"If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology." -Bruce Schneier
HTS costs up to $300 a month to operate. We need your help!
Sorry for replying so late, I was with my girlfriend for the weekend. PHP Exploitation is just that. There's a hole somewhere in the PHP file that an attacker can upload into the hole and manipulate the exploit. A common attack is to upload a PHP code into a .jpeg file, but I believe with the outcome of 6.0.0 of PHP, that security problem has been fixed, but knowing us hackers, someone'll find a way =). If you have a grasp on PHP, you'll know it stands for Personal Home Page. A scripting language used for dynamically created webpages. Therefore, most exploits will come from the security aspects, and most likely the design aspects as obfuscation techniques become more sophisticated, and easier to embed in the code with some programs (Firebug, possibly? if you're really really good, haha, though doubtful). Whatever the tricks or possibilities, I hope the answer helped. I'm really not involved in PHP or the exploits, although I'll have to learn them soon enough, no doubt. If this answer helped, that's great, if I didn't particularly touch down on what you wanted, please comment me again, I'll probably be circling the site more, seeing as I'm starting my classes on Internet Security in the Fall. Happy Hacking ^_^