bedebah
Apprentice 2.0
Log cpanel:
IP pelaku saya samarken.
akhirnya tembus, si hacker berhasil mendeface situs buatan saya 
lognya ndak cuman itu, ada ratusan baris, mungkin ribuan.
sptnya si hacker menggunaken tool kalo dilihat dari log, betapa banyak yg dia ketik kayaknya ndak mungkin nulis manual.
Saya sudah mengamanken variable2 rawan...
seperti ink.php?what=prod&cats=angka
variable $cats, $id sudah saya filter jadi:
IP pelaku saya samarken.
Code:
111.95.***.** - - [01/Sep/2010:23:33:15 +0700] "GET /link.php?what=prod&cats=-999.9%20UNION%20ALL%20SELECT%200x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536-- HTTP/1.1" 404 - "-" "-"
111.95.***.** - - [01/Sep/2010:23:33:15 +0700] "GET /link.php?what=prod&cats=-999.9%20UNION%20ALL%20SELECT%200x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536-- HTTP/1.1" 404 - "-" "-"
111.95.***.** - - [01/Sep/2010:23:33:15 +0700] "GET /link.php?what=prod&cats=-999.9%20UNION%20ALL%20SELECT%200x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536-- HTTP/1.1" 404 - "-" "-"

lognya ndak cuman itu, ada ratusan baris, mungkin ribuan.
sptnya si hacker menggunaken tool kalo dilihat dari log, betapa banyak yg dia ketik kayaknya ndak mungkin nulis manual.
Saya sudah mengamanken variable2 rawan...
seperti ink.php?what=prod&cats=angka
variable $cats, $id sudah saya filter jadi:
Code:
$cats=abs((int)$_GET['cats']);
$id=abs((int)$_GET['id']);