Authored by: PlexTrac Author Posted on: January 21, 2020 What Are Web Shells? Web Shells are malicious scripts updated to web servers to gain persistent access and enable remote administration of an already-compromised server. Attackers use web shells to obtain backdoor access to the web server and often move laterally across the network to search for assets and other sensitive data to steal. These web shells can range from simple PHP scripts that just execute a small shell command to deeper and more sophisticated ones that can dump database tables and even launch widespread distributed denial-of-service (DDos) attacks. The Three Most Common Web Shells Overall, there are many kinds of web shells. However, some are observed more often than others. With that in mind, here are the three most commonly-used web shells in the cybersecurity field: X-Zone Web Shells X-Zone web shells were a new development to the cybersecurity world not long ago, and is primarily obfuscated with gzip and Base64. This form of web shell features basic functionality, like getting system information, checking ports, reading and writing files, creating folders, uploading and downloading, and executing files. PAS Web Shells This form of web shell is a fully-featured PHP shell with basic file browsers, file-search functionality, and a dedicated client for accessing databases and downloading data. The PHP’s script is protected by a password that is used for encryption purposes. This protection makes it one of the most secure shells and one of the hardest to crack unless the password is captured from the attacker while in use. WSO WSO stands for web shell by Orb. This form of web shell is a PHP script and is generally obfuscated using simple techniques like string replacement, gzip, and Base64. This form of web shell avoids web crawlers from search engines like Google, Yahoo, Bing, and more. This is done so the web shell is not discovered or listed in search results. Attackers often employ WSO to view host server information, but it also includes a file manager, a remote shell, a password brute-force tool, and an SQL browser. Additional Web Shells On top of X-Zone, PAS, and WSO web shells, cybersecurity professionals also encounter many simple forms of PHP script that accepts and executes PHP code that is sent remotely by attackers. The malicious PHP scripts accept encoded data from the attacker from either HTTP POST or HTTP COOKIE. This code is then relayed using the PHP operator eval() for execution. Why are Web Shells Important to Understand? Web shells are a dangerous and crucial part of cybersecurity. They are important to understand because they’re used for multiple nefarious purposes and are hard to detect. With a capable attacker, web shells can be used for the following operations: Data Theft Infecting website visitors (watering hole attacks) Website defacement by modifying files with nefarious intent DDoS Attacks Relaying commands within the network that would be inaccessible over the Internet Used as a command and control base, such as in a botnet system. Overall, it is important to be educated on what web shells are, their different and most popular forms, and the ways that they can be used against you and your organization’s Information Systems. PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
The CVE Program Regains Funding: A Critical Juncture for Global Cybersecurity If you’ve spent any amount of time in cybersecurity, you’ve likely encountered the CVE (Common Vulnerabilities and Exposures) Program. It’s a foundational piece of how we identify and talk about... READ ARTICLE
What the CVE Funding Scare Exposed About the State of Vulnerability Management The CVE program is vital, but recent events are a reminder that security strategies must go far beyond known vulnerabilities. The potential defunding of the CVE (Common Vulnerabilities and Exposures)... READ ARTICLE
Introducing PlexTrac for CTEM: Proactively Manage Exposure Risk Gartner’s Continuous Threat Exposure Management (CTEM) framework is all the rage right now. Everyone’s talking about the need for continuous security testing and tossing around “CTEM” as the buzzword. But... READ ARTICLE