bruh use HTTP_CF_CONNECTING_IP instead of REMOTE_ADDR when there's a proxy attached, that is what causes the error.
that is so shit coded compared to the default now by FindRetros
that is so shit code compared to the default by FindRetros
Sent from my SM-G928F using Tapatalk
I must say after getting a little bit adapted to the new theme, I decided to see how it looked on mobile, and I must say it looks pretty amazing.
https://imgur.com/gallery/mVXDg
Mostly every solution to something can be found if you bothered to Google it, or just a quick example use Stackoverflow and search for mac rewriting
Sent from my SM-G928F using Tapatalk
header() && exit(); should be replaced with "$this->get('index');"
Sent from my SM-G928F using Tapatalk
Did it work for you?
Sent from my SM-G928F using Tapatalk
RevCMS? Go to class.html.php, and then where it says if($file != null) add an else statement where it gets the index page like the rest of the code gets a page.
I'm on mobile rn so cant really describe it any further.
Sent from my SM-G928F using Tapatalk
I'm not saying that you don't know what the hell you're doing, obviously I do know that you know how to configure a server correctly, all I am saying is for the sake of the discussion, that by rookies many mistakes are made when it comes to proxies and server configuration :D
You asked for reverse proxy vulnerabilities, here you got one:
https://www.rapid7.com/db/modules/auxiliary/scanner/http/rewrite_proxy_bypass
Apache Reverse Proxy Bypass Vulnerability Scanner
Scan for poorly configured reverse proxy servers. By default, this module attempts to force the server...
I know, but well you pretty much changed subject by writing this below, but well all that I am saying, is that it is possible, and neither is a proxy for any good, but well that's just a matter of taste in this case, because a proxy pretty much makes your website slower and less secure anyway...
You do realize there's a metasploit program, that is made specifically for what you've just written right?
Easily done, install Beef, lets say the user is running a Chrome Browser, or you know his g-mail and which bank he has, then you can easily fake an e-mail which looks trustworthy, they...
Yeah, I do know how Tor works, I just made a statement, that nothing is actually anonymous in the end. Yeah for the "ping" command, yes, but you ever played with Kali Linux? That OS can do some pretty imaginary things.
You can ping the IP and receive all incoming/outgoing connections in Kali Linux, and for that the IP that is shown most is obviously the server IP, since thats the IP where all traffic gets redirected to. How do you think FBI etc finds onion sites and people behind a proxy? And for firewall...
I just never understood why anyone would bother buy or get a proxy for free, when all they do is slow down your server. A proxy is just as big of a scam as "DDoS Protection" services. They literally do nothing.
Sent from my SM-G928F using Tapatalk
Good idea, but proxies are shit if not used for an anonymous machine or website.
If your proxy goes down, so does your website, and proxies are way less secure too. Simply use Bitninja, who cares about getting an IP anonymous if your firewall is good enough.
That is just plain stupid. If you got a 100 user base, that will be a 100 curls within few seconds, instead of caching it / save the image in a folder, so you don't have to overkill the curl totally, and then automatically next time if the user has changed figure, you just delete the old one...
Easier just to make a join tables query, instead of doing different 2 queries.
fetchAll then a foreach, you're not even executing the query? Normally you would do a $stmt->execute and then a foreach($stmt as $blabla){ } damn you're making this way more complicated than it actually is. But I feel...