skip to main content
10.1145/2872427.2882992acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells

Published:11 April 2016Publication History

ABSTRACT

Web shells are malicious scripts that attackers upload to a compromised web server in order to remotely execute arbitrary commands, maintain their access, and elevate their privileges. Despite their high prevalence in practice and heavy involvement in security breaches, web shells have never been the direct subject of any study. In contrast, web shells have been treated as malicious blackboxes that need to be detected and removed, rather than malicious pieces of software that need to be analyzed and, in detail, understood. In this paper, we report on the first comprehensive study of web shells. By utilizing different static and dynamic analysis methods, we discover and quantify the visible and invisible features offered by popular malicious shells, and we discuss how attackers can take advantage of these features. For visible features, we find the presence of password bruteforcers, SQL database clients, portscanners, and checks for the presence of security software installed on the compromised server. In terms of invisible features, we find that about half of the analyzed shells contain an authentication mechanism, but this mechanism can be bypassed in a third of the cases. Furthermore, we find that about a third of the analyzed shells perform homephoning, i.e., the shells, upon execution, surreptitiously communicate to various third parties with the intent of revealing the location of new shell installations. By setting up honeypots, we quantify the number of third-party attackers benefiting from shell installations and show how an attacker, by merely registering the appropriate domains, can completely take over all installations of specific vulnerable shells.

References

  1. JohnTroony's php-webshells repository. https://github.com/JohnTroony/php-webshells.Google ScholarGoogle Scholar
  2. Nikicat's web-malware-collection repository. https://github.com/nikicat/web-malware-collection/tree/master/Backdoors/PHP.Google ScholarGoogle Scholar
  3. Tennc's webshell repository. https://github.com/tennc/webshell/.Google ScholarGoogle Scholar
  4. UnPHP, the Online PHP Decoder. http://www.unphp.net/.Google ScholarGoogle Scholar
  5. Web Shells and RFIs Collection. http://www.irongeek.com/i.php?page=webshells-and-rfis.Google ScholarGoogle Scholar
  6. M. Abu Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A Multifaceted Approach to Understanding the Botnet Phenomenon. In Internet Measurement Conference (IMC), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Aiken et al. Moss: A system for detecting software plagiarism, 2005. https://theory.stanford.edu/ aiken/moss/.Google ScholarGoogle Scholar
  8. S. Alrwais, K. Yuan, E. Alowaisheq, Z. Li, and X. Wang. Understanding the Dark Side of Domain Parking. In Proceedings of the 23rd USENIX Security Symposium, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. VirusTotal. https://www.virustotal.com/.Google ScholarGoogle Scholar
  10. A. Brandt. Malicious PHP Scripts on the Rise. http://www.webroot.com/blog/2011/02/22/malicious-php-scripts-on-the-rise/.Google ScholarGoogle Scholar
  11. D. Canali and D. Balzarotti. Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web. In 20th Annual Network & Distributed System Security Symposium (NDSS), 2013.Google ScholarGoogle Scholar
  12. D. Canali, D. Balzarotti, and A. Francillon. The role of web hosting providers in detecting compromised websites. In Proceedings of the 22Nd International Conference on World Wide Web, pages 177--188, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Cova, C. Kruegel, and G. Vigna. There is no free phish: An analysis of "free" and live phishing kits. In Proceedings of the 2Nd Conference on USENIX Workshop on Offensive Technologies (WOOT), pages 4:1--4:8, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Dahse and T. Holz. Simulation of Built-in PHP Features for Precise Static Code Analysis. In Symposium on Network and Distributed System Security (NDSS), 2014. Google ScholarGoogle ScholarCross RefCross Ref
  15. Google Hacking Database (GHDB). https://www.exploit-db.com/google-hacking-database/.Google ScholarGoogle Scholar
  16. S. Englehardt, C. Eubank, P. Zimmerman, D. Reisman, and A. Narayanan. OpenWPM: An Automated Platform for Web Privacy Measurement. Manuscript, 2015.Google ScholarGoogle Scholar
  17. C. Holmes. Malware Lateral Movement: A Primer. https://www.fireeye.com/blog/executive-perspective/2015/08/malware_lateral_move.html, 2015.Google ScholarGoogle Scholar
  18. T. Holz. A Short Visit to the Bot Zoo. Security & Privacy, IEEE, 3(3):76--79, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D. Kesmodel. The Domain Game: How People Get Rich from Internet Domain Names. Xlibris Corporation, 2008.Google ScholarGoogle Scholar
  20. J. Kim, D.-H. Yoo, H. Jang, and K. Jeong. "webshark 1.0: A benchmark collection for malicious web shell detection. In Journal of Information Processing Systems (JIPS), 2015.Google ScholarGoogle Scholar
  21. J. Kornblum. Identifying Almost Identical Files Using Context Triggered Piecewise Hashing. Digit. Investig., 3, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Nazario. http://web.archive.org/web/20120722073150/http://ddos.arbornetworks.com/2008/04/netbot-attacker-anti-cnn-tool/, 2008.Google ScholarGoogle Scholar
  23. NeoPI: Detection of web shells using statistical methods. https://github.com/Neohapsis/NeoPI.Google ScholarGoogle Scholar
  24. N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van Acker, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. You are what you include: Large-scale evaluation of remote javascript inclusions. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 736--747. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. OWASP : Testing for Local File Inclusion. https://www.owasp.org/index.php/Testing_for_Local_File_Inclusion.Google ScholarGoogle Scholar
  26. OWASP : Testing for Remote File Inclusion. https://www.owasp.org/index.php/Testing_for_Remote_File_Inclusion.Google ScholarGoogle Scholar
  27. OWASP : Unrestricted File Upload. https://www.owasp.org/index.php/Unrestricted_File_Upload.Google ScholarGoogle Scholar
  28. PHP: runkit Functions - Manual. http://php.net/manual/en/ref.runkit.php.Google ScholarGoogle Scholar
  29. PHP: Using Register Globals - Manual. http://php.net/manual/en/security.globals.php.Google ScholarGoogle Scholar
  30. R-fx Networks. Linux Malware Detect. https://www.rfxn.com/projects/linux-malware-detect/.Google ScholarGoogle Scholar
  31. R57 Shell | C99 Shell | Shell | TXT Shell | R57.php | c99.php | r57shell.net. http://www.r57shell.net/.Google ScholarGoogle Scholar
  32. Web Shell Detector. http://www.shelldetector.com/.Google ScholarGoogle Scholar
  33. Webserver Malware Scanner. http://sourceforge.net/projects/smscanner/.Google ScholarGoogle Scholar
  34. PHP Shell Detector -- web shell detection tool. http://www.emposha.com/security/php-shell-detector-web-shell-detection-tool.html, 2011.Google ScholarGoogle Scholar
  35. M. Stowe. PHP Malicious Code Scanner. http://www.mikestowe.com/2010/10/php-malicious-code-scanner.php.Google ScholarGoogle Scholar
  36. H. Sverre. c99.php - phpshell. https://helgesverre.com/c99.php.Google ScholarGoogle Scholar
  37. T. D. Tu, C. Guang, G. Xiaojun, and P. Wubin. Webshell detection techniques in web applications. In Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on, pages 1--7. IEEE, 2014.Google ScholarGoogle Scholar

Index Terms

  1. No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in
                    • Published in

                      cover image ACM Other conferences
                      WWW '16: Proceedings of the 25th International Conference on World Wide Web
                      April 2016
                      1482 pages
                      ISBN:9781450341431

                      Copyright © 2016 Copyright is held by the International World Wide Web Conference Committee (IW3C2)

                      Publisher

                      International World Wide Web Conferences Steering Committee

                      Republic and Canton of Geneva, Switzerland

                      Publication History

                      • Published: 11 April 2016

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • research-article

                      Acceptance Rates

                      WWW '16 Paper Acceptance Rate115of727submissions,16%Overall Acceptance Rate1,899of8,196submissions,23%

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader