This paper discusses how one can exploit common vulnerabilities in PHP applications.