heroui logo

Windows Webshell Strings

Sigma Rules

View Source
Summary
The 'Windows Webshell Strings' detection rule is designed to identify common commands used in webshells that run on Windows systems, potentially indicating unauthorized access or exploitation. Webshells are often used by attackers after compromising a web server to execute commands remotely, manage files, or escalate privileges. This rule specifically looks for HTTP GET requests that include certain command patterns typically associated with webshell activities. The commands monitored include common system commands such as 'whoami', 'net user', and 'cmd' variations, as well as PowerShell and network tool commands (e.g., 'curl', 'wget'). The logic of the rule requires that all specified commands must be present in the GET request URL, indicating a higher level of intent rather than casual requests. False positives may arise from benign URLs found in web pages, particularly on sites with technical documentation or user-generated content involving keywords relevant to operating system commands. Effective monitoring of access logs on web servers is critical for detecting such potential security breaches and responding swiftly.
Categories
  • Web
  • Cloud
  • On-Premise
  • Windows
  • Infrastructure
Data Sources
  • Web Credential
  • Network Traffic
  • Logon Session
  • Application Log
  • File
Created: 2017-02-19