Webshells: History, Techniques, Obfuscation and Automated Collection

A session at TakeDownCon St. Louis

Tuesday 4th June, 2013

2:00pm to 2:50pm (CST)

I wrote a little script to periodically look through my web logs for unique RFIs and Web Shells, and then collect them on one page where I can go look at them or download them to add to my Web Shell library. Many of these attacks are repeated multiple time, so I ignore the time fields in judging if an RFI/Web Shell is unique. I’ve coded it to weed out links to Web Shells that 404. I also use nofollow and a referrer hiding service so it does not look like I’m attacking anyone with the web shells (but the check for 404 sort of looks suspicious). This page will also let you link off to firebwall.com where you can use their PHP decoder to look at the obfuscated code. Enjoy my Web Shell zoo, it should update itself every hour or so. If you see your domain on the list of websites hosting Web Shells you are likely pwned and should clean up your server.

About the speaker

This person is speaking at this event.
Adrian Crenshaw

Consultant, IronGeek.com

Sign in to add slides, notes or videos to this session

Tell your friends!


Time 2:00pm2:50pm CST

Date Tue 4th June 2013

Short URL


Official event site


View the schedule


See something wrong?

Report an issue with this session