PHP Malware - Hiding A Payload

  Рет қаралды 651

Ripple Software Consulting

Ripple Software Consulting

2 жыл бұрын

PHP Malware - Hiding A Payload
PHP Security
Date: January 12, 2022
Author: Joseph Lee
Comments: 0 Comments
Categories: Information Technology, IT Security, Malware Analysis, PHP, Software
In part 1 of this series on PHP malware, we learned what a web shell is and looked at some basic examples. Basic web-shells are not too difficult to find since there are only so many commands that can be used to execute a string as a shell command.
However, most attackers would not include a basic web shell such as the ones discussed in the first video. They know it would be much too easy to find and dwell time would be short. Instead the attacker will encode or encrypt the malware so it is more difficult to find. Also, there is an important difference between encrypting and encoding. Before we look at some more advanced ways to hide malware, let’s understand the difference between these two terms.
What is Encoding?
Encoding refers to the process of converting data from one form to another. Encoding does not normally imply that the encryptor is trying to hide or protect the contents from being discovered. Therefore decoding is usually a simple process once you know how the data has been encoded and some encoding schemes are easy to guess by looking at the data. For example, Mp3 and WAV are both standard audio encoding formats, and similarly JPEG, PNG, and GIF are all image encoding formats.
Another common encoding format is Base64. It’s an effective way to encode binary data that needs to pass through a firewall, web-application firewall (WAF), or other appliance that might not allow special characters because base64 encodes any binary data into only human readable characters. If someone does not know that the data has been encoded, it may look like random letters and numbers.
Base64 can be used to hide text, or code from being easily searched for or read in human readable language, although it doesn’t do a great job of hiding it because the same input will always have the same base64 output, and also because security malware hunters already know to look out for base64 encoded data. So, if you are searching an application’s source code for the string ‘eval(’ in order to hunt down any potential web shells, you can also search for the string ‘ZXZhbCg=’ to include its base64 equivalent.
What is Encrypting?
On the other hand, encryption refers to converting the data into a cipher-code, (also known as cipher-text) which is meant to maintain confidentiality of the data and prevent unauthorized access. This requires a known algorithm or standard process to be used so that the cipher-text can be returned to plain-text by (and hopefully only by) the authorized person.
Other Types of Obfuscation
So, to recap, the main purpose of encoding is not hide the data’s contents, but it can serve that purpose, while the purpose of encryption is always to hide. However, there are other ways to obfuscate some code from being easily discovered. In the next part of this series on PHP malware, we will cover some other types of obfuscation found in documented PHP malware samples.

Пікірлер: 3
@demetriusburgess8201
@demetriusburgess8201 2 жыл бұрын
Amazing video! quick and informative. 🔥
@badrdriouch1258
@badrdriouch1258 2 жыл бұрын
Thanks Bro ❤❤. Keep Going !!
@senju31
@senju31 Жыл бұрын
Keep up the good work!
PHP Malware - Basic Web Shells For Remote Code Execution
12:02
Ripple Software Consulting
Рет қаралды 2,5 М.
What is Nessus Vulnerability Scanner?
13:43
Ripple Software Consulting
Рет қаралды 1,6 М.
БОЛЬШОЙ ПЕТУШОК #shorts
00:21
Паша Осадчий
Рет қаралды 9 МЛН
Самое Романтичное Видео ❤️
00:16
Глеб Рандалайнен
Рет қаралды 6 МЛН
ОСКАР ИСПОРТИЛ ДЖОНИ ЖИЗНЬ 😢 @lenta_com
01:01
Final muy increíble 😱
00:46
Juan De Dios Pantoja 2
Рет қаралды 53 МЛН
Use Arc Instead of Vec
15:21
Logan Smith
Рет қаралды 138 М.
Google Data Center 360° Tour
8:29
Google Cloud Tech
Рет қаралды 5 МЛН
What is Snyk Software Security Product?
9:39
Ripple Software Consulting
Рет қаралды 469
Shortcutting Hidden Malware on USB Drives
5:25
Cosmodium CyberSecurity
Рет қаралды 28 М.
How does HTTPS work? What's a CA? What's a self-signed Certificate?
11:02
Git MERGE vs REBASE
16:12
Academind
Рет қаралды 1 МЛН
Threat Intel Log4J - The Landscape
7:56
Ripple Software Consulting
Рет қаралды 23
The Only Unbreakable Law
53:25
Molly Rocket
Рет қаралды 318 М.
ОБСЛУЖИЛИ САМЫЙ ГРЯЗНЫЙ ПК
1:00
VA-PC
Рет қаралды 1,7 МЛН
Опять съемные крышки в смартфонах? #cmf
0:50
В России ускорили интернет в 1000 раз
0:18
Короче, новости
Рет қаралды 1,8 МЛН
Hisense Official Flagship Store Hisense is the champion What is going on?
0:11
Special Effects Funny 44
Рет қаралды 2,9 МЛН
Simple maintenance. #leddisplay #ledscreen #ledwall #ledmodule #ledinstallation
0:19
LED Screen Factory-EagerLED
Рет қаралды 29 МЛН