PHP is an easy language to learn and is among the most popular in the web development world. Because of this, many PHP applications are written by novice programmers with little knowledge of writing secure code. Combine that fact with a few poor design decisions and you end up with vulnerabilities in PHP applications being published daily. But once you've found a hole in a PHP app, what do you do? Web shells like r57 are fun, but they tend to focus solely on the web server without much thought about the network behind it. This talk will present the background for various Metasploit payloads in PHP followed by the unveiling of PHP meterpreter, the Windows payload you know and love ported to the scripting language you love to hate.