YoVDO

Anatomy of a WebShell

Offered By: OWASP Foundation via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Web Security Courses Malware Detection Courses

Course Description

Overview

Explore the intricacies of WebShells in this 19-minute OWASP Foundation conference talk. Gain insights into the often misunderstood and overlooked form of malware that continues to be a popular and powerful tool for attackers. Discover the range of WebShells from simple to complex designs, and understand their role in establishing long-term, stealthy presence in compromised networks. Learn about the common parts of WebShells, their design principles, and typical usage. Delve into different categories of WebShells, including EVAL, Admin, and Proxy types. Understand the importance of WebShells in cybersecurity and the mechanisms that make them effective. Examine web security vulnerabilities that enable WebShell deployment. Differentiate between trojanized and standalone WebShells, and explore their persistence and stealth techniques. By the end of the talk, acquire the knowledge to identify and detect WebShells, even when dormant and not actively used by intruders.

Syllabus

Intro
Three Different Ones (EVAL)
Three Different Ones (Admin)
Three Different Ones (Proxy)
Why Should We Care
What Makes Them Work
Web Security - Or Lack Thereof
Trojanized or Standalone
Persistence and Stealth
WebShells You'll Know What To Look For...


Taught by

OWASP Foundation

Related Courses

Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
The Complete Cyber Security Course : End Point Protection!
Udemy
Máster en Seguridad Informática. Curso completo de Hacking.
Udemy
Network Analysis with Arkime
Pluralsight
Configuring Firepower Threat Defense (FTD) Integrations
Pluralsight