Server Software Component: Web Shell

Cybrary
Course

Bad actors can gain persistence on your network by abusing software development features that allow legitimate developers to extend server applications. In this way, they can install malicious code for later use. Learn to detect and thwart this activity and protect your network.

Time
1 hour 10 minutes
Difficulty
Intermediate
CEU/CPE
1
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Module 1: Prophet Spider Introduction
Campaign Overview
10m
Module 2: Server Software Component: Web Shell

2.1What is a Web Shell?

15m

2.2Detection, Validation, and Mitigation (Lab)

45m
Course Description

Your organization's enterprise server applications likely offer the flexibility of extensible features that your software developers can build upon so things work the way you need them to. However, bad actors can take advantage of that capability and use it to insert malicious code. In this way, they can achieve persistence on your network.

It's important to master the skills for detecting and mitigating this type of activity so you can keep attackers from reaching their end goals.

Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the financially motivated threat group Prophet Spider. Prevent adversaries from achieving persistence in your environment today.

Instructed By
Chris Daywalt
Chris Daywalt
Security Freelancer
Instructor
Matthew Mullins
Matthew Mullins
Technical Manager, Red Team
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Server Software Component: Web Shell Certificate of Completion