Authored by: PlexTrac Author Posted on: January 21, 2020 What Are Web Shells? Web Shells are malicious scripts updated to web servers to gain persistent access and enable remote administration of an already-compromised server. Attackers use web shells to obtain backdoor access to the web server and often move laterally across the network to search for assets and other sensitive data to steal. These web shells can range from simple PHP scripts that just execute a small shell command to deeper and more sophisticated ones that can dump database tables and even launch widespread distributed denial-of-service (DDos) attacks. The Three Most Common Web Shells Overall, there are many kinds of web shells. However, some are observed more often than others. With that in mind, here are the three most commonly-used web shells in the cybersecurity field: X-Zone Web Shells X-Zone web shells were a new development to the cybersecurity world not long ago, and is primarily obfuscated with gzip and Base64. This form of web shell features basic functionality, like getting system information, checking ports, reading and writing files, creating folders, uploading and downloading, and executing files. PAS Web Shells This form of web shell is a fully-featured PHP shell with basic file browsers, file-search functionality, and a dedicated client for accessing databases and downloading data. The PHP’s script is protected by a password that is used for encryption purposes. This protection makes it one of the most secure shells and one of the hardest to crack unless the password is captured from the attacker while in use. WSO WSO stands for web shell by Orb. This form of web shell is a PHP script and is generally obfuscated using simple techniques like string replacement, gzip, and Base64. This form of web shell avoids web crawlers from search engines like Google, Yahoo, Bing, and more. This is done so the web shell is not discovered or listed in search results. Attackers often employ WSO to view host server information, but it also includes a file manager, a remote shell, a password brute-force tool, and an SQL browser. Additional Web Shells On top of X-Zone, PAS, and WSO web shells, cybersecurity professionals also encounter many simple forms of PHP script that accepts and executes PHP code that is sent remotely by attackers. The malicious PHP scripts accept encoded data from the attacker from either HTTP POST or HTTP COOKIE. This code is then relayed using the PHP operator eval() for execution. Why are Web Shells Important to Understand? Web shells are a dangerous and crucial part of cybersecurity. They are important to understand because they’re used for multiple nefarious purposes and are hard to detect. With a capable attacker, web shells can be used for the following operations: Data Theft Infecting website visitors (watering hole attacks) Website defacement by modifying files with nefarious intent DDoS Attacks Relaying commands within the network that would be inaccessible over the Internet Used as a command and control base, such as in a botnet system. Overall, it is important to be educated on what web shells are, their different and most popular forms, and the ways that they can be used against you and your organization’s Information Systems. PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
How Do I Pentest My LLM? In the world of cybersecurity, AI is the perpetual topic du jour, and more specifically Generative AI. The use of LLMs for all kinds of use cases is the craze and the AI ecosystem continues to move at a rapid pace. When it comes to pentesting, the job of every tester is to keep up... READ ARTICLE
What FedRAMP’s New Vulnerability Management Standard Means for Pentesters and Vuln Managers Breaking Down the New RFC-0012 Standard Under FedRAMP and How It Can Change Your Daily Security Operations If you work in vulnerability management or penetration testing for cloud systems under FedRAMP, buckle up because the new RFC-0012: FedRAMP Continuous Vulnerability Management Standard is going to change how your work is scoped, tracked, and prioritized. The... READ ARTICLE
Beneath the Hat: My Black Hat 2025 Takeaways, Including the AI Imperative As I write this from the airport, the desert heat of Las Vegas is finally fading and I’m reflecting on the whirlwind that was Black Hat USA 2025. For me, this conference is always about two things: the people and the ideas. We hosted our annual Customer Appreciation Night and ran a Pentest Reporting Bootcamp,... READ ARTICLE