Warning!: The site is vulnerable to SQLi attacks - if someone wants to, he can rewrite the page as follows:
- Yes, I noticed after the video had been released, that the code I wrote had two errors.
I also recommend adding a captcha for registration, login and display of the full ranking. The site also has an advanced administrator system.
Website (one change - 99% of original files from BombWorkStudio):
Scan:
Layout:
Web server protection against two idiots (Internet terror - DejmieN & Komar1911)
## CHECKING IP, WHICH MAKE THE BIGGEST ATTACKS ##
## CHECKING IPs WHICH MAKE THE BIGGEST ATTACKS AND BLOCKING THEIR ##
Where 500 - is responsible for the number of connections from one ip - after exceeding this number, the bot will be blocked.
## DISPLAYING ALL IP ADDRESSES AND NUMBER OF ATTACKS FROM ANY IP ##
## BLOCKING ENTRIES ON THE WEBSITE + CLOUDFLARE UNLOCKING ##
You enter the IP addresses one by one
## CONFIGURATION jail.local - FAIL2BAN ##
- [apache]
- enabled = true
- filter = apache-auth
- action = iptables-multiport[name=auth, port="http,https"]
- logpath = /var/log/apache2/access.log
- bantime = 9600
- maxretry = 1
- ignoreip = 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17
- [apache-badbots]
- enabled = true
- filter = apache-badbots
- action = iptables-multiport[name=badbots, port="http,https"]
- logpath = /var/log/apache2/access.log
- bantime = 9600
- maxretry = 1
- ignoreip = 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17
- [apache-noscript]
- enabled = true
- filter = apache-noscript
- action = iptables-multiport[name=noscript, port="http,https"]
- logpath = /var/log/apache2/access.log
- bantime = 9600
- maxretry = 1
- ignoreip = 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17
- [apache-overflows]
- enabled = true
- filter = apache-overflows
- action = iptables-multiport[name=overflows, port="http,https"]
- logpath = /var/log/apache2/access.log
- bantime = 9600
- maxretry = 1
- ignoreip = 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17
Where ignoreip is responsible for IP addresses CLOUDFLARE
## BLOCKING EMPTY GETS VIA .htaccess ##