SlideShare a Scribd company logo
Hacking with PHP
Mark Niebergall

LonghornPHP 2019

https://github.com/mbniebergall/hacking-with-php
Mark Niebergall
• PHP since 2005

• Masters degree in MIS

• Senior Software Engineer

• Drug screening project

• Utah PHP Co-Organizer

• CSSLP, SSCP Certified and SME

• Father, long distance running, fishing, skiing
Objective
• Understand attacks

• Increase project security

• Implement effective countermeasures
https://www.pexels.com/photo/architectural-design-architecture-blue-sky-bungalow-462358/
https://static01.nyt.com/images/2016/08/05/us/05onfire1_xp/05onfire1_xp-articleLarge-v2.jpg?quality=75&auto=webp&disable=upscale
Hacking with PHP
• Risk to Resources 

• Threat Modeling

• Types of Attacks

• Countermeasures
Risk to Resources
Risk to Resources
• Data

• Functionality

• Hardware

• Source code
Threat Modeling
Threat Modeling
• https://cybermap.kaspersky.com/
Threat Modeling
• Identify threats

- Script kiddies

- Organized groups

- Nation states

- Curious users
Threat Modeling
• Risk assessment
Types of Attacks
Types of Attacks
• Ransomware

• Malware

• Covert data theft

• Data decryption (credentials, personal, credit card, etc.)

• Denial of Service (DoS)/Distributed DoS (DDoS)

• Injection

• Session hijacking

• Cross-site scripting (XSS)

• Spear Phishing

• Name others?
Countermeasures
Countermeasures
• Prevent attacks from being successful

- Attacks are going to happen, can only reduce likelihood
of success
https://www.kurdsoft.net/Photo/Editor/BLogImg/osi-model-7-layers-network-connectivity.png
Coding Time!
• Be creative

• Group input

• Different attack types

• How to implement countermeasures
Group Discussion
• Attacks seen in the wild

• Countermeasures used

• PHP best practices

• OSI model layers
Questions?
• Feedback

More Related Content

PDF
MonkeySpider at Sicherheit 2008
PPTX
Building Better WordPress Sites
PDF
Talesh Seeparsan - The Hound of the Malwarevilles
PDF
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
PDF
BinaryPig - Scalable Malware Analytics in Hadoop
PDF
Welcome to Cybrom Technology, Indrapuri Bhopal.pdf
PDF
Run Fast, Try Not to Break S**t
PPTX
[若渴計畫] Black Hat 2017之過去閱讀相關整理
MonkeySpider at Sicherheit 2008
Building Better WordPress Sites
Talesh Seeparsan - The Hound of the Malwarevilles
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
BinaryPig - Scalable Malware Analytics in Hadoop
Welcome to Cybrom Technology, Indrapuri Bhopal.pdf
Run Fast, Try Not to Break S**t
[若渴計畫] Black Hat 2017之過去閱讀相關整理

Similar to Hacking with PHP (20)

PDF
MyResume.pdf
DOCX
Php developer
PPTX
Software developers as blue team
PPTX
Javascript Security - Three main methods of defending your MEAN stack
DOC
Resume-2016
PDF
Best Practices for Ensuring SAP ABAP Code Quality and Security
PDF
PDF
There’s an OpenBullet Attack Config for Your Site – What Should You Do?
PDF
Web tech weblamp_infosession_2012-13
PDF
Mark Tortoricci - Talent42 2015
PPTX
Amazing Hiring tech sourcing course Boolean Search + Xray The Lokenbergs
PDF
P Hundamental Security Coding Secure With Php Lamp
PDF
Threat Hunting Professional Online Training Course
PPTX
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
PDF
My updated CV.pdf
PPTX
A question of trust - understanding Open Source risks
PDF
2018 p.ranjan.raja msc-13_year_ex_php_webdeveloper
PPTX
Web-App Remote Code Execution Via Scripting Engines
PPTX
High time to add machine learning to your information security stack
DOC
MyResume.pdf
Php developer
Software developers as blue team
Javascript Security - Three main methods of defending your MEAN stack
Resume-2016
Best Practices for Ensuring SAP ABAP Code Quality and Security
There’s an OpenBullet Attack Config for Your Site – What Should You Do?
Web tech weblamp_infosession_2012-13
Mark Tortoricci - Talent42 2015
Amazing Hiring tech sourcing course Boolean Search + Xray The Lokenbergs
P Hundamental Security Coding Secure With Php Lamp
Threat Hunting Professional Online Training Course
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
My updated CV.pdf
A question of trust - understanding Open Source risks
2018 p.ranjan.raja msc-13_year_ex_php_webdeveloper
Web-App Remote Code Execution Via Scripting Engines
High time to add machine learning to your information security stack

More from Mark Niebergall (20)

PDF
Filesystem Management with Flysystem - php[tek] 2023
PDF
Leveling Up With Unit Testing - php[tek] 2023
PDF
Filesystem Management with Flysystem at PHP UK 2023
PDF
Leveling Up With Unit Testing - LonghornPHP 2022
PDF
Developing SOLID Code
PDF
Unit Testing from Setup to Deployment
PDF
Stacking Up Middleware
PDF
BDD API Tests with Gherkin and Behat
PDF
BDD API Tests with Gherkin and Behat
PDF
Relational Database Design Bootcamp
PDF
Starting Out With PHP
PDF
Automatic PHP 7 Compatibility Checking Using php7cc (and PHPCompatibility)
PDF
Debugging PHP with Xdebug - PHPUK 2018
PDF
Advanced PHP Simplified - Sunshine PHP 2018
PDF
Defensive Coding Crash Course Tutorial
PDF
Inheritance: Vertical or Horizontal
PDF
Cybersecurity State of the Union
PDF
Cryptography With PHP - ZendCon 2017 Workshop
PDF
Defensive Coding Crash Course - ZendCon 2017
PDF
Leveraging Composer in Existing Projects
Filesystem Management with Flysystem - php[tek] 2023
Leveling Up With Unit Testing - php[tek] 2023
Filesystem Management with Flysystem at PHP UK 2023
Leveling Up With Unit Testing - LonghornPHP 2022
Developing SOLID Code
Unit Testing from Setup to Deployment
Stacking Up Middleware
BDD API Tests with Gherkin and Behat
BDD API Tests with Gherkin and Behat
Relational Database Design Bootcamp
Starting Out With PHP
Automatic PHP 7 Compatibility Checking Using php7cc (and PHPCompatibility)
Debugging PHP with Xdebug - PHPUK 2018
Advanced PHP Simplified - Sunshine PHP 2018
Defensive Coding Crash Course Tutorial
Inheritance: Vertical or Horizontal
Cybersecurity State of the Union
Cryptography With PHP - ZendCon 2017 Workshop
Defensive Coding Crash Course - ZendCon 2017
Leveraging Composer in Existing Projects

Recently uploaded (20)

PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
System and Network Administration Chapter 2
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
AI in Product Development-omnex systems
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
System and Network Administraation Chapter 3
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
ISO 45001 Occupational Health and Safety Management System
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Odoo Companies in India – Driving Business Transformation.pdf
System and Network Administration Chapter 2
ManageIQ - Sprint 268 Review - Slide Deck
How to Choose the Right IT Partner for Your Business in Malaysia
Adobe Illustrator 28.6 Crack My Vision of Vector Design
VVF-Customer-Presentation2025-Ver1.9.pptx
AI in Product Development-omnex systems
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Navsoft: AI-Powered Business Solutions & Custom Software Development
CHAPTER 2 - PM Management and IT Context
Design an Analysis of Algorithms II-SECS-1021-03
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
System and Network Administraation Chapter 3
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
ISO 45001 Occupational Health and Safety Management System

Hacking with PHP