{"id":5873,"date":"2024-02-22T12:21:44","date_gmt":"2024-02-22T06:51:44","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?p=5873"},"modified":"2024-02-22T13:36:07","modified_gmt":"2024-02-22T08:06:07","slug":"web-shell-a-primer","status":"publish","type":"post","link":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/","title":{"rendered":"Web shell &#8211; A primer"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-what-is-a-web-shell\"><strong>What is a web shell?<\/strong><\/h3>\n\n\n\n<p>A web shell is a malicious script written using commonly used web application languages such as PHP, JSP, or ASP. They  provide an attacker with a easy way to attack a compromised web server via web-based vulnerabilities, and once installed on a web server&#8217;s operating system, the web shell&#8217;s facilitate remote administration. <\/p>\n\n\n\n<p>A web shell can allow threat actors to modify files on the web server and even access the root directory of the web server.<\/p>\n\n\n\n<p>Web shells are a tactic used by threat actors to maintain persistence <a href=\"https:\/\/attack.mitre.org\/techniques\/T1505\/003\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1505.003<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"400\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-22-at-12.56.04\u202fPM-1024x400.png\" alt=\"MITRE Attack tactic on web shells\" class=\"wp-image-6325\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-22-at-12.56.04\u202fPM-1024x400.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-22-at-12.56.04\u202fPM-300x117.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-22-at-12.56.04\u202fPM-768x300.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-22-at-12.56.04\u202fPM-1536x600.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-22-at-12.56.04\u202fPM-2048x800.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-do-attackers-use-a-web-shell\"><strong>How do attackers use a web shell?<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"338\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Everything-You-Need-To-Know-About-Web-Shells-640x338-1.jpg\" alt=\"Image of a web shell\" class=\"wp-image-6239\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Everything-You-Need-To-Know-About-Web-Shells-640x338-1.jpg 640w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Everything-You-Need-To-Know-About-Web-Shells-640x338-1-300x158.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>Threat attackers do a search for servers which are vulnerable to web shell attacks.  On discovering a\u00a0vulnerable web server threat actors launch a web shell attack before the victim becomes alert and patches the vulnerability. The attacker usually takes advantage of common web page vulnerabilities such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/SQL_injection\" target=\"_blank\" rel=\"noreferrer noopener\">SQL injection<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/File_inclusion_vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">remote file inclusion (RFI)<\/a>, and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cross-site_scripting\" target=\"_blank\" rel=\"noreferrer noopener\">cross-site scripting (XSS)<\/a> <\/p>\n\n\n\n<p>The web shell runs on web server software with limited user permissions. Using the web shell, attackers attempt to perform <a href=\"https:\/\/en.wikipedia.org\/wiki\/Privilege_escalation\" target=\"_blank\" rel=\"noreferrer noopener\">privilege escalation<\/a> by exploiting local vulnerabilities in the system to gain root access, enabling them to take complete control of the server.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-characteristics-of-some-the-web-shells-are-shown-below\"><strong>Characteristics of some the Web Shells are shown below<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/shreshtait.com\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shreshta Threat Intelligence<\/a> team has decrypted some web shells, and snippets of the characteristics of the web shell are shown below.<\/p>\n\n\n\n<p><strong>Webshell #1 0byte v2 Shell<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"515\" height=\"626\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_1.1.png\" alt=\"\" class=\"wp-image-5875\" style=\"width:620px;height:auto\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_1.1.png 515w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_1.1-247x300.png 247w\" sizes=\"auto, (max-width: 515px) 100vw, 515px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 1 &#8211; Screenshot of the decrypted code of the 0byte v2 web shell<\/p>\n\n\n\n<p>The code is designed to execute shell commands using various PHP functions such as system, exec, passthru, and shell_exec. It incorporates error and log suppression functions to avoid detection.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"586\" height=\"290\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_2.2.png\" alt=\"\" class=\"wp-image-5876\" style=\"width:620px;height:auto\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_2.2.png 586w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_2.2-300x148.png 300w\" sizes=\"auto, (max-width: 586px) 100vw, 586px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 2-&nbsp; Screenshot of code that allows the attacker to download the data<span id=\"docs-internal-guid-744892bd-7fff-16f7-d362-11c84dc87428\"><\/span><\/p>\n\n\n\n<p>The above code snippet allows the attacker to download files from the server by specifying the file path in the $_GET[&#8216;file&#8217;] parameter<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"931\" height=\"609\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_3.3-1.png\" alt=\"\" class=\"wp-image-5936\" style=\"width:621px;height:auto\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_3.3-1.png 931w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_3.3-1-300x196.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_3.3-1-768x502.png 768w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 3 &#8211; Screenshot of the snippet of the reverse shell code&nbsp;<\/p>\n\n\n\n<p>The above code echoes HTML to display a form for configuring and executing a reverse shell by using the POST method.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"125\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.1-1-1024x125.png\" alt=\"\" class=\"wp-image-5939\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.1-1-1024x125.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.1-1-300x37.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.1-1-768x94.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.1-1.png 1343w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"125\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.2-1-1024x125.png\" alt=\"\" class=\"wp-image-5940\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.2-1-1024x125.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.2-1-300x37.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.2-1-768x94.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_4.2-1.png 1343w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 4 &#8211; Screenshot of the encrypted and decrypted code<\/p>\n\n\n\n<p>This part of the code is used for tracking or reporting the usage of the backdoor to a remote server.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Webshell #2 0x Shell<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"990\" height=\"569\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_5.1-1.png\" alt=\"\" class=\"wp-image-5943\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_5.1-1.png 990w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_5.1-1-300x172.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_5.1-1-768x441.png 768w\" sizes=\"auto, (max-width: 990px) 100vw, 990px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 5 &#8211; Screenshot of code snippet defines various parameters<\/p>\n\n\n\n<p>The parameter includes the shell name, slogan, version, and security bypass setting. It also incorporates bot protection, preventing it from being cached or crawled, along with error suppression.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"303\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_6-1-1024x303.png\" alt=\"\" class=\"wp-image-5946\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_6-1-1024x303.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_6-1-300x89.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_6-1-768x227.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_6-1.png 1433w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 6 &#8211; Screenshot of the code file scanner<\/p>\n\n\n\n<p>This code tries to identify popular web application configuration files (e.g., WordPress, Joomla, Magento) based on file paths.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"943\" height=\"580\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_7-1.png\" alt=\"\" class=\"wp-image-5949\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_7-1.png 943w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_7-1-300x185.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_7-1-768x472.png 768w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 7 &#8211; Screenshot of the code handling file download and upload<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1005\" height=\"563\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_8-1.png\" alt=\"\" class=\"wp-image-5951\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_8-1.png 1005w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_8-1-300x168.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_8-1-768x430.png 768w\" sizes=\"auto, (max-width: 1005px) 100vw, 1005px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 8 &#8211; Screenshot of tool creation function<\/p>\n\n\n\n<p>The code downloads tools from external URLs and stores them in the &#8220;0x1&#8221; directory.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"498\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_9-1.png\" alt=\"\" class=\"wp-image-5953\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_9-1.png 795w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_9-1-300x188.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_9-1-768x481.png 768w\" sizes=\"auto, (max-width: 795px) 100vw, 795px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 9 &#8211; Screenshot of  code attempting  to extract passwords of web applications from their configuration files.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"873\" height=\"446\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_10-1.png\" alt=\"\" class=\"wp-image-5956\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_10-1.png 873w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_10-1-300x153.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_10-1-768x392.png 768w\" sizes=\"auto, (max-width: 873px) 100vw, 873px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"563\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_10.1-1.png\" alt=\"\" class=\"wp-image-5955\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_10.1-1.png 729w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_10.1-1-300x232.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 10 &#8211; Screenshot of base64 encrypted Perl script that opens a reverse shell<\/p>\n\n\n\n<p>Reverse shell also known as a remote shell or \u201cconnect-back shell,\u201d which takes advantage of the target system\u2019s vulnerabilities to initiate a shell session and then access the victim\u2019s computer<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"771\" height=\"692\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_11-1.png\" alt=\"\" class=\"wp-image-5959\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_11-1.png 771w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_11-1-300x269.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_11-1-768x689.png 768w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 11 &#8211; Screenshot of the code extracts information from the listed configuration path<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The code extracts information from specified configuration files on the web server. The extracted information is then either saved in a new file or symlinked, depending on the value of the &#8216;tipe&#8217; parameter<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"610\" height=\"63\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_12-1.png\" alt=\"\" class=\"wp-image-5962\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_12-1.png 610w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_12-1-300x31.png 300w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 12 &#8211; Screenshot of the code having the self-remove option<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Web shell #3 1337 3YP455 Shell<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"278\" height=\"72\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_13-1.png\" alt=\"\" class=\"wp-image-5965\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 13 &#8211; Screenshot of the code for error suppression and initialisation of the session<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"218\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_14-1-1024x218.png\" alt=\"\" class=\"wp-image-5967\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_14-1-1024x218.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_14-1-300x64.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_14-1-768x164.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_14-1.png 1214w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 14 &#8211; Screenshot of the file upload functionality<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Web shell #4 2018 WSO Shell<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"293\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_15-1-1024x293.png\" alt=\"\" class=\"wp-image-5969\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_15-1-1024x293.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_15-1-300x86.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_15-1-768x220.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_15-1-1536x440.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_15-1.png 1544w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 15 &#8211; Screenshot of Encrypted web shell using multistage encryption<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"432\" height=\"108\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_16-1.png\" alt=\"\" class=\"wp-image-5971\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_16-1.png 432w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_16-1-300x75.png 300w\" sizes=\"auto, (max-width: 432px) 100vw, 432px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 16 &#8211; Screenshot depicting error reporting and configuration settings<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"905\" height=\"178\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_17-1.png\" alt=\"\" class=\"wp-image-5974\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_17-1.png 905w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_17-1-300x59.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_17-1-768x151.png 768w\" sizes=\"auto, (max-width: 905px) 100vw, 905px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 17 &#8211; Screenshot of the hard login function with bot protection<\/p>\n\n\n\n<p>It incorporates bot protection, preventing it from being cached or crawled by the listed user agents<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"905\" height=\"178\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_18-1.png\" alt=\"\" class=\"wp-image-5976\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_18-1.png 905w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_18-1-300x59.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_18-1-768x151.png 768w\" sizes=\"auto, (max-width: 905px) 100vw, 905px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 18 &#8211; Screenshot of the code using exploit-db<\/p>\n\n\n\n<p>The $explink variable constructs a URL for searching the Exploit Database for exploits related to the server&#8217;s operating system and kernel version<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"202\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19-1-1024x202.png\" alt=\"\" class=\"wp-image-5979\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19-1-1024x202.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19-1-300x59.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19-1-768x152.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19-1.png 1418w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"344\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19.1-1-1024x344.png\" alt=\"\" class=\"wp-image-5980\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19.1-1-1024x344.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19.1-1-300x101.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19.1-1-768x258.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_19.1-1.png 1124w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 19 &#8211; Screenshot of the encrypted and decrypted code&nbsp;<\/p>\n\n\n\n<p>The code creates an email ($xd) with server details and sends it to the specified address ($hex) using the mail function<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"297\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_20-1-1024x297.png\" alt=\"\" class=\"wp-image-5983\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_20-1-1024x297.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_20-1-300x87.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_20-1-768x223.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_20-1.png 1417w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 20 &#8211; The encrypted code of the cPanel information grabber<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"110\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_21-1-1024x110.png\" alt=\"\" class=\"wp-image-5985\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_21-1-1024x110.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_21-1-300x32.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_21-1-768x82.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_21-1.png 1183w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 21 &#8211; Screenshot of the heading of the code with error suppression<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"929\" height=\"203\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_22-1.png\" alt=\"\" class=\"wp-image-5987\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_22-1.png 929w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_22-1-300x66.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_22-1-768x168.png 768w\" sizes=\"auto, (max-width: 929px) 100vw, 929px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 22 &#8211; Screenshot of the code exfiltrating encoded information to a C&amp;C<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"231\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_23-1-1024x231.png\" alt=\"\" class=\"wp-image-5989\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_23-1-1024x231.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_23-1-300x68.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_23-1-768x173.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_23-1.png 1175w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 23 &#8211; Screenshot of the encrypted code that scans the \u201c\/home\u201d directory<\/p>\n\n\n\n<p>This script scans and displays the \u201c\/home\u201d directory for possible readable and writable directories<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"189\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_24-1-1024x189.png\" alt=\"\" class=\"wp-image-5991\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_24-1-1024x189.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_24-1-300x55.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_24-1-768x142.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_24-1.png 1181w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 24 &#8211; Screenshot of the code having the self-remove option<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Web shell #5 22XC Mini Shell<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"346\" height=\"179\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_25-1.png\" alt=\"\" class=\"wp-image-5993\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_25-1.png 346w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_25-1-300x155.png 300w\" sizes=\"auto, (max-width: 346px) 100vw, 346px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 25 &#8211; Screenshot of the session and security settings<\/p>\n\n\n\n<p>The PHP script is modified using \u201cini_set\u201d to suppress errors, clear stat cache, and disable error logging\/display.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"194\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_26-1-1024x194.png\" alt=\"\" class=\"wp-image-5996\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_26-1-1024x194.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_26-1-300x57.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_26-1-768x145.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_26-1.png 1374w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 26 &#8211; Screenshot of the hard login function with bot protection<\/p>\n\n\n\n<p>It incorporates bot protection, preventing it from being cached or crawled by the listed user agents<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"895\" height=\"345\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_27-1.png\" alt=\"\" class=\"wp-image-5999\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_27-1.png 895w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_27-1-300x116.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_27-1-768x296.png 768w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 27 &#8211; Screenshot of code that allows the attacker to download the data<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"416\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_28-1.png\" alt=\"\" class=\"wp-image-6001\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_28-1.png 740w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_28-1-300x169.png 300w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 28 &#8211; Screenshot of code that is related to the creation and execution of a ransomware script<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Web shell #6 22XploiterCrew Shell<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1019\" height=\"244\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_29-1.png\" alt=\"\" class=\"wp-image-6003\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_29-1.png 1019w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_29-1-300x72.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_29-1-768x184.png 768w\" sizes=\"auto, (max-width: 1019px) 100vw, 1019px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 29 &#8211; Screenshot of the meta tags of the 22XploiterCrew Shell<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"386\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_30-1-1024x386.png\" alt=\"\" class=\"wp-image-6005\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_30-1-1024x386.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_30-1-300x113.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_30-1-768x289.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_30-1.png 1335w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 30 &#8211; Screenshot of the script extracting various details of the server and sending it to a C&amp;C<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"939\" height=\"416\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_31-1.png\" alt=\"\" class=\"wp-image-6007\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_31-1.png 939w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_31-1-300x133.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_31-1-768x340.png 768w\" sizes=\"auto, (max-width: 939px) 100vw, 939px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 31 &#8211; Screenshot of the code handling file uploads<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"939\" height=\"501\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_32-1.png\" alt=\"\" class=\"wp-image-6009\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_32-1.png 939w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_32-1-300x160.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_32-1-768x410.png 768w\" sizes=\"auto, (max-width: 939px) 100vw, 939px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 32 &#8211; Screenshot of the code handling website defacement<\/p>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Website_defacement\" target=\"_blank\" rel=\"noreferrer noopener\">Website defacement<\/a> is an attack on a website that changes the visual appearance of a website or a web page<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"194\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_33-1-1024x194.png\" alt=\"\" class=\"wp-image-6012\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_33-1-1024x194.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_33-1-300x57.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_33-1-768x146.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_33-1.png 1185w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 33 &#8211; Screenshot of the code checking for and installing Adminer<\/p>\n\n\n\n<p>The web shell checks for the presence of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Adminer\" target=\"_blank\" rel=\"noreferrer noopener\">Adminer<\/a> on the server; if it is not found, the script attempts to install it.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"980\" height=\"546\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_34-1.png\" alt=\"\" class=\"wp-image-6015\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_34-1.png 980w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_34-1-300x167.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_34-1-768x428.png 768w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 34 &#8211; Screenshot of the code handling the reset of cPanel\u2019s credentials.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Web shell #7 404 Not Found Mini Shell<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"816\" height=\"254\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_35-1.png\" alt=\"\" class=\"wp-image-6016\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_35-1.png 816w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_35-1-300x93.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_35-1-768x239.png 768w\" sizes=\"auto, (max-width: 816px) 100vw, 816px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 35 &#8211; Screenshot of the file upload functionality&nbsp;<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"875\" height=\"311\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_36-1.png\" alt=\"\" class=\"wp-image-6018\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_36-1.png 875w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_36-1-300x107.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_36-1-768x273.png 768w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 36 &#8211; Screenshot of the file download functionality<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Web shell #8 404 Not Found Mini Shell<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"875\" height=\"138\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_37-1.png\" alt=\"\" class=\"wp-image-6020\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_37-1.png 875w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_37-1-300x47.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_37-1-768x121.png 768w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 37 &#8211; Screenshot of the code searching for the particular OS vulnerability on \u201cMilw0rm\u201d website<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"88\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_38-1-1024x88.png\" alt=\"\" class=\"wp-image-6022\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_38-1-1024x88.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_38-1-300x26.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_38-1-768x66.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_38-1.png 1403w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 38 &#8211; Screenshot of the code with a list of arrays<\/p>\n\n\n\n<p>The arrays are listed to verify the presence of databases, security tools, and downloading capabilities.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"818\" height=\"185\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_39-1.png\" alt=\"\" class=\"wp-image-6025\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_39-1.png 818w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_39-1-300x68.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_39-1-768x174.png 768w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 39 &#8211; Screenshot of the file upload functionality&nbsp;<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"516\" height=\"185\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_40-1.png\" alt=\"\" class=\"wp-image-6027\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_40-1.png 516w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_40-1-300x108.png 300w\" sizes=\"auto, (max-width: 516px) 100vw, 516px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 40 &#8211; Screenshot of the code having the log-out option<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"198\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_41-1-1024x198.png\" alt=\"\" class=\"wp-image-6029\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_41-1-1024x198.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_41-1-300x58.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_41-1-768x148.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_41-1.png 1242w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 41 &#8211; Screenshot of the code having the self-remove option<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"553\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_42-1-1024x553.png\" alt=\"\" class=\"wp-image-6031\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_42-1-1024x553.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_42-1-300x162.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_42-1-768x415.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_42-1.png 1367w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 42 &#8211; Screenshot of the code for the brute-force function<\/p>\n\n\n\n<p>The PHP script performs <a href=\"https:\/\/en.wikipedia.org\/wiki\/Brute-force_attack\" target=\"_blank\" rel=\"noreferrer noopener\">brute-force<\/a> attacks on different types of servers, specifically for FTP, MySQL, and PostgreSQL protocols.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"103\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_43.1-1-1024x103.png\" alt=\"\" class=\"wp-image-6035\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_43.1-1-1024x103.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_43.1-1-300x30.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_43.1-1-768x78.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_43.1-1.png 1405w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"702\" height=\"164\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_43.2-1.png\" alt=\"\" class=\"wp-image-6034\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_43.2-1.png 702w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_43.2-1-300x70.png 300w\" sizes=\"auto, (max-width: 702px) 100vw, 702px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 43 &#8211; Screenshot of the script that compiles and executes a C program backdoor \u201c$back_connect_c\u201d<\/p>\n\n\n\n<p>The compilation and the execution of the code happens in the background<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"86\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_44.1-1-1024x86.png\" alt=\"\" class=\"wp-image-6038\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_44.1-1-1024x86.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_44.1-1-300x25.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_44.1-1-768x65.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_44.1-1.png 1410w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"811\" height=\"148\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_44.2-1.png\" alt=\"\" class=\"wp-image-6040\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_44.2-1.png 811w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_44.2-1-300x55.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_44.2-1-768x140.png 768w\" sizes=\"auto, (max-width: 811px) 100vw, 811px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 44 &#8211; Screenshot of the script that compiles and executes a Perl script backdoor \u201c$back_connect_p\u201d<\/p>\n\n\n\n<p>The compilation and the execution of the code happens in the background<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Web shell #9 407 Mini Shell<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"190\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_45-1-1024x190.png\" alt=\"\" class=\"wp-image-6044\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_45-1-1024x190.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_45-1-300x56.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_45-1-768x143.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_45-1.png 1356w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 45 &#8211; Screenshot of the hard login function with bot protection<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"751\" height=\"120\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_46-1.png\" alt=\"\" class=\"wp-image-6046\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_46-1.png 751w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_46-1-300x48.png 300w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 46 &#8211; Screenshot of the file upload functionality&nbsp;<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Web shell #10 51mp3L Web Backdoor<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"751\" height=\"154\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_47-1.png\" alt=\"\" class=\"wp-image-6048\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_47-1.png 751w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_47-1-300x62.png 300w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 47 &#8211; Screenshot of the file upload functionality&nbsp;<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"849\" height=\"287\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_48-1.png\" alt=\"\" class=\"wp-image-6050\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_48-1.png 849w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_48-1-300x101.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Figure_48-1-768x260.png 768w\" sizes=\"auto, (max-width: 849px) 100vw, 849px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 48 &#8211; Screenshot of the code sending information to an external server<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-web-shell-marketplace\"><strong>Web shell marketplace<\/strong><\/h2>\n\n\n\n<p>Web shells are readily available on the Internet, accessible through platforms such as Telegram, GitHub etc. Some of them are shown below.<\/p>\n\n\n\n<p><strong>Telegram chat  #1 offers free downloads of web shells<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"506\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_1-1-1024x506.png\" alt=\"\" class=\"wp-image-6052\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_1-1-1024x506.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_1-1-300x148.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_1-1-768x379.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_1-1-1536x758.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_1-1.png 1598w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 49 &#8211; The Telegram chatroom offers free downloads for web shells and hack tools<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Telegram chat  #2 offers free downloads of web shells<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"506\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_2-1-1024x506.png\" alt=\"\" class=\"wp-image-6054\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_2-1-1024x506.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_2-1-300x148.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_2-1-768x379.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_2-1-1536x758.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/tg_2-1.png 1598w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 50 &#8211; The Telegram chatroom offers free downloads of the latest web shell.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Website #1 allows users to download webshells<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"505\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_1-1-1024x505.png\" alt=\"\" class=\"wp-image-6056\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_1-1-1024x505.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_1-1-300x148.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_1-1-768x379.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_1-1-1536x758.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_1-1.png 1597w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 51 &#8211; The website presents webshells with descriptions and offers free downloads<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Website #2 allows users to download webshells<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"502\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_2-1-1024x502.png\" alt=\"\" class=\"wp-image-6057\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_2-1-1024x502.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_2-1-300x147.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_2-1-768x377.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_2-1-1536x754.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_2-1.png 1598w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 52 &#8211; The website offers free downloads of webshells with various features<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Website #3 allows users to download webshells<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"506\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_3-1-1024x506.png\" alt=\"\" class=\"wp-image-6058\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_3-1-1024x506.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_3-1-300x148.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_3-1-768x379.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_3-1-1536x758.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/website_3-1.png 1598w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 53 &#8211; The website provides free downloads of webshells along with an archive of past versions.<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-safety-recommendations-nbsp\"><strong>Safety Recommendations&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We recommend following the <a href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP<\/a> ( Open Worldwide Application Security Project) and adhere to their Top 10 safety recommendations to enhance cyber security measures<\/li>\n\n\n\n<li>Keep your systems software updated with the latest security patches<\/li>\n\n\n\n<li>Disable unwanted and outdated Content management software ( CMS ) plugins<\/li>\n\n\n\n<li>If not in use, disable the PHP functions such as exec(), shell_exec(), passthru(), system(), show_source(), proc_open(), pcntl_exec(), eval(), and assert() as they are  used in web shell for code executions<\/li>\n\n\n\n<li>If your website\/web application is using upload forms, make sure that they are secure and that they only allow listed file types to be uploaded<\/li>\n\n\n\n<li>Disable PHP execution in sensitive directories like images or uploads<\/li>\n\n\n\n<li>Do not blindly use code that you may find on online forums or websites<\/li>\n\n\n\n<li>Try to avoid installing third-party plugins.<\/li>\n\n\n\n<li>Deploy a web application firewall such as <a href=\"https:\/\/owasp.org\/www-project-modsecurity-core-rule-set\/\" target=\"_blank\" rel=\"noreferrer noopener\">ModSecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/nsacyber\/Mitigating-Web-Shells\" target=\"_blank\" rel=\"noreferrer noopener\">NSA Guidance on mitigating web shells<\/a><\/li>\n<\/ul>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Despite their simplicity, web shells are a common way for attackers to gain the ability to run commands on a server remotely and avoid detection by hiding their &#8220;error logs&#8221;. They are easy to customise, flexible and require modest programming skills. <\/p>\n\n\n\n<p>For a website or an application following bad security practices, they can be very damaging, leading to data exfiltration, installation of malware, and web page defacement.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-shreshta-blog wp-block-embed-shreshta-blog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"SsZ7iQORmk\"><a href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/having-teen-patti-fun-beware-of-malware-apps\/\">Having Teen Patti fun? Beware of malware apps!<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Having Teen Patti fun? Beware of malware apps!&#8221; &#8212; Shreshta Blog\" src=\"https:\/\/shreshtait.com\/blog\/2024\/02\/having-teen-patti-fun-beware-of-malware-apps\/embed\/#?secret=U9PsXwyWx0#?secret=SsZ7iQORmk\" data-secret=\"SsZ7iQORmk\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-shreshta-blog wp-block-embed-shreshta-blog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Ltqpmu1T0B\"><a href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/ato-scam\/\">ATO Scam<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;ATO Scam&#8221; &#8212; Shreshta Blog\" src=\"https:\/\/shreshtait.com\/blog\/2024\/02\/ato-scam\/embed\/#?secret=eFkMDQ1awt#?secret=Ltqpmu1T0B\" data-secret=\"Ltqpmu1T0B\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><span id=\"docs-internal-guid-744892bd-7fff-16f7-d362-11c84dc87428\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a web shell? A web shell is a malicious script written using commonly used web application languages such as PHP, JSP, or ASP. They provide an attacker with a easy way to attack a compromised web server via web-based vulnerabilities, and once installed on a web server&#8217;s operating system, the web shell&#8217;s facilitate [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":6220,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[42],"tags":[146,147,47,141],"class_list":["post-5873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threat-intelligence","tag-cyber-threats","tag-technical-analysis","tag-threat-intelligence","tag-web-shell"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security &amp; Threat Intelligence Blog | Shreshta<\/title>\n<meta name=\"description\" content=\"A web shell is a web interface that enables a web server to be remotely accessed to upload malicious files, website defacement etc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web shell - A primer\" \/>\n<meta property=\"og:description\" content=\"A web shell is a web interface that enables a web server to be remotely accessed to upload malicious files, website defacement etc.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-22T06:51:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-22T08:06:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vivek Halappanavar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vivek Halappanavar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/\"},\"author\":{\"name\":\"Vivek Halappanavar\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/c64614d4af8864471d219faeb1bee518\"},\"headline\":\"Web shell &#8211; A primer\",\"datePublished\":\"2024-02-22T06:51:44+00:00\",\"dateModified\":\"2024-02-22T08:06:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/\"},\"wordCount\":1609,\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Untitled-design4.png\",\"keywords\":[\"cyber threats\",\"technical analysis\",\"threat intelligence\",\"Web Shell\"],\"articleSection\":[\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Untitled-design4.png\",\"datePublished\":\"2024-02-22T06:51:44+00:00\",\"dateModified\":\"2024-02-22T08:06:07+00:00\",\"description\":\"A web shell is a web interface that enables a web server to be remotely accessed to upload malicious files, website defacement etc.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Untitled-design4.png\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Untitled-design4.png\",\"width\":500,\"height\":500,\"caption\":\"Web shell example PHP code\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/web-shell-a-primer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web shell &#8211; A primer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"},[{\"@type\":[\"Person\"],\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/c64614d4af8864471d219faeb1bee518\",\"name\":\"Vivek Halappanavar\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/vivek.jpg\",\"inLanguage\":\"en_US\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/vivek.jpg\",\"caption\":\"Vivek Halappanavar\"}},{\"@type\":[\"Person\"],\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/c64614d4af8864471d219faeb1bee518\",\"name\":\"Swapneel Patnekar\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/vivek.jpg\",\"inLanguage\":\"en_US\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"caption\":\"Swapneel Patnekar\"}},{\"@type\":[\"Person\"],\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/c64614d4af8864471d219faeb1bee518\",\"name\":\"Pranay Patil\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/vivek.jpg\",\"inLanguage\":\"en_US\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Screenshot-2023-01-27-at-11.09.13-PM.png\",\"caption\":\"Pranay Patil\"}}]]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"A web shell is a web interface that enables a web server to be remotely accessed to upload malicious files, website defacement etc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/","og_locale":"en_US","og_type":"article","og_title":"Web shell - A primer","og_description":"A web shell is a web interface that enables a web server to be remotely accessed to upload malicious files, website defacement etc.","og_url":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_published_time":"2024-02-22T06:51:44+00:00","article_modified_time":"2024-02-22T08:06:07+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design4.png","type":"image\/png"}],"author":"Vivek Halappanavar","twitter_card":"summary_large_image","twitter_creator":"@shreshtait","twitter_site":"@shreshtait","twitter_misc":{"Written by":"Vivek Halappanavar","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/#article","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/"},"author":{"name":"Vivek Halappanavar","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/c64614d4af8864471d219faeb1bee518"},"headline":"Web shell &#8211; A primer","datePublished":"2024-02-22T06:51:44+00:00","dateModified":"2024-02-22T08:06:07+00:00","mainEntityOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/"},"wordCount":1609,"publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design4.png","keywords":["cyber threats","technical analysis","threat intelligence","Web Shell"],"articleSection":["Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/","url":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/","name":"","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/#primaryimage"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design4.png","datePublished":"2024-02-22T06:51:44+00:00","dateModified":"2024-02-22T08:06:07+00:00","description":"A web shell is a web interface that enables a web server to be remotely accessed to upload malicious files, website defacement etc.","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/#primaryimage","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design4.png","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design4.png","width":500,"height":500,"caption":"Web shell example PHP code"},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/web-shell-a-primer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Web shell &#8211; A primer"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"},[{"@type":["Person"],"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/c64614d4af8864471d219faeb1bee518","name":"Vivek Halappanavar","image":{"@type":"ImageObject","@id":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/09\/vivek.jpg","inLanguage":"en_US","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/09\/vivek.jpg","caption":"Vivek Halappanavar"}},{"@type":["Person"],"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/c64614d4af8864471d219faeb1bee518","name":"Swapneel Patnekar","image":{"@type":"ImageObject","@id":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/09\/vivek.jpg","inLanguage":"en_US","url":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","caption":"Swapneel Patnekar"}},{"@type":["Person"],"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/c64614d4af8864471d219faeb1bee518","name":"Pranay Patil","image":{"@type":"ImageObject","@id":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/09\/vivek.jpg","inLanguage":"en_US","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-27-at-11.09.13-PM.png","caption":"Pranay Patil"}}]]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/5873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=5873"}],"version-history":[{"count":238,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/5873\/revisions"}],"predecessor-version":[{"id":6345,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/5873\/revisions\/6345"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media\/6220"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=5873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/categories?post=5873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/tags?post=5873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}