Closing the Door on Web Shells
- Wednesday, December 3rd, 2014 at 11:00 AM EST (16:00:00 UTC)
- Anuj Soni
You can now attend the webcast using your mobile device!
While many attackers install malware on end-user workstations to accomplish their goals, external-facing servers continue to be prime targets of attack. In many of these cases, web shell backdoors are utilized by the adversary to download/upload files, execute arbitrary commands, and access back-end databases and other resources. Web shells are often heavily customized and obfuscated to evade detection. They may be only several lines of code, and they can be deployed on a variety of platforms. Every incident responder should be familiar with this dangerous category of malware so it is not overlooked during an investigation. This talk will discuss how web shells work, dive deep into several specimens, discuss approaches to detect related activity, and touch on some best practices to reduce the likelihood of seeing them on your systems.
Anuj Soni is a senior incident responder at a DC-based consulting firm. Anuj manages and executes specialized incident response techniques to detect, respond to, and mitigate sophisticated threat actors across commercial and government networks. He uses his skills in conducting host-based forensics, malicious code analysis, and advanced threat risk assessments to help clients improve their security posture. He has over 8 years of experience in incident response, forensics, malware analysis, penetration testing, and steganalysis. Anuj received his Bachelors and Masters from Carnegie Mellon University and holds the following certifications: GIAC Reverse Engineering Malware (GREM), EnCase Certified Examiner (EnCE), and Certified Information Systems Security Professional (CISSP).