Code Obfuscation, PHP shells & more: what hackers do once they get passed your code