7327dd53e5
- Renamed "sql_injection_keywords.yml" to "web_sql_injection_keywords.yml" to conform with the rest of the rule in the WEB directory - Renamed "xss_keywords.yml" to "web_xss_keywords.yml" to conform with the rest of the rule in the WEB directory - Renamed "proc_create_win_msdt_susp_parent.yml" to "proc_creation_win_msdt_susp_parent.yml" to conform with other process creation rules - Renamed "proc_create_win_sdiagnhost_susp_child.yml" to "proc_creation_win_sdiagnhost_susp_child.yml" to conform with other process creation rules - Moved the rule "win_powershell_snapins_hafnium.yml" to process_creation folder instead of the WEB folder - Created "web_susp_windows_path_uri.yml" to detect URI that contains susp windows paths - Updated the description "web_webshell_keyword.yml" and added 3 more cases - Created "file_event_win_cve_2021_44077_poc_default_files.yml" to detect the default dropped file from the POC of CVE-2021-44077 (Showcased in the DFIR report) - Created "proc_creation_win_renamed_plink.yml" to detect renamed usage of "Plink"
31 lines
726 B
YAML
31 lines
726 B
YAML
title: Webshell Detection by Keyword
|
|
id: 7ff9db12-1b94-4a79-ba68-a2402c5d6729
|
|
status: test
|
|
description: Detects windows webshells that use GET requests by keyword searches in URL strings
|
|
author: Florian Roth
|
|
date: 2017/02/19
|
|
modified: 2022/06/06
|
|
logsource:
|
|
category: webserver
|
|
detection:
|
|
keywords:
|
|
- =whoami
|
|
- =net%20user
|
|
- =cmd%20/c%20
|
|
- =powershell%20
|
|
- =tasklist%20
|
|
- =wmic%20
|
|
condition: keywords
|
|
fields:
|
|
- client_ip
|
|
- vhost
|
|
- url
|
|
- response
|
|
falsepositives:
|
|
- Web sites like wikis with articles on os commands and pages that include the os commands in the URLs
|
|
- User searches in search boxes of the respective website
|
|
level: high
|
|
tags:
|
|
- attack.persistence
|
|
- attack.t1505.003
|