Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Joomla! Web Security
Joomla! Web Security

Joomla! Web Security: Secure your Joomla! website from common security threats with this easy-to-use guide

eBook
€8.99 €25.99
Paperback
€32.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. €18.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

Joomla! Web Security

Chapter 2. Test and Development

In the previous chapter, we obtained our first glimpse of the ever-present and important settings of php.ini and .htaccess. From what we saw, intrusion detection plays a big part in our server world today, as multiple threats keep arriving almost daily.

So, along with a solid environment, having a testing environment is just as critical to succeed. In this chapter, you will learn how to set up your test and development area. "Why do I need this?" you may ask. Think about a situation where a new extension has been released, but not thoroughly tested, or when you want to add a new feature to your site. Making these changes on a production system could be devastating. If you made a mistake, or the extension caused a conflict, an outage could occur.

With a test environment, you will have a fully functional "copy" of your site, enabling you to test and develop safely. To accomplish this, we will cover the following topics to give you a professional method to have...

Welcome to the Laboratory!


In this section of our book, we will be discussing why and how to set up a test and development environment. It is vitally important to have a safe place to test your upgrades, additions, code fixes, and so on.

Test and Development Environment

The test and development environment is not glamorous; it is mundane and necessary. It is an established mirror site that is usually not public facing. Often, this is done locally on a server you own, an IDE, or an integrated development environment, to allow you to make mistakes, run tests against it, and so on. At other times, you may have this on a shared host. Either way, you want to mirror the production environment completely.

Why do we want to do this? Well, in our Joomla! environment, we will have a mix of technologies at work, all interoperating together. We have PHP, Apache, Linux, AJAX, HTML, third-party extensions, and possibly other types of coding. They should all work together, right?—No, many times they don...

Reporting


No one likes to do paperwork, or provide reporting, as a matter of course. Yet, you, as a website developer, administrator, or an extension provider, will benefit from a host of standardized reports. These make excellent customer deliverables, and as a developer, would show a large amount of value to the client.

Keeping with our example of testing for an SQL injection, let's say that the site patch upgrade you are testing is vulnerable to that particular attack.

Using this tool to create a task is simple:

While creating a task we assign a Start Date and End Date, assign the Priority (in relation to the success of the project as whole), and then assign the resource to test it. In this demonstration, the engineer, John Smith will be testing the SQL injection fix.

As you can see, this would roll up to your dashboard and show you where the project is, keeping it on the track.

One major flaw with many software packages, GNU/GPL, and commercial products for Joomla! is the lack of good documentation...

Using the Ravenswood Joomla! Server


The other tool that you can use to set up a test environment is the stand-alone server environment for Joomla! packaged in GNU form by www.ravenswoodit.co.uk. This tool, which is extremely popular, is a self-contained, MySQL, Apache, Joomla! environment that runs on your Windows Desktop.

As you see in the graphic, the Joomla! site is running on my "localhost", which in this case, is my XP desktop.

The setting up of this is very easy and quick. You launch it by clicking START.BAT; this fires up the Apache, MySQL, and Joomla!. In about a minute, the browser opens and you have a completely self-contained Joomla! site to test and develop on.

You as the developer, have full access to any part of it, allowing you to "clone" out the site when you are done. This tool is HIGHLY recommended for your test environment.

One note of caution: If you are running this on your Windows desktop, STOP the IIS service if running. The instance will generate an error if IIS...

Summary


In this chapter, we learned about setting up a test environment, and how that can impact our security model positively. The highly recommended tools from this chapter include the Lighthouse SDM tool from Artifact Software and the Ravenswood Joomla! Server. As you move into the next chapter, keep in mind the need for good documentation and testing procedures. In our next chapter, we're going to review tools that help us to keep our site safe.

Left arrow icon Right arrow icon

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Oct 15, 2008
Length: 264 pages
Edition :
Language : English
ISBN-13 : 9781847194886
Category :
Tools :

What do you get with a Packt Subscription?

Free for first 7 days. €18.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Oct 15, 2008
Length: 264 pages
Edition :
Language : English
ISBN-13 : 9781847194886
Category :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 103.97
Joomla! Web Security
€32.99
Android Application Security Essentials
€36.99
Practical Threat Intelligence and Data-Driven Threat Hunting
€33.99
Total 103.97 Stars icon
Banner background image

Table of Contents

10 Chapters
Let's Get Started Chevron down icon Chevron up icon
Test and Development Chevron down icon Chevron up icon
Tools Chevron down icon Chevron up icon
Vulnerabilities Chevron down icon Chevron up icon
Anatomy of Attacks Chevron down icon Chevron up icon
How the Bad Guys Do It Chevron down icon Chevron up icon
php.ini and .htaccess Chevron down icon Chevron up icon
Log Files Chevron down icon Chevron up icon
SSL for Your Joomla! Site Chevron down icon Chevron up icon
Incident Management Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.6
(5 Ratings)
5 star 80%
4 star 0%
3 star 20%
2 star 0%
1 star 0%
Efthimios Mavrogeorgiadis Jan 30, 2009
Full star icon Full star icon Full star icon Full star icon Full star icon 5
As an administrator of Greece's biggest Joomla! forum over the past three years (forum.joomla.gr), I was always shocked to see how light-heartedly web security was deferred to the Greek Calends not only by young Joomla! enthusiasts who simply wanted to set up their own place on the web but also by website developers who had to get the job finished and delivered to their unaware clients as soon as possible. Then, some day a bug would be discovered in Joomla!'s core code or one of its extensions, sites would be defaced, data would be lost and a long list of messages starting with "HELP!" would appear on our forum. Once a fix was released, the sites were restored, and everything was back in order, interest in web security would drop back to nil until the next server was compromised.No matter whether you are developing your own website, whether somebody else has developed your website for your, or whether you are a professional website administrator that has always been interested in but scared of web security concepts, it's high time you got out of this vicious circle. Tom Canavan's Joomla! Web Security is here to help you do just that: set up a security framework and a work cycle that will help you stand your ground on the web.Actually, I find this book's title a bit misleading as it would make one think that it is all about Joomla! and that it would be completely irrelevant to anybody running a website that is based on Drupal, XOOP or any other of the PHP-based Content Management Systems that are available to the open source community. It is not! Only few of its pages contain information that could be relevant to Joomla! website implementations alone. Most of it is packed with sound advice, useful tips, and business strategies that can be applied to any website that uses PHP on an apache server, i.e. the most popular server configuration on the web today.Joomla! Web Security starts with rudimentary issues such as the criteria you should have in mind when choosing a host for your website, the pros and cons of different hosting plans as far as security is concerned, and how to set up a secure Joomla! website with minimum fuss. If you thought that a test and development environment would only be of interest to PHP application developers, you will have to think again as Tom explains why you should realize that you need one and how you should go about setting it up locally. Once a website is up and running, any administrator with a certain amount of sense in him (or her) would need a set of tools to monitor and manage it. Chapter 3 presents a set of Joomla!-oriented and generic security tools such as JCheck and Nmap that help network and website administrators around the world safeguard their handiwork.Since this book is all about protecting yourselves and the websites you run from outsiders and their eagerness to attack you, getting acquainted with their tricks and tactics is an asset any website administrator could not do without. Having that in mind, it is an advantage to have three chapters of Joomla! Web Security devoted to identifying vulnerabilities, attack analysis and hacking strategies based on real world incidents from the author's experience. Of course, the sixty pages covered by these three chapters can only scratch the surface of a huge topic on which volumes of books have been written. Nevertheless, they constitute a comprehensive though short introduction to the subject of exploits and hacking attacks and should be taken as pointers to further reading.Chapters 7 and 8 tackle the dark arts of fine tuning your .htaccess and php.ini files as well as reading, understanding and acting upon the entries of your log files. It would have been nice if chapter 7, in particular, were a bit more extended as it moves too swiftly from simple notions to complex rules that could baffle the reader. Every .htaccess rule is exemplified satisfactorily but, in compliance with the general practice of publicizing such tricks on various hacking websites around the net, their analysis seems to aim mainly at allowing the reader to copy them successfully and use them in his/her website rather than thoroughly understand what s/he is doing and how s/he is accomplishing it.Finally, the two last chapters cover SSL and its integration into Joomla! as well as how one should react if, despite his or her best efforts, his/her website is compromised. Though these last chapters might seem to be written with corporate working environments in mind, they contain excellent advice that could be adapted and implemented even by small companies or freelancers that want to be able to keep their composure even when they find themselves in dire straights. Joomla! Web Security ends with an appendix that summarizes and acts as a reference to a lot of the information found in the book.All in all, Tom Canavan's Joomla! Web Security is a must-read for all Joomla! (and non-Joomla!) website administrators that are (or, rather, should be) concerned about the security of their website and the data stored therein. Those readers that had never before considered the security problems raised by their decision to publish a site on the web will find that the book offers them solid ground on which to start building their website defenses against intruders. On the other hand, experienced website administrators could use this book as a collection of security must-dos that they should go through each time they build or start managing a website.
Amazon Verified review Amazon
Scott L. Wolpow Jan 18, 2009
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I am a member of the New York Joomla group and a just love Joomla.This is "a must" read book for all people that care about the security of a website. The book offers an excellent primer on basic web-security. It is written for the person who has not yet mastered the skills needed to properly secure a website.For the Joomla user it covers many issues specific to the Joomla versions 1.0.x and 1.5.x. The book is written in simple language so that a non-tech person can understand the concepts. As a skilled and experienced Joomla user and host provider, I found many tips that can help me in monitoring the security of systems I administer.The coverage of tools available and the appendix is alone worth the price alone.Too often server and site security is not appreciated. Because of the simplicity of setting up a website, it is often assumed that everything is secure. That is not the case and the person managing a website needs to know what to look for. The coverage of the less obvious of security issues when two secure extensions cause a breach is excellent.Again I would make this required reading for any person running Joomla.
Amazon Verified review Amazon
V Thomas Dec 10, 2008
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Sometimes, I think web developers who use Joomla! mistakenly believe that all security measures are built into the Joomla code. While perhaps partially true, adequate security is based actions of at least 3 different groups: The Joomla! development team, the web host, and the web developer who decides to use Joomla! and the decisions they make in setting up and using Joomla! This book does a really great job to educate the web developer about these roles and steps they can take, and really should make standard, in developing any/all Joomla! sites.Joomla! Web Security is rich with tasks to organize and protect Joomla! sites. I found it very useful, and I am still learning from this book. While I have very good html/css skills and OK php skills, I knew little about server administration when I started reading this book, yet the author's writing style made learning these new skills very easy. He also frequently refers readers to valuable web sites that offer additional information.The list of tasks and ideas from this book to apply to your Joomla! site(s) is too long to try to outline here, but I will tell you 5 things that I already have used to increase security of my site:1. Confirmed that I do have the right web host for my Joomla! sites (and confirmed that I do not want to use my second host, ever, for Joomla! sites). This ALONE is worth the cost of the book! For those of us that don't want to learn all that much about servers ourselves ... the choice of your web host is CRITICAL.2. Learned how to read my log files and ways to use my htaccess file to further protect my site.3. Added an extra level of protection by password-protecting my administration folder.4. Checked my extensions against joomla.org's Vulnerability List, and removed some/updated others. The current url for this is: docs.joomla.org/Vulnerable_Extensions_List5. I now understand and follow advice to protect my website from CSFR. Aha!...if you don't know what this means, you need to read the book! (CSFR = Cross-Site Request Forgery). CSRF is a real threat to your Joomla! site, and knowing and using good practices will greatly reduce this threat.The author provides a nice explanation as to how hackers exploit sites, which certainly explains the rationale for the many suggestions he provides for better security. He also gives very practical tips for testing/developing your site and having a useful disaster recovery plan.If you are being paid to develop Joomla! sites, then in my opinion do make sure you are knowledgeable about ways to secure the site for your clients. This book is a GREAT place to learn about Joomla! web security.
Amazon Verified review Amazon
Razvan-Teodor Coloja Jan 16, 2009
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I got the book a few weeks ago. For a Joomla! newbie the book gives some pretty cool advice. I liked the fact that it not only discusses Joomla! but also how to choose and secure the server it is hosted on.From php.ini to .htaccess to fighting SQL injections, this book has it all. And it's a nice read too. I liked Tom Canavan's writing style. For a technical book, this is really entertaining.
Amazon Verified review Amazon
BernardZ Dec 13, 2009
Full star icon Full star icon Full star icon Empty star icon Empty star icon 3
I had commissioned a Joolma website and thought the writer had made it secure. After it was hacked and doing some research, I discovered that he had done little to make it secure.So I got a copy of this book. After reading it, I confess that I am disappointed.Halfway though I was just about to throw it out. But lucky I stuck though it as it got much better towards the end. There are some good point and some interesting software discussed.Overall there is little useful. If you are a novice there is little you can use as it does not explain step by step how to do it, if you are an expert there is little new. For an experienced hacker it might be useful as it does review some software that could be useful.I will use it as an occasional reference but that is all.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.