""ET WEB_SERVER Generic Webshell Accessed on Internal Compromised Server""

SID: 2031014

Revision: 2

Class Type: web-application-attack

Metadata: affected_product Web_Server_Applications, attack_target Web_Server, created_at 2020_10_14, deployment Perimeter, signature_severity Major, updated_at 2020_10_14

Reference:

Protocol: tcp

Source Network: $HTTP_SERVERS

Source Port: $HTTP_PORTS

Destination Network: $EXTERNAL_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "GR0V Shell"</p> </li> <li> <p>Value: ">GR0V shell</font></center></h1>"</p> </li> </ul> <p><strong>Within:</strong> </p> <p><strong>PCRE:</strong> </p> <p><strong>Special Options:</strong></p> <ul> <li> <p>file_data</p> </li> <li> <p>nocase</p> </li> <li> <p>fast_pattern</p> </li> <li> <p>nocase</p> </li> </ul> <p><a href="https://github.com/magicsword-io/Magic-SigExplorer/tree/main/yaml/et/et_rule_2031014.yaml"><em>source</em></a></p> </div> </div><footer> <hr/> <div role="contentinfo"> <!-- Copyright etc --> </div> Built with <a href="https://www.mkdocs.org/">MkDocs</a> using a <a href="https://github.com/readthedocs/sphinx_rtd_theme">theme</a> provided by <a href="https://readthedocs.org">Read the Docs</a>. </footer> </div> </div> </section> </div> <div class="rst-versions" role="note" aria-label="Versions"> <span class="rst-current-version" data-toggle="rst-current-version"> </span> </div> <script src="../../../js/jquery-3.6.0.min.js"></script> <script>var base_url = "../../..";</script> <script src="../../../js/theme_extra.js"></script> <script src="../../../js/theme.js"></script> <script src="../../../search/main.js"></script> <script> jQuery(function () { SphinxRtdTheme.Navigation.enable(true); }); </script> </body> </html>