Redundant Access - Webshells for evading defenses and persistence.
This demo assumes a server compromise and that the attacker has already uploaded a webshell to the compromised host for persistence.
Below illustrates the existence of a simple webshell on a compromised Windows 2008R at 10.0.0.6 running IIS web service. It also shows output of the classic system enumeration commands -
Note that this particular webshell's HTTP requests are sent to the webserver via POST method which means that looking at the IIS web logs will not allow you to see what commands were executed using the webshell. The only things you will just will be a bunch of POST requests to the
However, if you are collecting network traffic data, you can see the attacker's commands and their outputs:
Looking at sysmon process creation logs, we can immediately identify nefarious behaviour - we can see multiple enumeration commands being invoked from
c:\windows\system\inetsrv working directory under a
ISS\APPOOL\DefaultAppPool user - this should not happen under normal circumstances and should raise your suspicion: