Web shell
A web shell is a shell-like interface that facilitates remote access to a web server, commonly exploited for cyberattacks.[1] Unlike traditional shells, it is accessed via a web browser, making it a versatile tool for malicious activities.[2][3]
Web shells can be coded in any programming language supported by a server, with PHP being the most prevalent due to its widespread use in web applications. Other languages, such as Active Server Pages, ASP.NET, Python, Perl, Ruby, and Unix shell scripts, are also employed.[1][2][3]
Attackers identify vulnerabilities often in web server application using network monitoring tools, which can be exploited to deploy a web shell.[2]
Once installed, a web shell allows attackers to execute shell commands, perform privilege escalation, and manage files by uploading, deleting, downloading, or executing them on the server.[2]
General usage
[edit]Web shells are favored in cyberattacks for their versatility and elusiveness.[4] Common applications include:
- Data theft[4]
- Infecting visitors through watering hole attacks[5]
- Website defacement by altering files with malicious intent
- Launching DDoS attacks[2]
- Relaying commands to inaccessible network segments[2]
- Serving as a command and control hub, such as in botnet systems or to compromise external networks[2]
Web shells enable hackers to extract data, corrupt systems, and deploy more damaging malware. The threat intensifies when compromised servers are used to infiltrate additional systems. They are also employed in cyber espionage targeting sectors like government, finance, and defense. A notable example is the “China Chopper” web shell.[6]
Delivery of web shells
[edit]Web shells are deployed by exploiting vulnerabilities in web applications or weak server configurations, including:[2][4]
- SQL injection
- Flaws in applications and services (e.g., web server software like NGINX or content management systems like WordPress)[7][8]
- File processing and upload vulnerabilities (mitigated by restricting file types)[8]
- Remote file inclusion (RFI) and local file inclusion (LFI) vulnerabilities
- Remote code execution
- Exposed administration interfaces[2]
Attackers may also spoof the Content-Type
header during file uploads to bypass weak file validation, enabling shell deployment.
Example
[edit]The following is a basic PHP web shell that executes a shell command and displays the output:
<?=`$_GET[x]`?>
With a filename of example.php
, the command to display the /etc/passwd
file could be:
https://example.com/example.php?x=cat%20%2Fetc%2Fpasswd
This executes the command cat /etc/passwd
. Such risks can be mitigated by disabling PHP shell functions to prevent arbitrary command execution.
Prevention and mitigation
[edit]Preventing web shell installation requires addressing server vulnerabilities. Key measures include:[2][3]
- Regularly updating applications and the host server's operating system to patch known bugs
- Implementing a demilitarized zone (DMZ) between web-facing servers and internal networks
- Securing web server configurations[2]
- Closing unused ports and services[2]
- Validating user input to limit local and remote file inclusion vulnerabilities[2]
- Using a reverse proxy to restrict administrative URLs to legitimate sources[2]
- Conducting frequent vulnerability scans (though ineffective against zero-day attacks)[2]
- Deploying a firewall[2]
- Disabling directory browsing[citation needed]
- Avoiding default passwords[2]
Detection
[edit]Web shells are challenging to detect due to their modifiability, often evading antivirus software.[2][9]
Indicators of a web shell include:[2][3]
- Unusually high web server activity from downloading/uploading[2][9]
- Files with abnormal timestamps (e.g., newer than last modification)[9]
- Unknown files on the server
- Suspicious references (e.g.,
cmd.exe
oreval
) - Unusual connections in server logs
For instance, a PNG file with POST parameters or dubious logins between DMZ servers and internal subnets may signal a web shell.[2][10][11][12]
Web shells may include disguised login forms, such as fake error pages.[2][13][14][15]
Attackers can modify the .htaccess file (on Apache HTTP Server) to redirect search engine queries to malware or spam pages, often tailoring content based on user-agent detection. Identifying the shell may require altering the crawler’s user-agent, after which it can be easily removed.[2]
Analyzing server logs can pinpoint the web shell’s location, as legitimate users typically have diverse user-agents and referers, while attacker access is more uniform.[2]
See also
[edit]- Backdoor (computing)
- Cyberwarfare
- Internet security
- Network security
- China Chopper
- Privacy
- Web-based SSH
References
[edit]- ^ a b "How can web shells be used to exploit security tools and servers?". SearchSecurity. Archived from the original on 2019-03-28. Retrieved 2018-12-21.
- ^ a b c d e f g h i j k l m n o p q r s t u v w x US Department of Homeland Security (9 August 2017). "Web Shells – Threat Awareness and Guidance". www.us-cert.gov. Archived from the original on 13 January 2019. Retrieved 20 December 2018.
This article incorporates text from this source, which is in the public domain.
- ^ a b c d admin (3 August 2017). "What is a Web shell?". malware.expert. Archived from the original on 13 January 2019. Retrieved 20 December 2018.
- ^ a b c "Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors – US-CERT". www.us-cert.gov. 16 March 2018. Archived from the original on 20 December 2018. Retrieved 20 December 2018.
- ^ WordPress Security Engineer at FixMyWPWC Athens 2016, Makis Mourelatos; Support, W. P.; Aficionado, Security; Kitesurfer, Wannabe (16 October 2017). "The Definitive Guide about Backdoor Attacks - What are WebShell BackDoors". fixmywp.com. Archived from the original on 13 January 2019. Retrieved 20 December 2018.
{{cite web}}
: CS1 maint: numeric names: authors list (link) - ^ Hannousse, Abdelhakim; Yahiouche, Salima (2021-09-01). "Handling webshell attacks: A systematic mapping and survey". Computers & Security. 108: 102366. doi:10.1016/j.cose.2021.102366. ISSN 0167-4048.
{{cite journal}}
: CS1 maint: article number as page number (link) - ^ "Got WordPress? PHP C99 Webshell Attacks Increasing". 14 April 2016. Archived from the original on 29 December 2018. Retrieved 21 December 2018.
- ^ a b "Equifax breach was 'entirely preventable' had it used basic security measures, says House report". 10 December 2018. Archived from the original on 20 December 2018. Retrieved 21 December 2018.
- ^ a b c "Breaking Down the China Chopper Web Shell - Part I". FireEye. Archived from the original on 13 January 2019. Retrieved 20 December 2018.
- ^ "Intrusion Detection and Prevention Systems". Archived from the original on 2019-01-13. Retrieved 2018-12-22.
- ^ Kasey Cross (16 June 2016). "Five signs an attacker is already in your network". Network World. Archived from the original on 13 January 2019. Retrieved 22 December 2018.
- ^ "Traffic Analysis for Network Security: Two Approaches for Going Beyond Network Flow Data". 15 September 2016. Archived from the original on 2016-11-14. Retrieved 2018-12-22.
- ^ "Hackers Hiding Web Shell Logins in Fake HTTP Error Pages". BleepingComputer. Archived from the original on 26 July 2018. Retrieved 21 December 2018.
- ^ "Hackers Hiding Web Shell Logins in Fake HTTP Error Pages". ThreatRavens. 24 July 2018. Archived from the original on 13 January 2019. Retrieved 17 February 2019.
- ^ "Hackers Hiding Web Shell Logins in Fake HTTP Error Pages". cyware.com. Archived from the original on 13 January 2019. Retrieved 22 December 2018.