![]() ![]() ![]() In this example we will use PHP to generate the image, MySQL to store the key value pairs, and Flash to display the content. The Flash merely serves up content and never knows what the ‘answer’ is. The only way to ensure the Flash form is being used is to pull the logic out of the view and onto the server. They could then completely bypass your view and submit the form as many times as they want. All the hacker would need to do is submit the form correctly one time and use a program like Firebug to sniff the submission URL. While this may be a good filter at the view level it still does not solve our problem. ![]() What if we have a user drag a circle onto a box? A spider would have a pretty hard time with that, right? WRONG. How can you be sure your form was submitted through Flash?Ī CAPTCHA or Captcha is a type of challenge-response test used in computing to ensure that the response is not generated by a computer. Spiders may not be able to easily iterate through your Flash content but they can sure spam your form submission URL. Flash forms are very vulnerable to attacks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |