By using this site, you agree to our Privacy Policy and our Terms of Use. Close

@ioi

Try these, and google for more:

http://www.darknet.org.uk/2006/09/fis-file-inclusion-scanner-v01-php-vulnerability/

http://www.acunetix.com/cross-site-scripting/scanner.htm

 

Put in other words, searching for the leack through HTTP is much more complicated than analyze your PHP source code. I mean the hacker has propably a bot (network, remember the DOS attacks?) and let that try everything until it finds the leak. After that he has just to use it.