swayok / laravel-antihack-tool
Active anti-hack protection for Laravel
Requires
- php: >=5.5
- laravel/framework: >=5.3|>=6.0
This package is auto-updated.
Last update: 2024-11-10 08:01:51 UTC
README
This is active anti-hack protection tool that will guard your project from most hack attempts that use HTTP requests. It also contains whitelist and blacklist functionality based on config files or database table contents
Installation
Add "swayok/laravel-antihack-tool": "master-dev"
to your composer.json
into require
section and run composer update
Activation
For Laravale 5.5+
Service provider will be automatically loaded
For Laravel 5.4-
Add LaravelAntihackTool\AntihackServiceProvider
to yor app.providers
config
Add section to your CMF section
Add \LaravelAntihackTool\PeskyCmf\CmfHackAttempts\CmfHackAttemptsScaffoldConfig::class
to your cmf section's config (probably config/admin.php
) into 'resources'
key:
'resources' => [
\LaravelAntihackTool\PeskyCmf\CmfHackAttempts\CmfHackAttemptsScaffoldConfig::class
}
Configuration
-
Run
php artisan vendor:publish --provider=LaravelAntihackTool\AntihackServiceProvider
to publish configuration file -
If you plan to use database to store hack attempts - set
antihack.store_hack_attempts
configuration paramenter totrue
and modifyantihack.connection
andantihack.table_name
configuration paramenters if needed. Then runphp artisan antihack:install
and confirm migration task. On production server you will need to run migration manually usingphp artisan migrate
command. -
If you're using PeskyCmf or PeskyCms - you may need to add a menu item for resource in your
menu()
method of yourAdminConfig
class (or other class that extendsCmfConfig
class). Menu item:static::getMenuItem('hack_attempts')
or your custom one. -
On development server you may need to set
antihack.allow_localhost_ip
totrue
in order to allow requests from127.0.0.1
ip. By default this option is set totrue
forlocal
environment and tofalse
for any other environments. -
I you use any urls that have
.php
extensions - setantihack.allow_php_extension_in_url
totrue
. -
Whitelists and blacklists are generated automatically and cached to your default cache provider. You may change cache key and duration configuration paramenters if you need. Also you may update cache using
php artisan antihack:blacklist
manually. -
There are 2 error templates in this package:
'antihack::errors.406'
(hack detected) and'antihack::errors.423'
(ip or user agent is blacklisted/banned). In Laravel 5.5+ you will need to modify yourApp\Exceptions\Handler
class like this to use them:public function prepareResponse($request, Exception $exception) { if ($exception instanceof \LaravelAntihackTool\Exception\AntihackException) { return response()->view('antihack::errors.' . $exception->getStatusCode()); } return parent::prepareResponse($request, $exception); }