[Dailydave] PHP Exploitation Class coming up...

Dave Aitel dave at immunityinc.com
Wed Jul 2 15:45:06 EDT 2014


Example Ex for Image preg_replace

The upcoming PHP class in Columbia MD this month still has some spots
open and I wanted to post one of the exercises - all of the exercises
are just real world bugs simplified to show a particular exploitation
technique. In this particular case you have to upload a real "image" to
take control of the server.

Keep in mind, you do so with the help of two instructors who are experts
in the area.

Even if all you do is defense, PHP is the one language you can guarantee
is running on your periphery somewhere. You can't say that about Java or
C# or really anything else. Feel free to email admin@ if you have any
questions about the class!

-dave
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.immunityinc.com/pipermail/dailydave/attachments/20140702/e4ba938e/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: pcre.png
Type: image/png
Size: 187742 bytes
Desc: not available
URL: <https://lists.immunityinc.com/pipermail/dailydave/attachments/20140702/e4ba938e/attachment-0001.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 196 bytes
Desc: OpenPGP digital signature
URL: <https://lists.immunityinc.com/pipermail/dailydave/attachments/20140702/e4ba938e/attachment-0001.sig>


More information about the Dailydave mailing list