php://input Injection [video]

php://input allows you to read raw POST data. It is a less memory intensive alternative to $HTTP_RAW_POST_DATA and does not need any special php.ini directives. php://input is not available with enctype="multipart/form-data". php://input can only be read once.

greetz to AntiSecurity

watch the video HERE

download the video HERE


12 Responses so far.

  1. Anonymous says:

    mangtabs gan ....... :D
    sygnya tulisanya agk gug jelas hihihih
    tp gug ap ap....ijin coba gan :D

  2. NoGe says:

    jelas koq tulisan na..
    coba nonton langsung dari web na deh..

  3. Anonymous says:

    oh iya yah heheheh ......mangtabs gan :D

  4. Anonymous says:

    What type of vuln is these and how to check if site is vuln to these

  5. Anonymous says:

    Please give link for shell

  6. AaEzha says:

    donlot dulu gan :D

  7. NoGe says:

    @ all
    happy hacking.. :p

  8. Anonymous says:

    how is google dork??

  9. NoGe says:

    be creative.. :p

    example dork


  10. bjork says:

    This website has been suspended. Please contact support via

    telat saya zzzzzzzzzz

  11. The type of vuln is these and how to check...

  12. Thank you for sharing with us. The content is very good and helpful for me, I learn and know more about it.