WebShell and Threat Intelligence

Good image, hope it could be useful for u.

And then, four points you need to pay a little attention:

  1. Traffic monitor

    • ”CaiDao” ‘s payload are all in request body.
    • “Weevely“‘s payload are all in cookie and spreate to make up again.
  2. File moitor

    • Always include system method
    • Encrypt is very common
  3. Attack origin

    • Tor network , proxy server is the common attack origin.
    • Night is the high frequency time
    • Someone do batch scan at night, unexpectedly it work.
  4. Attack method

    • Web leak and config issue occupy more.
    • One sentence Webshell and rebound shell occupy more.

Finally :

Created with Raphaël 2.1.0Threat IntelligenceThreat IntelligenceWebshell MonitorWebshell MonitorDefender websiteDefender websiteSirpSirpAttacker featurewebshell feature.Analyze system leakEmergency measuresCommunity dataLeak database

相关文章:

  • 2021-10-29
  • 2022-01-03
  • 2022-12-23
  • 2021-09-24
  • 2021-10-01
  • 2022-01-16
  • 2022-02-03
猜你喜欢
  • 2022-01-19
  • 2021-08-25
  • 2021-08-28
  • 2021-10-04
  • 2022-12-23
  • 2022-12-23
  • 2021-06-28
相关资源
相似解决方案