WEB SHELLS

THREAT HUNTING STARTING POINTS: WEB SHELLS

This post was originally published here by James Bower. In this article, we’ll be discussing a couple starting points of hunting for web shells on your network. A web shell offers varied functionality to an attacker in a single file. Imagine an attacker having command line access to your web server through an executable file placed […]

Share this page