You are here

VULNERABILITY IN ENCRYPTED CLOSED SOURCE PHP

Primary tabs

SizeSeedsPeersCompleted
268.9 MiB000
This torrent has no flags.


Vulnerability discovery in encrypted closed source PHP applications

25th Chaos Communication Congress
Nothing to hide

Security audits of PHP applications are usually performed on a source code basis. However sometimes vendors protect their source code by encrypting their applications with runtime (bytecode-)encryptors. When these tools are used source code analysis is no longer possible and because these tools change how PHP works internally, several greybox security scanning/fuzzing techniques relying on hooks fail, too.

This talk will show how different PHP (bytecode-)encryptions work, how the original bytecode can be recovered, how vulnerability discovery can still be performed with only the bytecode available and how feasible PHP bytecode decompilation is.

http://events.ccc.de/congress/2008/Fahrplan/events/2678.en.html

25c3 day 2, Berlin 2008