WAF Signature V7-WAF-1.0.37

Release time:2025-01-02
HomeSupportSecuritySignature Database ServicesSoftware DownloadSignature Database Services
Download
Title Size Downloads
V7-WAF-1.0.37.dat 2.14 MB

Version number
V7-WAF-1.0.37

MD5 number
41cf4914be3046ff1d6180c3b8a7d732

Update time
2024-12-25

Update attack list

Key new rules:
------------------------------
49441 WEB_SERVER_WEBSHELL_JspSpy_Communication_Behavior
---- Category: Vulnerability
---- Description:
---- The WebShell Trojan is a malicious attack on the network server. When executing the code in the Trojan, it can steal server data or obtain server administrator rights. The attacker uploads the webshell Trojan horse to the target website directory by means of file inclusion and file upload to attack websites. If this rule is matched, the WEB server is detected to be implanted with JspSpy WebShell Trojan.

 

49445 Backdoor_WebShell_Skyscorpion_Connect_Attempt
---- Category: Vulnerability
---- Description:
---- The attacker attempts to connect to the server by uploading the Behinder to control the web server (you can upload and download files, view the database, execute arbitrary program commands, etc.)

 

49450 Phpsploit_Webshell_Communication
---- Category: Vulnerability
---- Description:
---- Phpsploit is a post penetration exploitation tool that allows attackers to maintain access links with target hosts (such as compromised web servers) and implement authorization operations.

 

49477 Try_to_bypass_the_Webshell_file_upload(confused_php_Trojan_using_urldecode)
---- Category: Vulnerability
---- Description:
---- Webshell is a code execution environment in the form of asp, php, jsp, cgi and other web files. If Webshell is used by attackers, it can lead to the website server being charged, resulting in major security accidents. An attacker usually obtains Webshells through file upload vulnerabilities, but can also write webshells through remote command execution vulnerabilities or SQL injections. This use case simulates uploads using urldecode obfuscated php trojans to verify the security device's ability to detect Webshell upload attacks.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网