您的位置:首页 > 运维架构 > Shell

WebShell and Threat Intelligence

2017-07-03 18:32 330 查看


Good image, hope it could be useful for u.

And then, four points you need to pay a little attention:

Traffic monitor

”CaiDao” ‘s payload are all in request body.

“Weevely“‘s payload are all in cookie and spreate to make up again.

File moitor

Always include system method

Encrypt is very common

Attack origin

Tor network , proxy server is the common attack origin.

Night is the high frequency time

Someone do batch scan at night, unexpectedly it work.

Attack method

Web leak and config issue occupy more.

One sentence Webshell and rebound shell occupy more.

Finally :

Created with Raphaël 2.1.0Threat IntelligenceThreat IntelligenceWebshell MonitorWebshell MonitorDefender websiteDefender websiteSirpSirpAttacker featurewebshell feature.Analyze system leakEmergency measuresCommunity dataLeak database
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: