SigmaHQ/rules/web/web_webshell_keyword.yml
2020-09-15 07:02:30 -06:00

28 lines
736 B
YAML

title: Webshell Detection by Keyword
id: 7ff9db12-1b94-4a79-ba68-a2402c5d6729
status: experimental
description: Detects webshells that use GET requests by keyword searches in URL strings
author: Florian Roth
date: 2017/02/19
modified: 2020/09/03
logsource:
category: webserver
detection:
keywords:
- =whoami
- =net%20user
- =cmd%20/c%20
condition: keywords
fields:
- client_ip
- vhost
- url
- response
falsepositives:
- Web sites like wikis with articles on os commands and pages that include the os commands in the URLs
- User searches in search boxes of the respective website
level: high
tags:
- attack.persistence
- attack.t1100 # an old one
- attack.t1505.003