![]() However, PhpStorm is a debugging tool that requires a lot of clicks to see the value of each element in the array, which is very inefficient. ![]() I met a large array $form when I was debugging Drupal remote code execution vulnerability (CVE-2018-7600 & CVE-2018-7602) with PhpStorm.Īs a security researcher, I hope to explore vulnerabilities when debugging, so it’s important to know the content of each element in $form. 2.1 Execute Commands via Evaluate in ConsoleĬhinese Version: 0x00 Why Xdebug Caught My Attention.0x02 Execute Commands on the Xdebug Server via PhpStorm.1.2 Development of Real-Time Sniffer Script.1.1 The Working Principles and Potential Attack Surface of Xdebug.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |