WebShell and Threat Intelligence

Webshell

Good image, hope it could be useful for u.

And then, four points you need to pay a little attention:
  1. Traffic monitor

    • ”CaiDao” ‘s payload are all in request body.
    • “Weevely“‘s payload are all in cookie and spreate to make up again.
  2. File moitor

    • Always include system method
    • Encrypt is very common
  3. Attack origin

    • Tor network , proxy server is the common attack origin.
    • Night is the high frequency time
    • Someone do batch scan at night, unexpectedly it work.
  4. Attack method

    • Web leak and config issue occupy more.
    • One sentence Webshell and rebound shell occupy more.

Finally :

Created with Raphaël 2.1.0 Threat Intelligence Threat Intelligence Webshell Monitor Webshell Monitor Defender website Defender website Sirp Sirp Attacker feature webshell feature . Analyze system leak Emergency measures Community data Leak database
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值