Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Joomla! Web Security
Joomla! Web Security

Joomla! Web Security: Secure your Joomla! website from common security threats with this easy-to-use guide

eBook
€8.99 €25.99
Paperback
€32.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Joomla! Web Security

Chapter 2. Test and Development

In the previous chapter, we obtained our first glimpse of the ever-present and important settings of php.ini and .htaccess. From what we saw, intrusion detection plays a big part in our server world today, as multiple threats keep arriving almost daily.

So, along with a solid environment, having a testing environment is just as critical to succeed. In this chapter, you will learn how to set up your test and development area. "Why do I need this?" you may ask. Think about a situation where a new extension has been released, but not thoroughly tested, or when you want to add a new feature to your site. Making these changes on a production system could be devastating. If you made a mistake, or the extension caused a conflict, an outage could occur.

With a test environment, you will have a fully functional "copy" of your site, enabling you to test and develop safely. To accomplish this, we will cover the following topics to give you a professional method to have...

Welcome to the Laboratory!


In this section of our book, we will be discussing why and how to set up a test and development environment. It is vitally important to have a safe place to test your upgrades, additions, code fixes, and so on.

Test and Development Environment

The test and development environment is not glamorous; it is mundane and necessary. It is an established mirror site that is usually not public facing. Often, this is done locally on a server you own, an IDE, or an integrated development environment, to allow you to make mistakes, run tests against it, and so on. At other times, you may have this on a shared host. Either way, you want to mirror the production environment completely.

Why do we want to do this? Well, in our Joomla! environment, we will have a mix of technologies at work, all interoperating together. We have PHP, Apache, Linux, AJAX, HTML, third-party extensions, and possibly other types of coding. They should all work together, right?—No, many times they don...

Reporting


No one likes to do paperwork, or provide reporting, as a matter of course. Yet, you, as a website developer, administrator, or an extension provider, will benefit from a host of standardized reports. These make excellent customer deliverables, and as a developer, would show a large amount of value to the client.

Keeping with our example of testing for an SQL injection, let's say that the site patch upgrade you are testing is vulnerable to that particular attack.

Using this tool to create a task is simple:

While creating a task we assign a Start Date and End Date, assign the Priority (in relation to the success of the project as whole), and then assign the resource to test it. In this demonstration, the engineer, John Smith will be testing the SQL injection fix.

As you can see, this would roll up to your dashboard and show you where the project is, keeping it on the track.

One major flaw with many software packages, GNU/GPL, and commercial products for Joomla! is the lack of good documentation...

Using the Ravenswood Joomla! Server


The other tool that you can use to set up a test environment is the stand-alone server environment for Joomla! packaged in GNU form by www.ravenswoodit.co.uk. This tool, which is extremely popular, is a self-contained, MySQL, Apache, Joomla! environment that runs on your Windows Desktop.

As you see in the graphic, the Joomla! site is running on my "localhost", which in this case, is my XP desktop.

The setting up of this is very easy and quick. You launch it by clicking START.BAT; this fires up the Apache, MySQL, and Joomla!. In about a minute, the browser opens and you have a completely self-contained Joomla! site to test and develop on.

You as the developer, have full access to any part of it, allowing you to "clone" out the site when you are done. This tool is HIGHLY recommended for your test environment.

One note of caution: If you are running this on your Windows desktop, STOP the IIS service if running. The instance will generate an error if IIS...

Summary


In this chapter, we learned about setting up a test environment, and how that can impact our security model positively. The highly recommended tools from this chapter include the Lighthouse SDM tool from Artifact Software and the Ravenswood Joomla! Server. As you move into the next chapter, keep in mind the need for good documentation and testing procedures. In our next chapter, we're going to review tools that help us to keep our site safe.

Left arrow icon Right arrow icon

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Oct 15, 2008
Length: 264 pages
Edition :
Language : English
ISBN-13 : 9781847194893
Category :
Tools :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Oct 15, 2008
Length: 264 pages
Edition :
Language : English
ISBN-13 : 9781847194893
Category :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 103.97
Joomla! Web Security
€32.99
Android Application Security Essentials
€36.99
Practical Threat Intelligence and Data-Driven Threat Hunting
€33.99
Total 103.97 Stars icon
Banner background image

Table of Contents

10 Chapters
Let's Get Started Chevron down icon Chevron up icon
Test and Development Chevron down icon Chevron up icon
Tools Chevron down icon Chevron up icon
Vulnerabilities Chevron down icon Chevron up icon
Anatomy of Attacks Chevron down icon Chevron up icon
How the Bad Guys Do It Chevron down icon Chevron up icon
php.ini and .htaccess Chevron down icon Chevron up icon
Log Files Chevron down icon Chevron up icon
SSL for Your Joomla! Site Chevron down icon Chevron up icon
Incident Management Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.6
(5 Ratings)
5 star 80%
4 star 0%
3 star 20%
2 star 0%
1 star 0%
Efthimios Mavrogeorgiadis Jan 30, 2009
Full star icon Full star icon Full star icon Full star icon Full star icon 5
As an administrator of Greece's biggest Joomla! forum over the past three years (forum.joomla.gr), I was always shocked to see how light-heartedly web security was deferred to the Greek Calends not only by young Joomla! enthusiasts who simply wanted to set up their own place on the web but also by website developers who had to get the job finished and delivered to their unaware clients as soon as possible. Then, some day a bug would be discovered in Joomla!'s core code or one of its extensions, sites would be defaced, data would be lost and a long list of messages starting with "HELP!" would appear on our forum. Once a fix was released, the sites were restored, and everything was back in order, interest in web security would drop back to nil until the next server was compromised.No matter whether you are developing your own website, whether somebody else has developed your website for your, or whether you are a professional website administrator that has always been interested in but scared of web security concepts, it's high time you got out of this vicious circle. Tom Canavan's Joomla! Web Security is here to help you do just that: set up a security framework and a work cycle that will help you stand your ground on the web.Actually, I find this book's title a bit misleading as it would make one think that it is all about Joomla! and that it would be completely irrelevant to anybody running a website that is based on Drupal, XOOP or any other of the PHP-based Content Management Systems that are available to the open source community. It is not! Only few of its pages contain information that could be relevant to Joomla! website implementations alone. Most of it is packed with sound advice, useful tips, and business strategies that can be applied to any website that uses PHP on an apache server, i.e. the most popular server configuration on the web today.Joomla! Web Security starts with rudimentary issues such as the criteria you should have in mind when choosing a host for your website, the pros and cons of different hosting plans as far as security is concerned, and how to set up a secure Joomla! website with minimum fuss. If you thought that a test and development environment would only be of interest to PHP application developers, you will have to think again as Tom explains why you should realize that you need one and how you should go about setting it up locally. Once a website is up and running, any administrator with a certain amount of sense in him (or her) would need a set of tools to monitor and manage it. Chapter 3 presents a set of Joomla!-oriented and generic security tools such as JCheck and Nmap that help network and website administrators around the world safeguard their handiwork.Since this book is all about protecting yourselves and the websites you run from outsiders and their eagerness to attack you, getting acquainted with their tricks and tactics is an asset any website administrator could not do without. Having that in mind, it is an advantage to have three chapters of Joomla! Web Security devoted to identifying vulnerabilities, attack analysis and hacking strategies based on real world incidents from the author's experience. Of course, the sixty pages covered by these three chapters can only scratch the surface of a huge topic on which volumes of books have been written. Nevertheless, they constitute a comprehensive though short introduction to the subject of exploits and hacking attacks and should be taken as pointers to further reading.Chapters 7 and 8 tackle the dark arts of fine tuning your .htaccess and php.ini files as well as reading, understanding and acting upon the entries of your log files. It would have been nice if chapter 7, in particular, were a bit more extended as it moves too swiftly from simple notions to complex rules that could baffle the reader. Every .htaccess rule is exemplified satisfactorily but, in compliance with the general practice of publicizing such tricks on various hacking websites around the net, their analysis seems to aim mainly at allowing the reader to copy them successfully and use them in his/her website rather than thoroughly understand what s/he is doing and how s/he is accomplishing it.Finally, the two last chapters cover SSL and its integration into Joomla! as well as how one should react if, despite his or her best efforts, his/her website is compromised. Though these last chapters might seem to be written with corporate working environments in mind, they contain excellent advice that could be adapted and implemented even by small companies or freelancers that want to be able to keep their composure even when they find themselves in dire straights. Joomla! Web Security ends with an appendix that summarizes and acts as a reference to a lot of the information found in the book.All in all, Tom Canavan's Joomla! Web Security is a must-read for all Joomla! (and non-Joomla!) website administrators that are (or, rather, should be) concerned about the security of their website and the data stored therein. Those readers that had never before considered the security problems raised by their decision to publish a site on the web will find that the book offers them solid ground on which to start building their website defenses against intruders. On the other hand, experienced website administrators could use this book as a collection of security must-dos that they should go through each time they build or start managing a website.
Amazon Verified review Amazon
Scott L. Wolpow Jan 18, 2009
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I am a member of the New York Joomla group and a just love Joomla.This is "a must" read book for all people that care about the security of a website. The book offers an excellent primer on basic web-security. It is written for the person who has not yet mastered the skills needed to properly secure a website.For the Joomla user it covers many issues specific to the Joomla versions 1.0.x and 1.5.x. The book is written in simple language so that a non-tech person can understand the concepts. As a skilled and experienced Joomla user and host provider, I found many tips that can help me in monitoring the security of systems I administer.The coverage of tools available and the appendix is alone worth the price alone.Too often server and site security is not appreciated. Because of the simplicity of setting up a website, it is often assumed that everything is secure. That is not the case and the person managing a website needs to know what to look for. The coverage of the less obvious of security issues when two secure extensions cause a breach is excellent.Again I would make this required reading for any person running Joomla.
Amazon Verified review Amazon
V Thomas Dec 10, 2008
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Sometimes, I think web developers who use Joomla! mistakenly believe that all security measures are built into the Joomla code. While perhaps partially true, adequate security is based actions of at least 3 different groups: The Joomla! development team, the web host, and the web developer who decides to use Joomla! and the decisions they make in setting up and using Joomla! This book does a really great job to educate the web developer about these roles and steps they can take, and really should make standard, in developing any/all Joomla! sites.Joomla! Web Security is rich with tasks to organize and protect Joomla! sites. I found it very useful, and I am still learning from this book. While I have very good html/css skills and OK php skills, I knew little about server administration when I started reading this book, yet the author's writing style made learning these new skills very easy. He also frequently refers readers to valuable web sites that offer additional information.The list of tasks and ideas from this book to apply to your Joomla! site(s) is too long to try to outline here, but I will tell you 5 things that I already have used to increase security of my site:1. Confirmed that I do have the right web host for my Joomla! sites (and confirmed that I do not want to use my second host, ever, for Joomla! sites). This ALONE is worth the cost of the book! For those of us that don't want to learn all that much about servers ourselves ... the choice of your web host is CRITICAL.2. Learned how to read my log files and ways to use my htaccess file to further protect my site.3. Added an extra level of protection by password-protecting my administration folder.4. Checked my extensions against joomla.org's Vulnerability List, and removed some/updated others. The current url for this is: docs.joomla.org/Vulnerable_Extensions_List5. I now understand and follow advice to protect my website from CSFR. Aha!...if you don't know what this means, you need to read the book! (CSFR = Cross-Site Request Forgery). CSRF is a real threat to your Joomla! site, and knowing and using good practices will greatly reduce this threat.The author provides a nice explanation as to how hackers exploit sites, which certainly explains the rationale for the many suggestions he provides for better security. He also gives very practical tips for testing/developing your site and having a useful disaster recovery plan.If you are being paid to develop Joomla! sites, then in my opinion do make sure you are knowledgeable about ways to secure the site for your clients. This book is a GREAT place to learn about Joomla! web security.
Amazon Verified review Amazon
Razvan-Teodor Coloja Jan 16, 2009
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I got the book a few weeks ago. For a Joomla! newbie the book gives some pretty cool advice. I liked the fact that it not only discusses Joomla! but also how to choose and secure the server it is hosted on.From php.ini to .htaccess to fighting SQL injections, this book has it all. And it's a nice read too. I liked Tom Canavan's writing style. For a technical book, this is really entertaining.
Amazon Verified review Amazon
BernardZ Dec 13, 2009
Full star icon Full star icon Full star icon Empty star icon Empty star icon 3
I had commissioned a Joolma website and thought the writer had made it secure. After it was hacked and doing some research, I discovered that he had done little to make it secure.So I got a copy of this book. After reading it, I confess that I am disappointed.Halfway though I was just about to throw it out. But lucky I stuck though it as it got much better towards the end. There are some good point and some interesting software discussed.Overall there is little useful. If you are a novice there is little you can use as it does not explain step by step how to do it, if you are an expert there is little new. For an experienced hacker it might be useful as it does review some software that could be useful.I will use it as an occasional reference but that is all.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.