Blog Posts Tagged with "PHP"
March 16, 2012 Added by:Danny Lieberman
February 21, 2012 Added by:Brent Huston
I found a new mutation of a PHP bot infector, with zero percent detection by AV software. When I decoded the PHP backdoor I got 17 AV hits on it. This leads to the question about evasion techniques and how effective anti-virus applications are at doing code de-obfuscation...
February 03, 2012 Added by:Brent Huston
If you find those strings, they usually indicate other PHP scanners, worms or attack tools have compromised the system. Now, if you don’t find those, it does NOT mean the system is safe, the list of all of those relevant strings would be too large and dynamic to manage...
October 20, 2011 Added by:john melvin
This article is not an analysis of the backdoor, but instead describes the methodology and techniques used to decipher malicious code embedded and encoded in a seemingly normal web page. The following is a snippet of the PHP code that caught my attention and began my investigation...
February 25, 2011 Added by:Danny Lieberman
In the course of a security audit/penetration test of a social networking Web site this week that was developed and deployed on Ubuntu, I was reminded yet again that we all have something to learn. Even Linux geeks...
June 14, 2010 Added by:Brent Huston
A large majority of publicly disclosed vulnerabilities are PHP related. In 2009, 5733 PHP Remote File Inclusion vulnerabilities were disclosed. In situations where exploiting PHP RFI is possible, most likely SQL Injection and Cross Site Scripting are all possible. This is due to the exploits having the same root cause or lacking input validation.
Today's Mobile Device Data Protection Must G... Anna Maria on 09-29-2014
Defining Success for Information Security Th... Michael Thibodeaux on 09-29-2014
"Fake ID" Android Vulnerability in Lets Mali... france deal on 09-28-2014