This document discusses how hackers exploit vulnerabilities in websites once they gain access. It covers common techniques used, such as code obfuscation, PHP shells, and file and database modifications. The document provides examples of obfuscated PHP code that could be malicious. It also describes how PHP shell scripts work, allowing remote access via a web interface to list files, run commands, and more. Preventing vulnerabilities and thoroughly cleaning sites after a hack are recommended.