mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 01:45:21 +00:00
26 lines
624 B
YAML
26 lines
624 B
YAML
title: Webshell Remote Command Execution
|
|
id: c0d3734d-330f-4a03-aae2-65dacc6a8222
|
|
status: experimental
|
|
description: Detects posible command execution by web application/web shell
|
|
author: Ilyas Ochkov, Beyu Denis, oscd.community
|
|
date: 2019/10/12
|
|
modified: 2019/11/04
|
|
references:
|
|
- personal experience
|
|
|
|
logsource:
|
|
product: linux
|
|
service: auditd
|
|
detection:
|
|
selection:
|
|
type: 'SYSCALL'
|
|
SYSCALL: 'execve'
|
|
key: 'detect_execve_www'
|
|
condition: selection
|
|
falsepositives:
|
|
- Admin activity
|
|
- Crazy web applications
|
|
level: critical
|
|
tags:
|
|
- attack.persistence
|
|
- attack.t1505.003 |