span class="token3">)</span><span class="token3">;</span>
<span class="token3">}</span>
<span class="token5">else</span> <span class="token3">{</span>
$lastname <span class="token1">=</span> $_POST<span class="token3">[</span><span class="token2">'lastname'</span><span class="token3">]</span><span class="token3">;</span>
<span class="token3">}</span>
$lastname <span class="token1">=</span> <span class="token4">mysql_real_escape_string</span><span class="token3">(</span>$lastname<span class="token3">)</span><span class="token3">;</span>
echo $lastname<span class="token3">;</span> <span class="token">// O\'reilly</span>
$sql <span class="token1">=</span> <span class="token2">"INSERT INTO lastnames (lastname) VALUES ('$lastname')"</span><span class="token3">;</span>
```
```
**数据库字符集设为GBK时,0xbf27本身不是一个有效的GBK字符,但经过 addslashes() 转换后变为0xbf5c27,前面的0xbf5c是个有效的GBK字符,所以0xbf5c27会被当作一个字符0xbf5c和一个单引号来处理,结果漏洞就触发了**
mysql\_real\_escape\_string() 也存在相同的问题,只不过相比 addslashes() 它考虑到了用什么字符集来处理,因此可以用相应的字符集来处理字符
当mysql\_real\_escape\_string检测到的编码方式跟client设置的编码方式(big5/bgk)不一致时,mysql\_real\_escape\_string跟addslashes是没有区别的。比如:
```
<pre class="calibre10">```
<span class="token3">[</span>client<span class="token3">]</span>
default<span class="token1">-</span>character<span class="token1">-</span>set<span class="token1">=</span>latin1
<span class="token4">mysql_query</span><span class="token3">(</span><span class="token2">"SET CHARACTER SET 'gbk'"</span><span class="token3">,</span> $mysql_conn<span class="token3">)</span><span class="token3">;</span>
这种情况下mysql_real_escape_string 是基于 latin1工作的,是不安全的
<span class="token3">[</span>client<span class="token3">]</span>
default<span class="token1">-</span>character<span class="token1">-</span>set<span class="token1">=</span>gbk
<span class="token4">mysql_query</span><span class="token3">(</span><span class="token2">"SET CHARACTER SET 'gbk'"</span><span class="token3">,</span> $mysql_conn<span class="token3">)</span><span class="token3">;</span>
这种情况下,mysql_real_escape_string 基于 gbk 工作,是正常的
```
```
实例:
```
<pre class="calibre10">```
echo <span class="token2">"PHP version: "</span><span class="token3">.</span>PHP_VERSION<span class="token3">.</span><span class="token2">"\n"</span><span class="token3">;</span><span class="token">//PHP version: 5.2.5</span>
<span class="token4">mysql_connect</span><span class="token3">(</span><span class="token2">'servername'</span><span class="token3">,</span><span class="token2">'username'</span><span class="token3">,</span><span class="token2">'password'</span><span class="token3">)</span><span class="token3">;</span>
<span class="token4">mysql_select_db</span><span class="token3">(</span><span class="token2">"test"</span><span class="token3">)</span><span class="token3">;</span>
<span class="token4">mysql_query</span><span class="token3">(</span><span class="token2">"SET NAMES GBK"</span><span class="token3">)</span><span class="token3">;</span>
<span class="token">//使用cahr处理转换后的0xbf5c27字符 chr(0xbf)为¿ chr(0x27)'</span>
<span class="token">//模拟$_POST数据 ¿' OR username =username #</span>
$_POST<span class="token3">[</span><span class="token2">'username'</span><span class="token3">]</span> <span class="token1">=</span> <span class="token4">chr</span><span class="token3">(</span><span class="token6">0xbf</span><span class="token3">)</span><span class="token3">.</span><span class="token4">chr</span><span class="token3">(</span><span class="token6">0x27</span><span class="token3">)</span><span class="token3">.</span><span class="token2">' OR username = username /*'</span><span class="token3">;</span>
$_POST<span class="token3">[</span><span class="token2">'username'</span><span class="token3">]</span> <span class="token1">=</span> <span class="token4">chr</span><span class="token3">(</span><span class="token6">0xbf</span><span class="token3">)</span><span class="token3">.</span><span class="token4">chr</span><span class="token3">(</span><span class="token6">0x27</span><span class="token3">)</span><span class="token3">.</span><span class="token2">' OR username = username #'</span><span class="token3">;</span>
$_POST<span class="token3">[</span><span class="token2">'password'</span><span class="token3">]</span> <span class="token1">=</span> <span class="token2">'guess'</span><span class="token3">;</span>
$username <span class="token1">=</span> <span class="token4">addslashes</span><span class="token3">(</span>$_POST<span class="token3">[</span><span class="token2">'username'</span><span class="token3">]</span><span class="token3">)</span><span class="token3">;</span>
$password <span class="token1">=</span> <span class="token4">addslashes</span><span class="token3">(</span>$_POST<span class="token3">[</span><span class="token2">'password'</span><span class="token3">]</span><span class="token3">)</span><span class="token3">;</span>
$sql <span class="token1">=</span> <span class="token2">"SELECT * FROM users WHERE username = '$username' AND password = '$password'"</span><span class="token3">;</span>
$result <span class="token1">=</span> <span class="token4">mysql_query</span><span class="token3">(</span>$sql<span class="token3">)</span> or <span class="token4">trigger_error</span><span class="token3">(</span><span class="token4">mysql_error</span><span class="token3">(</span><span class="token3">)</span><span class="token3">.</span>$sql<span class="token3">)</span><span class="token3">;</span>
<span class="token4">var_dump</span><span class="token3">(</span><span class="token4">mysql_num_rows</span><span class="token3">(</span>$result<span class="token3">)</span><span class="token3">)</span><span class="token3">;</span><span class="token">//int(3) 有结果有注入风险</span>
<span class="token4">var_dump</span><span class="token3">(</span><span class="token4">mysql_client_encoding</span><span class="token3">(</span><span class="token3">)</span><span class="token3">)</span><span class="token3">;</span><span class="token1">/</span><span class="token1">/</span>latin1
$username <span class="token1">=</span> <span class="token4">mysql_real_escape_string</span><span class="token3">(</span>$_POST<span class="token3">[</span><span class="token2">'username'</span><span class="token3">]</span><span class="token3">)</span><span class="token3">;</span>
$password <span class="token1">=</span> <span class="token4">mysql_real_escape_string</span><span class="token3">(</span>$_POST<span class="token3">[</span><span class="token2">'password'</span><span class="token3">]</span><span class="token3">)</span><span class="token3">;</span>
$sql <span class="token1">=</span> <span class="token2">"SELECT * FROM users WHERE username = '$username' AND password = '$password'"</span><span class="token3">;</span>
$result <span class="token1">=</span> <span class="token4">mysql_query</span><span class="token3">(</span>$sql<span class="token3">)</span> or <span class="token4">trigger_error</span><span class="token3">(</span><span class="token4">mysql_error</span><span class="token3">(</span><span class="token3">)</span><span class="token3">.</span>$sql<span class="token3">)</span><span class="token3">;</span>
<span class="token4">var_dump</span><span class="token3">(</span><span class="token4">mysql_num_rows</span><span class="token3">(</span>$result<span class="token3">)</span><span class="token3">)</span><span class="token3">;</span><span class="token1">/</span><span class="token1">/</span><span class="token4">int</span><span class="token3">(</span><span class="token6">3</span><span class="token3">)</span> 有结果有注入风险
<span class="token4">var_dump</span><span class="token3">(</span><span class="token4">mysql_client_encoding</span><span class="token3">(</span><span class="token3">)</span><span class="token3">)</span><span class="token3">;</span><span class="token1">/</span><span class="token1">/</span>latin1
<span class="token4">mysql_set_charset</span><span class="token3">(</span><span class="token2">"GBK"</span><span class="token3">)</span><span class="token3">;</span>
$username <span class="token1">=</span> <span class="token4">mysql_real_escape_string</span><span class="token3">(</span>$_POST<span class="token3">[</span><span class="token2">'username'</span><span class="token3">]</span><span class="token3">)</span><span class="token3">;</span>
$password <span class="token1">=</span> <span class="token4">mysql_real_escape_string</span><span class="token3">(</span>$_POST<span class="token3">[</span><span class="token2">'password'</span><span class="token3">]</span><span class="token3">)</span><span class="token3">;</span>
$sql <span class="token1">=</span> <span class="token2">"SELECT * FROM users WHERE username = '$username' AND password = '$password'"</span><span class="token3">;</span>
$result <span class="token1">=</span> <span class="token4">mysql_query</span><span class="token3">(</span>$sql<span class="token3">)</span> or <span class="token4">trigger_error</span><span class="token3">(</span><span class="token4">mysql_error</span><span class="token3">(</span><span class="token3">)</span><span class="token3">.</span>$sql<span class="token3">)</span><span class="token3">;</span>
<span class="token4">var_dump</span><span class="token3">(</span><span class="token4">mysql_num_rows</span><span class="token3">(</span>$result<span class="token3">)</span><span class="token3">)</span><span class="token3">;</span><span class="token1">/</span><span class="token1">/</span><span class="token4">int</span><span class="token3">(</span><span class="token6">0</span><span class="token3">)</span>
<span class="token4">var_dump</span><span class="token3">(</span><span class="token4">mysql_client_encoding</span><span class="token3">(</span><span class="token3">)</span><span class="token3">)</span><span class="token3">;</span><span class="token1">/</span><span class="token1">/</span><span class="token4">string</span><span class="token3">(</span><span class="token6">3</span><span class="token3">)</span> <span class="token2">"gbk"</span>
结果:
PHP version<span class="token3">:</span> <span class="token6">5.2</span><span class="token6">.5</span>
<span class="token4">int</span><span class="token3">(</span><span class="token6">3</span><span class="token3">)</span>
<span class="token4">string</span><span class="token3">(</span><span class="token6">6</span><span class="token3">)</span> <span class="token2">"latin1"</span>
<span class="token4">int</span><span class="token3">(</span><span class="token6">3</span><span class="token3">)</span>
<span class="token4">string</span><span class="token3">(</span><span class="token6">6</span><span class="token3">)</span> <span class="token2">"latin1"</span>
<span class="token4">int</span><span class="token3">(</span><span class="token6">0</span><span class="token3">)</span>
<span class="token4">string</span><span class="token3">(</span><span class="token6">3</span><span class="token3">)</span> <span class="token2">"gbk"</span>
```
```
可以看出来不论是使用addslashes还是mysql\_real\_escape\_string,我都可以利用编码的漏洞来实现输入任意密码就能登录服务器的注入攻击!!!!(攻击的原理我就不多说了,感兴趣的同学可以研究下字符编码中单字节和多字节的问题)
# **完美解决方案**
由上可知
mysql\_real\_escape\_string() 、 addslashes()、和str\_replace(替换单引号)是不能解决sql注入问题的
编写代码是要特别小心获取变量,如:$\_GET $\_POST $\_COOKIE $\_SERVER
完美解决sql注入的方案就是使用拥有Prepared Statement机制的PDO和MYSQLi来代替mysql\_query(注:mysql\_query自 PHP 5.5.0 起已废弃,并在将来会被移除):
```
<pre class="calibre10">```
<span class="token">//PDO:</span>
$pdo <span class="token1">=</span> <span class="token5">new</span> <span class="token4">PDO</span><span class="token3">(</span><span class="token2">'mysql:dbname=dbtest;host=127.0.0.1;charset=utf8'</span><span class="token3">,</span> <span class="token2">'user'</span><span class="token3">,</span> <span class="token2">'pass'</span><span class="token3">)</span><span class="token3">;</span>
$pdo<span class="token1">-</span><span class="token1">></span><span class="token4">setAttribute</span><span class="token3">(</span>PDO<span class="token3">:</span><span class="token3">:</span>ATTR_EMULATE_PREPARES<span class="token3">,</span> <span class="token6">false</span><span class="token3">)</span><span class="token3">;</span>
$pdo<span class="token1">-</span><span class="token1">></span><span class="token4">setAttribute</span><span class="token3">(</span>PDO<span class="token3">:</span><span class="token3">:</span>ATTR_ERRMODE<span class="token3">,</span> PDO<span class="token3">:</span><span class="token3">:</span>ERRMODE_EXCEPTION<span class="token3">)</span><span class="token3">;</span>
$stmt <span class="token1">=</span> $pdo<span class="token1">-</span><span class="token1">></span><span class="token4">prepare</span><span class="token3">(</span><span class="token2">'SELECT * FROM employees WHERE name = :name'</span><span class="token3">)</span><span class="token3">;</span>
$stmt<span class="token1">-</span><span class="token1">></span><span class="token4">execute</span><span class="token3">(</span><span class="token4">array</span><span class="token3">(</span><span class="token2">'name'</span> <span class="token1">=</span><span class="token1">></span> $name<span class="token3">)</span><span class="token3">)</span><span class="token3">;</span>
foreach <span class="token3">(</span>$stmt as $row<span class="token3">)</span> <span class="token3">{</span>
<span class="token">// do something with $row</span>
<span class="token3">}</span>
<span class="token">//MYSQLi:</span>
$stmt <span class="token1">=</span> $dbConnection<span class="token1">-</span><span class="token1">></span><span class="token4">prepare</span><span class="token3">(</span><span class="token2">'SELECT * FROM employees WHERE name = ?'</span><span class="token3">)</span><span class="token3">;</span>
$stmt<span class="token1">-</span><span class="token1">></span><span class="token4">bind_param</span><span class="token3">(</span><span class="token2">'s'</span><span class="token3">,</span> $name<span class="token3">)</span><span class="token3">;</span>
$stmt<span class="token1">-</span><span class="token1">></span><span class="token4">execute</span><span class="token3">(</span><span class="token3">)</span><span class="token3">;</span>
$result <span class="token1">=</span> $stmt<span class="token1">-</span><span class="token1">></span><span class="token4">get_result</span><span class="token3">(</span><span class="token3">)</span><span class="token3">;</span>
<span class="token5">while</span> <span class="token3">(</span>$row <span class="token1">=</span> $result<span class="token1">-</span><span class="token1">></span><span class="token4">fetch_assoc</span><span class="token3">(</span><span class="token3">)</span><span class="token3">)</span> <span class="token3">{</span>
<span class="token">// do something with $row</span>
<span class="token3">}</span>
```
```
坚持过滤输入和转义输出
addcslashes($input, $charlist)、mysql\_real\_escape\_string()
htmlspecialchars($input)、strip\_tags($input)
富文本时使用[HTMLPurifier 富文本过滤器](http://htmlpurifier.org/)
数据库报错信息泄露防范
1. 把php.ini文件 display\_errors = Off
数据库查询函数前面加一个@字符
- php更新内容
- 其他
- empty、isset、is_null
- echo 输出bool值
- if真假情况
- 常量
- define与const(php5.3) 类常量
- 递归
- 单元测试
- 面向对象
- 全局变量域超全局变量
- php网络相关
- 支持的协议和封装协议(如http,php://input)
- 上下文(Context)选项和参数
- 过滤器
- http请求及模拟登录
- socket
- streams
- swoole
- 超全局变量
- $_ENV :存储了一些系统的环境变量
- $_COOKIE
- $_SESSION
- $_FILES
- $_SERVER
- 正则
- php正则函数
- 去除文本中的html、xml的标签
- 特殊符号
- \r\n
- 模式修正符
- 分组
- 断言
- 条件表达式
- 递归表达式 (?R)
- 固化分组
- 正则例子
- 框架
- 自动加载spl_autoload_register
- 时间函数
- 文件操作
- 文件的上传下载
- 常见的mimi类型
- 文件断点续传
- 下载文件防盗链
- 破解防盗链
- 无限分类
- 短信验证码
- 短信宝
- 视频分段加载
- phpDoc注释
- 流程控制代替语法
- 三元运算
- @错误抑制符
- 字符编码
- PHP CLI模式开发
- 配置可修改范围
- CGI、FastCGI和PHP-FPM关系图解
- No input file specified的解决方法
- SAPI(PHP常见的四种运行模式)
- assert断言
- 类基础
- 类的三大特性:封装,继承,多态
- 魔术方法
- 辅助查询(*)
- extends继承
- abstract 抽象类
- interface 接口(需要implements实现)
- 抽象类和接口的区别
- 多态
- static
- final
- serialize与unserialize
- instanceof 判断后代子类
- 类型约束
- clone克隆
- ::的用法
- new self()与new static()
- this、self、static、parent、super
- self、static、parent:后期静态绑定
- PHP的静态变量
- php导入
- trait
- 动态调用类方法
- 参数及类型申明
- 方法的重载覆盖
- return $a && $b
- 设计思想
- 依赖注入与依赖倒置
- 创建型模式(创建类对象)
- (*)单例模式
- (*)工厂模式
- 原型模式(在方法里克隆this)
- 创建者模式
- 结构型模式
- 适配器模式(Adapter)
- 桥接模式
- 装饰模式
- 组合模式
- 外观模式(门面(Facade)模式)
- 享元模式
- 代理模式
- 行为型模式
- (*)观察者模式
- (*)迭代器模式(Iterator)
- 模板方法模式 Template
- 命令模式(Command)
- 中介者模式(Mediator)
- 状态模式(State)
- 职责链模式 (Chainof Responsibility)
- 策略模式(Strategy)
- 已知模式-备忘录模式(Memento)
- 深度模式-解释器模式(Interpreter)
- 深度模式-访问者模式(Visitor)
- (*)注册树(注射器、注册表)模式
- 函数参考
- 影响 PHP 行为的扩展
- APC扩展(过时)
- APCu扩展
- APD扩展(过时)
- bcompiler扩展(过时)
- BLENC扩展 (代码加密 实验型)
- Componere扩展(7.1+)
- 错误处理扩展(PHP 核心)
- FFI扩展
- htscanner扩展
- inclued扩展
- Memtrack扩展
- OPcache扩展(5.5.0内部集成)
- Output Control扩展(核心)
- PHP Options/Info扩展(核心)
- phpdbg扩展(5.6+内部集成)
- runkit扩展
- runkit7扩展
- scream扩展
- uopz扩展
- Weakref扩展
- WinCache扩展
- Xhprof扩展
- 音频格式操作
- ID3
- KTaglib
- oggvorbis
- OpenAL
- 身份认证服务
- KADM5
- Radius
- 针对命令行的扩展
- Ncurses(暂无人维护)
- Newt(暂无人维护)
- Readline
- 压缩与归档扩展
- Bzip2
- LZF
- Phar
- Rar
- Zip
- Zlib
- 信用卡处理
- 加密扩展
- Crack(停止维护)
- CSPRNG(核心)
- Hash扩展(4.2内置默认开启、7.4核心)
- Mcrypt(7.2移除)
- Mhash(过时)
- OpenSSL(*)
- 密码散列算法(核心)
- Sodium(+)
- 数据库扩展
- 数据库抽象层
- 针对各数据库系统对应的扩展
- 日期与时间相关扩展
- Calendar
- 日期/时间(核心)
- HRTime(*)
- 文件系统相关扩展
- Direct IO
- 目录(核心)
- Fileinfo(内置)
- 文件系统(核心)
- Inotify
- Mimetype(过时)
- Phdfs
- Proctitle
- xattr
- xdiff
- 国际化与字符编码支持
- Enchant
- FriBiDi
- Gender
- Gettext
- iconv(内置默认开启)
- intl
- 多字节字符串(mbstring)
- Pspell
- Recode(将要过时)
- 图像生成和处理
- Cairo
- Exif
- GD(内置)
- Gmagick
- ImageMagick
- 邮件相关扩展
- Cyrus
- IMAP
- Mail(核心)
- Mailparse
- vpopmail(实验性 )
- 数学扩展
- BC Math
- GMP
- Lapack
- Math(核心)
- Statistics
- Trader
- 非文本内容的 MIME 输出
- FDF
- GnuPG
- haru(实验性)
- Ming(实验性)
- wkhtmltox(*)
- PS
- RPM Reader(停止维护)
- RpmInfo
- XLSWriter Excel操作(*)
- 进程控制扩展
- Eio
- Ev
- Expect
- Libevent
- PCNTL
- POSIX
- 程序执行扩展(核心)
- parallel
- pthreads(*)
- pht
- Semaphore
- Shared Memory
- Sync
- 其它基本扩展
- FANN
- GeoIP(*)
- JSON(内置)
- Judy
- Lua
- LuaSandbox
- Misc(核心)
- Parsekit
- SeasLog(-)
- SPL(核心)
- SPL Types(实验性)
- Streams(核心)
- Swoole(*)
- Tidy扩展
- Tokenizer
- URLs(核心)
- V8js(*)
- Yaml
- Yaf
- Yaconf(核心)
- Taint(检测xss字符串等)
- Data Structures
- 其它服务
- 网络(核心)
- cURL(*)
- Event(*)
- chdb
- FAM
- FTP
- Gearman
- Gopher
- Gupnp
- Hyperwave API(过时)
- LDAP(+)
- Memcache
- Memcached(+)
- mqseries
- RRD
- SAM
- ScoutAPM
- SNMP
- Sockets
- SSH2
- Stomp
- SVM
- SVN(试验性的)
- TCP扩展
- Varnish
- YAZ
- YP/NIS
- 0MQ(ZeroMQ、ZMQ)消息系统
- ZooKeeper
- 搜索引擎扩展
- mnoGoSearch
- Solr
- Sphinx
- Swish(实验性)
- 针对服务器的扩展
- Apache
- FastCGI 进程管理器
- IIS
- NSAPI
- Session 扩展
- Msession
- Sessions
- Session PgSQL
- 文本处理
- BBCode
- CommonMark(markdown解析)
- Parle
- PCRE( 核心)
- POSIX Regex
- ssdeep
- 字符串(核心)
- 变量与类型相关扩展
- 数组(核心)
- 类/对象(核心)
- Classkit(未维护)
- Ctype
- Filter扩展
- 函数处理(核心)
- quickhash扩展
- 反射扩展(核心)
- Variable handling(核心)
- Web 服务
- OAuth
- SCA(实验性)
- SOAP
- Yar
- XML-RPC(实验性)
- Windows 专用扩展
- COM
- win32ps
- win32service
- XML 操作
- DOM(内置,默认开启)
- libxml(内置 默认开启)
- SDO(停止维护)
- SDO-DAS-Relational(试验性的)
- SDO DAS XML
- SimpleXML(内置,5.12+默认开启)
- WDDX
- XMLDiff
- XML 解析器(Expat 解析器 默认开启)
- XMLReader(5.1+内置默认开启)
- XMLWriter(5.1+内置默认开启)
- XSL(内置)
- 图形用户界面(GUI) 扩展
- UI
- 预定义类
- PHP SPL(PHP 标准库)
- 数据结构
- SplDoublyLinkedList(双向链表)
- SplStack(栈 先进后出)
- SplQueue(队列)
- SplHeap(堆)
- SplMaxHeap(最大堆)
- SplMinHeap(最小堆)
- SplPriorityQueue(堆之优先队列)
- SplFixedArray(阵列【数组】)
- SplObjectStorage(映射【对象存储】)
- 迭代器
- DirectoryIterator类
- 文件处理
- SplFileInfo
- SplFileObject
- SplTempFileObject
- 接口 interface
- Countable
- OuterIterator
- RecursiveIterator
- SeekableIterator
- 异常
- 各种类及接口
- SplSubject
- SplObserver
- ArrayObject(将数组作为对象操作)
- SPL 函数
- 预定义接口
- Traversable(遍历)接口
- Iterator(迭代器)接口
- IteratorAggregate(聚合式迭代器)接口
- ArrayAccess(数组式访问)接口
- Serializable 序列化接口
- JsonSerializable
- Closure 匿名函数(闭包)类
- Generator生成器类
- 生成器(php5.5+)
- 反射
- 一、反射(reflection)类
- 二、Reflector 接口
- ReflectionClass 类报告了一个类的有关信息。
- ReflectionFunctionAbstract
- ReflectionParameter 获取函数或方法参数的相关信息
- ReflectionProperty 类报告了类的属性的相关信息。
- ReflectionClassConstant类报告有关类常量的信息。
- ReflectionZendExtension 类返回Zend扩展相关信息
- ReflectionExtension 报告了一个扩展(extension)的有关信息。
- 三、ReflectionGenerator类用于获取生成器的信息
- 四、ReflectionType 类用于获取函数、类方法的参数或者返回值的类型。
- 五、反射的应用场景
- git
- Git代码同时上传到GitHub和Gitee(码云)
- Git - 多人协同开发利器,团队协作流程规范与注意事项
- 删除远程仓库的文件
- 创建composer项目
- composer安装及设置
- composer自动加载讲解
- phpsdudy的composer操作
- swoole笔记
- 安装及常用Cli操作
- TCP
- 4种回调函数的写法
- phpRedis
- API
- API详细
- redis DB 概念:
- 通用命令:rawCommand
- Connection
- Server
- List
- Set
- Zset
- Hash
- string
- Keys
- 事物
- 发布订阅
- 流streams
- Geocoding 地理位置
- lua脚本
- Introspection 自我检测
- biMap
- 原生
- php-redis 操作类 封装
- redis 队列解决秒杀解决超卖:
- Linux
- Centos8(Liunx) 中安装PHP7.4 的三种方法和删除它的三种方法
- 权限设计
- ACL
- RBAC
- RBAC0
- RBAC1
- RBAC2
- RBAC3
- 例子
- ABAC 基于属性的访问控制
- 总结:SAAS后台权限设计案例分析
- casbin-权限管理框架
- 开始使用
- casbinAPI
- Think-Casbin
- 单点登录(SSO)
- OAuth授权
- OAuth 2.0 的四种方式
- 更新令牌
- 例子:第三方登录
- 微服务架构下的统一身份认证和授权
- 杂项
- SSL证书
- sublime Emmet的快捷语法
- 免费翻译接口
- 免费空间
- xss过滤
- HTML Purifier文档
- xss例子
- 实用小函数
- PHP操作Excel
- 架构师必须知道的26项PHP安全实践
- 模版布局
- smarty模版
- blade
- twig
- 大佬博客
- 优化
- 缓存
- opcache
- memcache
- 数据库
- 主从分布
- 数据库设计
- 笔记
- 配置
- nginx 主从配置
- nginx 负载均衡的配置
- 手动搭建Redis集群和MySQL主从同步(非Docker)
- Redis Cluster集群
- mysql主从同步
- 用安卓手机搭建 web 服务器
- 软件选择
- 扩展库列表
- 代码审计
- 漏洞挖掘的思路
- 命令注入
- 代码注入
- XSS 反射型漏洞
- XSS 存储型漏洞
- 本地包含与远程包含
- sql注入
- 函数
- 注释
- 步骤
- information_schema
- sql注入的分类
- 实战
- 防御
- CSRF 跨站请求伪造
- 计动态函数执行与匿名函数执行
- unserialize反序列化漏洞
- 覆盖变量漏洞
- 文件管理漏洞
- 文件上传漏洞
- 跳过登录
- URL编码对照表
- 浏览器插件开发
- 插件推荐
- 扩展文件manifest.json
- 不可视的background(常驻)页面
- 可视页面browser actions与page actions及八种展示方式
- 使用chrome.xxx API
- Google Chrome扩展与Web页面/服务器之间的交互
- Google Chrome扩展中的页面之间的数据通信
- inject-script
- chromeAPI
- pageAction
- alarms
- chrome.tabs
- chrome.runtime
- chrome.webRequest
- chrome.window
- chrome.storage
- chrome.contextMenus
- chrome.devtools
- chrome.extension
- 分类
- homepage_url 开发者或者插件主页
- 5种类型的JS对比及消息通信
- 其它补充
- 前端、移动端
- html5
- meta标签
- flex布局
- javascript
- 获取js对象所有方法
- dom加载
- ES6函数写法
- ES6中如何导入和导出模块
- 数组的 交集 差集 补集 并集
- bootstrap
- class速查
- 常见data属性
- 开源项目
- 会员 数据库表设计
- 程序执行
- 开发总结
- API接口
- API接口设计
- json转化
- app接口
