The document discusses techniques for web backdoor stealth focused on PHP web hacking, including anatomy, maintaining access, covering tracks, and case studies. It outlines various vulnerabilities from OWASP's top ten list and methods of exploiting them through unauthorized access and backdoor creation. The text also emphasizes the importance of secure coding, vulnerability assessments, and proactive security measures to detect and clean up after such attacks.
Related topics: