[nycbug-talk] Searching for suspect PHP files...

Max Gribov max at neuropunks.org
Tue Mar 3 17:26:28 EST 2009

Matt Juszczak wrote:
> perl run as the www user... well, if its being run as the www user, 
> not much they can do right?  Not with the permissions of the www user, 
> anyway.
well, you can upload a local exploit, run it as www user, gain root and 
make it bind a shell or drop in some php backdoor or whatever..

Andy made a good point about using MAC, and also you can use something 
like tripwire to check your upload dirs/web application source/etc, but 
tripwire gets pretty tedious cause someone has to parse the input..

More information about the talk mailing list