Three Means of Webshell Detection

Source: Internet
Author: User
Keywords webshell webshell definition webshell detection
Webshell, as the name implies: web refers to the web server, and the shell is a script program written in a scripting language, webshell is a management tool of the web, the authority to operate the web server, also called webadmin. Webshell is generally used by website administrators for website management, server management, etc. However, due to the powerful function of webshell, you can upload and download files, view the database, and even call some system-related commands on the server (such as creating users, Modify and delete files, etc.), usually used by hackers, through some uploading methods, hackers upload their own webshell to the directory of the web server's page, and then invade through the form of page access, or connect to the local by inserting a sentence Some related tools directly invade the server.

From the perspective of security protection ability, detection is the first ability, webshell detection mainly has the following methods:

(1) Webshell detection engine based on traffic

It is easy to deploy and analyze the original information directly through traffic mirroring. Behavior analysis based on payload not only detects known webshells, but also identifies unknown and strong camouflage webshells. Perform correlation analysis on webshell access characteristics (IP/UA/Cookie), payload characteristics, path characteristics, time characteristics, etc., using time as an index to restore attack events.

(2) File-based webshell analysis engine

Check if it contains webshell features, such as commonly used functions. Check whether it is encrypted (obfuscation processing) to determine whether it is a webshell file hash detection, create a webshell sample hashing library, and compare and analyze suspicious files. Test the file creation time, modification time, file permissions, etc. to confirm whether it is webshell sandbox technology, and judge based on the behavior characteristics of the dynamic language sandbox runtime

(3) Webshell analysis engine based on log

Supports many common log formats. Modeling the website's access behavior can effectively identify webshell uploading and other behaviors, comprehensively analyze the log, and trace back the entire attack process.

Three kinds of detection methods, file-based detection, many times the deployment cost of obtaining samples is relatively high, and at the same time, the entire attack process cannot be seen by the samples alone. Some behavioral information based on the log cannot be seen in the log. Generally speaking, the information seen based on the "traffic" is the most, and the entire attack process can be more fully restored.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.