<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prevent abnormal PHP webshell by Snort2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/prevent-abnormal-php-webshell-by-snort2/m-p/5044735#M1110096</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have experienced the PHP webshell from the public webserver. Luckily, it was detected by 3rd party vendor and blocked successfully. [1][2] Most of all, I want to protect it by the Snort 2 on our environment at the first stage. But I want to know which rule I should need to enable it and drop it. Could you kindly advise?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device: Cisco ASA 5516-X&lt;/P&gt;&lt;P&gt;OS: FTD 7.0.6.1&lt;/P&gt;&lt;P&gt;Snort version: 2&lt;/P&gt;&lt;P&gt;Reference&lt;/P&gt;&lt;P&gt;[1]&amp;nbsp;&lt;A href="https://www.virustotal.com/gui/file/426ae4cfacc597706bbc0f540ae234843e916987c828ec69ae7df4d8c912464d/detection" target="_blank"&gt;VirusTotal - File - 426ae4cfacc597706bbc0f540ae234843e916987c828ec69ae7df4d8c912464d&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[2]&amp;nbsp;&lt;A href="https://www.talosintelligence.com/sha_searches" target="_blank"&gt;Talos File Reputation Lookup || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Mar 2024 04:55:07 GMT</pubDate>
    <dc:creator>alexseo</dc:creator>
    <dc:date>2024-03-20T04:55:07Z</dc:date>
    <item>
      <title>Prevent abnormal PHP webshell by Snort2</title>
      <link>https://community.cisco.com/t5/network-security/prevent-abnormal-php-webshell-by-snort2/m-p/5044735#M1110096</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have experienced the PHP webshell from the public webserver. Luckily, it was detected by 3rd party vendor and blocked successfully. [1][2] Most of all, I want to protect it by the Snort 2 on our environment at the first stage. But I want to know which rule I should need to enable it and drop it. Could you kindly advise?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device: Cisco ASA 5516-X&lt;/P&gt;&lt;P&gt;OS: FTD 7.0.6.1&lt;/P&gt;&lt;P&gt;Snort version: 2&lt;/P&gt;&lt;P&gt;Reference&lt;/P&gt;&lt;P&gt;[1]&amp;nbsp;&lt;A href="https://www.virustotal.com/gui/file/426ae4cfacc597706bbc0f540ae234843e916987c828ec69ae7df4d8c912464d/detection" target="_blank"&gt;VirusTotal - File - 426ae4cfacc597706bbc0f540ae234843e916987c828ec69ae7df4d8c912464d&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[2]&amp;nbsp;&lt;A href="https://www.talosintelligence.com/sha_searches" target="_blank"&gt;Talos File Reputation Lookup || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 04:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-abnormal-php-webshell-by-snort2/m-p/5044735#M1110096</guid>
      <dc:creator>alexseo</dc:creator>
      <dc:date>2024-03-20T04:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent abnormal PHP webshell by Snort2</title>
      <link>https://community.cisco.com/t5/network-security/prevent-abnormal-php-webshell-by-snort2/m-p/5045112#M1110101</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1675068"&gt;@alexseo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The IOCs should be part of your signatures assuming that you have the proper licenses in use, if it is something that needs some tweaking then you need to create a customized snort Rule for it.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptd-fdm-license.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptd-fdm-license.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 11:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-abnormal-php-webshell-by-snort2/m-p/5045112#M1110101</guid>
      <dc:creator>Ruben Cocheno</dc:creator>
      <dc:date>2024-03-20T11:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent abnormal PHP webshell by Snort2</title>
      <link>https://community.cisco.com/t5/network-security/prevent-abnormal-php-webshell-by-snort2/m-p/5045996#M1110178</link>
      <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286810"&gt;@Ruben Cocheno&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I have the proper licenses (Base, Threat, and Malware) already, and in use for a long time.&lt;/P&gt;&lt;P&gt;Most of all, I want to protect the general webshell using the Snort2 rule. I tried to find the general webshell rule in Snort 2, but do not know which one I should need to enable it to drop it as there are many similar rules.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The source code of webshell that I experienced. (See the Source code.png)&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The attached figure (see the Talos_Result.png)shows the "DETECTION ALIASES" from this source code file, but hard to match it in the Snort 2.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Is there any way to find the exact/similar rule in the Snort2? Please kindly advise.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thank you.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2024 02:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-abnormal-php-webshell-by-snort2/m-p/5045996#M1110178</guid>
      <dc:creator>alexseo</dc:creator>
      <dc:date>2024-03-21T02:09:16Z</dc:date>
    </item>
  </channel>
</rss>

