/Oops-Webshell

Oops, It's funny to detect a webshell

Primary LanguageYARA

webshell的检测

检测方法通常有

  • 基于日志,行为,流量
  • 基于Machine Learning ,Fuzzy Hash, Code Features

此处初期选择采用以下方法

  • 文件 hash 比较以及 fuzzy hash ([已知文件|未知文件]) (ssdeep)
  • 代码特征值,危险函数检测 (yara 3.6.0)
  • 机器学习,分类 CNN-Text-Classfication

Other

Design Also Include A CLI, Flask As Web Server

curl -i -X POST -F filedata=@1.php "http://test:test@localhost:5000/detect"

curl -i -X PUT -F filedata=@1.php -F filedata=@2.php -F filedata=@3.php "http://test:test@localhost:5000/detectdir"

curl -i -X POST -F filedata=@1.php "http://test:test@localhost:5000/saveblack"

curl -i -X POST -F filedata=@1.php "http://test:test@localhost:5000/savewhite"

To do

  • Write Unit Test,Mock Test

  • Write Yara Rule

  • GAN ? Important (Mei you zhong wen shu ru fa de jie guo...)

  • Test