Abstract | ||
---|---|---|
Web backdoor attack is a kind of popular network attack, which can cause a serious damage to websites. In practice, cyber attackers often exploit vulnerabilities in the system or web applications to implant a backdoor to a web server. To address this challenge, static feature detection is believed to be an effective solution. However, it may also leave a potential security "hole" that could be exploited by intruders. In this paper, we propose a novel backdoor attack method called TridentShell, which can inject a webshell into the memory of web application server without leaving attack traces. Our attack is able to bypass almost all types of static detection methods. In particular, it attempts to blend itself into the web server and erase attack traces automatically, instead of encrypting or obfuscating the content of webshell to avoid detection. Besides, TridentShell can still be executed even when the webmasters restrict the access to web directory. In the evaluation, we showcase how TridentShell can successfully inject a webshell into five different types of Java application servers (covering around 87% Java application servers in the market), and can remove the attack traces on the server (increasing the detection difficulty). |
Year | DOI | Venue |
---|---|---|
2021 | 10.1007/978-3-030-91356-4_10 | INFORMATION SECURITY (ISC 2021) |
Keywords | DocType | Volume |
Backdoor attack, Webshell, Web security, Java application, Static feature detection | Conference | 13118 |
ISSN | Citations | PageRank |
0302-9743 | 0 | 0.34 |
References | Authors | |
0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xiaobo Yu | 1 | 0 | 0.34 |
Weizhi Meng | 2 | 340 | 56.49 |
Lei Zhao | 3 | 13 | 7.68 |
Yining Liu | 4 | 2 | 1.05 |