Title | Size | Downloads |
---|---|---|
V7-WAF-1.0.33.dat | 1.99 MB |
Version number
V7-WAF-1.0.33
MD5 number
5b4c230c6ee46d20652b14bfdaffd5bb
Update time
2024-07-22
Update attack list
Key new rules:
------------------------------
49114 Phpjackal_Webshell_Upload
---- Category: Vulnerability
---- Description:
---- PHPJackal is a website Webshell management tool . Using the uploaded webshell,you can execute arbitrary commands under the authority of the web server, and can bypass most of the WAF and probe devices currently on the market.
49119 Ajax_php_Webshell_File_Manage
---- Category: Vulnerability
---- Description:
---- Ajax_PHP is a website Webshell management tool . Using the uploaded webshell, you can execute arbitrary commands under the authority of the web server, and can bypass most of the WAF and probe devices currently on the market.
49124 PHP_SERVER_WebShell_-_Weevely_-_Upload
---- Category: Vulnerability
---- Description:
---- Weevely is a web shell tool written by python, which integrates the generation and connection of web shells. This rule identifies the backdoor files generated by weevely.
49126 PHP_Webshell_B4TM4N_Connection_Success
---- Category: Vulnerability
---- Description:
---- B4TM4N webshell is a PHP backdoor. This tool is an arsenal written in PHP language, used to achieve remote access to web servers through Webshell. Hackers can use this tool to break through website servers and engage in illegal activities through Webshell. Note that this tool can not only access web servers, but also perform high-risk operations such as stealing passwords, uploading files, modifying, and executing commands.