Expose is an Intrusion Detection System for PHP loosely based on the PHPIDS project (and using its ruleset for detecting potential threats).
ALL CREDIT for the rule set for Expose goes to the PHPIDS project. Expose literally uses the same JSON configuration for its execution. I am not claiming any kind of ownership or authorship of these rules. Please see the PHPIDS github README for names of those who have contributed.
NOTE: An IDS system should not be relied upon for sole protection in your environment! It should only be used in the first level of threat identification. Please read up on "Defense in Depth" for more information on a layered security approach.
-
Install Composer:
curl -s https://getcomposer.org/installer | php
-
Require Expose as a dependency using Composer:
php composer.phar require enygma/expose
-
Install Expose:
php composer.phar install
<?php
require 'vendor/autoload.php';
$data = array(
'POST' => array(
'test' => 'foo',
'bar' => array(
'baz' => 'quux',
'testing' => '<script>test</script>'
)
)
);
$filters = new \Expose\FilterCollection();
$filters->load();
//instantiate a PSR-3 compatible logger
$logger = new \Expose\Log\Mongo();
$manager = new \Expose\Manager($filters, $logger);
$manager->run($data);
echo 'impact: '.$manager->getImpact()."\n"; // should return 8
// get all matching filter reports
$reports = $manager->getReports();
print_r($reports);
// export out the report in the given format ("text" is default)
echo $manager->export();
echo "\n\n";
Full (current) documentation for Expose can be found here: ReadTheDocs for Expose
If you're curious as to the importance of application-level intrusion detection, check out this article on the OWASP site.
Feel free to contact me with questions or how you can help the project!
@author Chris Cornutt ccornutt@phpdeveloper.org