MEDIUMVulnerability
Global
A Little Bit Pivoting: What Web Shells are Attackers Looking for?, (Tue, Apr 7th)
Tuesday, April 7, 2026 at 06:28 PM UTC·Source: SANS ISC
Updated: Tuesday, April 7, 2026 at 06:30 PM UTC
Executive Summary
Webshells remain a popular method for attackers to maintain persistence on a compromised web server. Many "arbitrary file write" and "remote code execution" vulnerabilities are used to drop small files on systems for later execution of additional payloads. The names of these files keep changing and are often chosen to "fit in" with other files. Webshells themselves are also often used by parasitic
Analysis
Webshells remain a popular method for attackers to maintain persistence on a compromised web server. Many "arbitrary file write" and "remote code execution" vulnerabilities are used to drop small files on systems for later execution of additional payloads. The names of these files keep changing and are often chosen to "fit in" with other files. Webshells themselves are also often used by parasitic attacks to compromise a server. Sadly (?), attackers are not always selecting good passwords either. In some cases, webshells come with pre-set backdoor credentials, which may be overlooked by a less sophisticated attacker.