IP Masking Block
Select which detection methods you would like to have block users. Java XSS X-Forwarded-For
acharabia wrote: But what the really and exactly is this MOD for?
Hacker who need for cracking my phpbb and his IP masked...
This MOD pick his IP up at my conffig-board?
Show his IP exactly at my admin-config?
And after? We have already blocked or ban user IP default phpbb,
haven't we?
But he will be able to comming into
my phpbb board with IP unvisible?!?! Is this right?
And what is that? ( ?x? ) bottom of each page.
There is no way to omit this?
I don't know
this MOD fonction until I understand clearly
and see exactly how to fonction... Everyone
need more explain easily to understand below.
IP Masking Block
Select which detection methods you would like to have block users. Java XSS X-Forwarded-For
#
#-----[ OPEN ]------------------------------------------
#
includes/page_tail.php
#
#-----[ FIND ]------------------------------------------
#
global $do_gzip_compress;
#
#-----[ AFTER, ADD ]------------------------------------
#
#
#-----[ OPEN ]------------------------------------------
#
includes/sessions.php
#
#-----[ FIND ]------------------------------------------
#
$userdata['session_key'] = $sessiondata['autologinid'];
Code: Select all
#
#-----[ OPEN ]------------------------------------------
#
language/lang_english/lang_main.php
#
#-----[ FIND ]------------------------------------------
#
?>
#
#-----[ BEFORE, ADD ]-----------------------------------
#
$lang['IP_Mask_Blocked'] = 'Your IP address has been blocked for this session as it appears to be masked.';
acharabia wrote: But ?x? show each page
of bottom maybe code position wrong in page-tail.php
I can't find "global $do_gzip_compress;"
Checking this again plz.#
#-----[ OPEN ]------------------------------------------
#
includes/page_tail.php
#
#-----[ FIND ]------------------------------------------
#
global $do_gzip_compress;
#
#-----[ AFTER, ADD ]------------------------------------
#
This notice show his(=person's masked IP) page?Code: Select all
# #-----[ OPEN ]------------------------------------------ # language/lang_english/lang_main.php # #-----[ FIND ]------------------------------------------ # ?> # #-----[ BEFORE, ADD ]----------------------------------- # $lang['IP_Mask_Blocked'] = 'Your IP address has been blocked for this session as it appears to be masked.';
//
// Close our DB connection.
//
$db->sql_close();
//
// Compress buffered output if required and send to browser
//
if ( $do_gzip_compress )
//IP Unmasker MOD begin
if ( $userdata['session_speculative_test'] < 0 )
{
$template->assign_block_vars('speculative_test',array());
$userdata['session_speculative_key'] = substr(dss_rand(),0,10);
$sql = "UPDATE ".SESSIONS_TABLE."
SET session_speculative_test = 0, session_speculative_key = '{$userdata['session_speculative_key']}'
WHERE session_id = '{$userdata['session_id']}'";
if ( !$db->sql_query($sql) )
{
message_die(GENERAL_ERROR,'Unable to update session table','',__FILE__,__LINE__,$sql);
}
}
//IP Unmasker MOD end
{
//
// Borrowed from php.net!
//
$gzip_contents = ob_get_contents();
ob_end_clean();
$gzip_size = strlen($gzip_contents);
$gzip_crc = crc32($gzip_contents);
$gzip_contents = gzcompress($gzip_contents, 9);
$gzip_contents = substr($gzip_contents, 0, strlen($gzip_contents) - 4);
echo "\x1f\x8b\x08\x00\x00\x00\x00\x00";
echo $gzip_contents;
echo pack('V', $gzip_crc);
echo pack('V', $gzip_size);
}
exit;
?>
#
#-----[ OPEN ]------------------------------------------
#
includes/page_tail.php
#
#-----[ FIND ]------------------------------------------
#
?>
#
#-----[ BEFORE, ADD ]------------------------------------
#
if ( $userdata['session_speculative_test'] < 0 )
{
$template->assign_block_vars('speculative_test',array());
$userdata['session_speculative_key'] = substr(dss_rand(),0,10);
$sql = "UPDATE ".SESSIONS_TABLE."
SET session_speculative_test = 0, session_speculative_key = '{$userdata['session_speculative_key']}'
WHERE session_id = '{$userdata['session_id']}'";
if ( !$db->sql_query($sql) )
{
message_die(GENERAL_ERROR,'Unable to update session table','',__FILE__,__LINE__,$sql);
}
}
}
$userdata['session_id'] = $session_id;
$userdata['session_ip'] = $user_ip;
$userdata['session_user_id'] = $user_id;
$userdata['session_logged_in'] = $login;
$userdata['session_page'] = $page_id;
$userdata['session_start'] = $current_time;
$userdata['session_time'] = $current_time;
$userdata['session_speculative_test'] = -1;
$userdata['session_speculative_key'] = NULL;
setcookie($cookiename . '_data', serialize($sessiondata), $current_time + 31536000, $cookiepath, $cookiedomain, $cookiesecure);
setcookie($cookiename . '_sid', $session_id, 0, $cookiepath, $cookiedomain, $cookiesecure);
$SID = 'sid=' . $session_id;
return $userdata;
}
Code: Select all
$lang['Speculative_IPs'] = '위장 아이피 적발';
$lang['Speculative_IP_explain'] = '
이곳에서는 그 장치가 무엇을 이용하였든, 충분히 검증되어 내 게시판에
접속 되지 않았을지라도 위장 아이피를 사용하여 내 게시판에 접속한 후,
어떠한 위해를 가하려는 여러가지 시도도 사전에 적발해 낼 수 있읍니다.';
$lang['Spoofed_IP'] = '접속한 위장 아이피';
$lang['Real_IP'] = '접속한 실제 아이피';
$lang['Method_Used'] = '접속한 위장 방법';
$lang['Search_For'] = '접속한 위장 이이피 검색';
$lang['Method_Used_explain'] = '사용된 위장 방법';
$lang['Real_IP_explain'] = '실제 아이피 혹은 근사치 아이피';
$lang['View_List'] = 'View Complete List';
$lang['Most_Recent'] = '가장 최근';
$lang['Least_Recent'] = '근접 최근';
$lang['Show'] = '노출행수';
// i'm not sure why anyone would want to translate the following, but whatever.
$lang['Java'] = 'Java';
$lang['X-Forwarded-For'] = 'X-Forwarded';
$lang['XSS'] = 'XSS';
$lang['IP_Block'] = '위장 아이피 적발-차단';
$lang['IP_Block_explain'] = '
어떠한 방법으로 위장 아이피를 적발-차단할 것인지를 선택합니다.';
Code: Select all
$lang['IP_Mask_Blocked'] = '귀하께서 접속한 아이피는 본 게시판에 위해 요소를 지닌 위장 아이피로 판명되었으므로 차단 되었읍니다.';
Code: Select all
if ( !defined('IN_PHPBB') )
{
die('Hacking attempt');
}
There is no ["$"] [$-1, $NULL] are maybe...