• May 30, 2017

    Methods Spammers Use to Hijack a Form
    1. View-Source & URL submission
    view-source
    From the view source of web pages spammers know the field names as well as form action. Mostly this action page is used to send emails. For example, let’s say the action is set to send_mail.php and the field names are name and email_address. Spammers can easily submit the values through a URL like www.yoursite.com/send_mail.php?name=Jeff&email_address=jeff@gmail.com. They will have an automated program to change the name and email and will keep on submitting the URL and mails are sent.
    2. Page submission
    In this case spammers use their own page to submit the form, and the form action is set to www.yoursite.com/mail.php. This method is used so that the POST validation used in the mail script is over ridden. This process can also be automated.
    3. Manual submission
    Here – spammers manually insert the values and submit the form. This method, however, is rarely used and the solution to block manual submission are limited.
    Methods to Block Spam Leads
    1. Captcha Codecaptcha-code
    Captcha code is one of the best methods used by web masters to avoid spam mail. It is dynamic text, and is generally shown in an image box. With every load / refresh click, the captcha code changes. The user will need to enter the text shown in the image to an adjacent text field. Successful submission can only be made when both the values match in the server side. Captcha code can be integrated easily using PHP Captcha Library. A simple captcha code using icons would be more preferable so as to make it more user- friendly.
    2. Server side validation
    Make sure that all mandatory fields are validated properly In the server side. PHP Filter function can be used to attain this. Java script validation won’t work if it’s disabled from the client browser; so server side validation is a must.
    3. Filter all the Contents
    Filter all the inputs from the form as spammers usually insert script tags or URLs in to form. It’s then mandatory to strip the html tags and characters which are mostly used by spammers such as ‘http://’,’mailto:’,’viagra’ etc.
    4. Use “POST” Method
    Always make the form method to POST (<form method=”post”>) and the mail sending script should check only for POST values and not GET or REQUEST method. This will make sure that URL submission won’t execute the script.
    5. HTTP Referrer
    HTTP Referer will make sure that the request has come from the same domain. Submission of forms from another domain can be blocked using this method.
    6. Blocking IP
    If spamming is done through manual submission, the solution is to block the IP address and for this the htaccess file can be used to implement this.
    7. SQL Injection
    If the form details are saved in to database use mysql_real_escape_string to avoid SQL injection.
    Spam Mail Summary
    All methods mentioned above, either singly or in combination, could insulate you from a host of spam leads that one is confronted with in every day life. These could ultimately turn out to be your bulwark against all unethical practices resorted to by spammers, who as we all know, do create inconveniences for all web masters.
    This post, showcasing the methods adopted by spammers and the counter measured to be initiated, is intended to enlighten every one on the ways and means of making your website more secure and trustworthy. If none of these work, maybe you know where to buy a shot gun? ?



เวอไนน์ไอคอร์ส

ประหยัดเวลากว่า 100 เท่า!






เวอไนน์เว็บไซต์⚡️
สร้างเว็บไซต์ ดูแลเว็บไซต์

Categories


Uncategorized