Nytro Posted January 11, 2011 Report Posted January 11, 2011 State of the Art Post Exploitation in Hardened PHP EnvironmentsAuthor: Stefan EsserAbstractIn this paper we discuss the different protections an attacker faces in hardened PHP environments,after he succeeded in executing arbitrary PHP code. We introduce new techniquesto overcome most of them by the use of local PHP exploits. We demonstrate how info leak andmemory corruption vulnerabilities can be combined to enable PHP applications to read andwrite arbitrary memory. We will show step by step how important memory structures can beleaked and manipulated in order to deactivate or overcome protections.Download:http://www.exploit-db.com/download_pdf/15955Mai tehnic decat articolele "clasice". Quote
michee Posted January 20, 2011 Report Posted January 20, 2011 ok, a inteles cineva tot articolul asta? L-am inteles si eu in mare, dar as avea cateva nelamuriri.......daca se poate sa m-ajute careva.....Mersi1 Quote