Part 1: The Basics of Exploitation and How to Secure a Server
<a href="http://ha.xxor.se/2011/09/local-session-poisoning-in-php-part-1.html">http://ha.xxor.se/2011/09/local-session-poisoning-in-php-part-1.html</a>
Part 2: Promiscuous Session Files
<a href="http://ha.xxor.se/2011/09/local-session-poisoning-in-php-part-2.html">http://ha.xxor.se/2011/09/local-session-poisoning-in-php-part-2.html</a>
Part 3: Bypassing Suhosin's Session Encryption
<a href="http://ha.xxor.se/2011/09/local-session-poisoning-in-php-part-3.html">http://ha.xxor.se/2011/09/local-session-poisoning-in-php-part-3.html</a>