Exploitation of Attackers' PHP Systems

  • Thursday, February 28, 2013 | 10:40 AM – 11:40 AM | Room: Room 120

View all Sessions

We constantly discuss how attackers get into end machines using various techniques, in this talk we will discuss how end machines could get into attackers' PHP-based infrastructures. We will cover advanced techniques of PHP vulnerability discovery and exploitation, as well as provide real-life examples of known attacker PHP-based infrastructures and new vulnerabilities we have discovered in them.


This document was retrieved from on Sun, 16 Jun 2019 12:40:22 -0400.