Bitcoin Forum
November 17, 2024, 09:34:14 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Is my bitcoin site susceptible to attacks?  (Read 711 times)
mcplums (OP)
Full Member
***
Offline Offline

Activity: 146
Merit: 100


View Profile
July 12, 2015, 02:21:40 PM
 #1

I'm creating a bitcoin site which automatically pays out bitcoin under certain circumstances. My plan is to have a php page which accepts data via POST and if the received data is correct it will pay out bitcoins.

I am wondering whether this is safe? The data sent over POST contains all the information required to send bitcoins. Is it possible for some '1337 haxor' to sniff out POST data?

If so, what about if the page that sends data via POST- and the page that receives data via POST- are both hidden behind a logon. I.e. the entire contents of both pages are hidden within a if($login->isUserLoggedIn() == true) statement- is this enough? Or is it trivial to get around this too?

Thanks chaps
mcplums (OP)
Full Member
***
Offline Offline

Activity: 146
Merit: 100


View Profile
July 12, 2015, 02:54:13 PM
 #2

This has been answered elsewhere. The answer was https!
coinableS
Legendary
*
Offline Offline

Activity: 1442
Merit: 1186



View Profile WWW
July 13, 2015, 12:15:54 AM
 #3

Quote
Is it possible for some '1337 haxor' to sniff out POST data?

Be careful with sending sensitive information as POST data with PHP. A user can use a breakpoint like with Charles Proxy to examine and even edit POST data.

http://www.tinywall.info/2014/04/how-to-edit-request-response-hack-tamper-website-any-browser-from-PC-with-Charles.html
http://www.charlesproxy.com/documentation/proxying/breakpoints/

Here's a lesson I learned when launching a BTC game and using POST data instead of a DB to communicate important information.
https://bitcointalk.org/index.php?topic=794468.msg8959853#msg8959853


cloverme
Legendary
*
Offline Offline

Activity: 1512
Merit: 1057


SpacePirate.io


View Profile WWW
July 14, 2015, 02:55:02 AM
 #4

This has been answered elsewhere. The answer was https!

Not all woes are solved by https for making a site secure.

Development guide for secure web apps:  https://github.com/OWASP/DevGuide
Infrastructure scanning: https://www.qualys.com

-Consider where you're hosted, look for a hosting provider that has met NIST, PCI, FINRA, HIPPA or other certifications. No one should be able to call them and social engineer access.

-Review security on your domain. Make sure no one can transfer your domain or call them up and social engineer a transfer or DNS controls.

-Your database should be encrypted in transmit (when you're accessing it) and at rest (when it's offline)

-Enforce strong passwords and multifactor authentication for access, especially for administrative functions.

-Use logging for access for your systems and for your application (add/moves/changes)

-If you use encryption algorithms in your application, avoid SHA1, DES, and MD5. Use key lengths greater than 1024 bits.
-Don't store private keys on the same system or in code. You should make them non-exportable.

Look for other resources to help you develop a secure system and application.


S4VV4S
Hero Member
*****
Offline Offline

Activity: 1582
Merit: 502


View Profile
July 14, 2015, 09:10:51 AM
 #5

Quote
Is it possible for some '1337 haxor' to sniff out POST data?

Be careful with sending sensitive information as POST data with PHP. A user can use a breakpoint like with Charles Proxy to examine and even edit POST data.

http://www.tinywall.info/2014/04/how-to-edit-request-response-hack-tamper-website-any-browser-from-PC-with-Charles.html
http://www.charlesproxy.com/documentation/proxying/breakpoints/

Here's a lesson I learned when launching a BTC game and using POST data instead of a DB to communicate important information.
https://bitcointalk.org/index.php?topic=794468.msg8959853#msg8959853



Thanks for posting that.
I didn't know about Charles web debugging proxy.
Now I know Smiley
meadefreling
Full Member
***
Offline Offline

Activity: 210
Merit: 100

★YoBit.Net★ 350+ Coins Exchange & Dice


View Profile
July 14, 2015, 10:11:20 AM
 #6

Quote
Is it possible for some '1337 haxor' to sniff out POST data?

Be careful with sending sensitive information as POST data with PHP. A user can use a breakpoint like with Charles Proxy to examine and even edit POST data.

http://www.tinywall.info/2014/04/how-to-edit-request-response-hack-tamper-website-any-browser-from-PC-with-Charles.html
http://www.charlesproxy.com/documentation/proxying/breakpoints/

Here's a lesson I learned when launching a BTC game and using POST data instead of a DB to communicate important information.
https://bitcointalk.org/index.php?topic=794468.msg8959853#msg8959853


When you battle with the above post of coinableS, you should take this 2 thread into considerations also https://bitcointalk.org/index.php?topic=1121072.0 and https://bitcointalk.org/index.php?topic=880995.0
They are really good when used positively but their negative usage could make someone to bleed.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!