Jump to content
Nytro

State of the Art Post Exploitation in Hardened PHP Environments

Recommended Posts

State of the Art Post Exploitation in Hardened PHP Environments

Author: Stefan Esser

Abstract

In this paper we discuss the different protections an attacker faces in hardened PHP environments,

after he succeeded in executing arbitrary PHP code. We introduce new techniques

to overcome most of them by the use of local PHP exploits. We demonstrate how info leak and

memory corruption vulnerabilities can be combined to enable PHP applications to read and

write arbitrary memory. We will show step by step how important memory structures can be

leaked and manipulated in order to deactivate or overcome protections.

Download:

http://www.exploit-db.com/download_pdf/15955

Mai tehnic decat articolele "clasice".

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...