当前位置:网站首页>Ice Scorpion V4.0 attack, security dog products can be fully detected
Ice Scorpion V4.0 attack, security dog products can be fully detected
2022-08-05 03:22:00 【Safe Dog News】
Disclaimer
Solemnly declare: The technology, ideas and tools involved in this account are only for learning and communication for the purpose of safety. No one may use them for illegal purposes, otherwise the consequences will be borne by themselves!
During the past two years of large-scale offensive and defensive drills, the "Ice Scorpion" caught many defensive units by surprise and miserable.But then, in response to the characteristics of Ice Scorpion, security manufacturers have also taken measures to update their own security products.When the horn of this year's actual offensive and defensive battles was officially launched, Ice Scorpion unexpectedly attacked with the "new look of 4.0", which once again made many defensive units unable to cope with it.
Faced with this threat, the Security Dog team has updated the rule base of "Webshell killing engine" on the afternoon of July 25, 2022.At the same time, SafeDog's products also have the function of "Injecting Memory Horse" for Ice Scorpion 4.0, and the "Memory Horse Killing Engine" supports detection by default.
This article will introduce the features and defense suggestions of Ice Scorpion V4.0, hoping to help defensive units during actual combat.
One
Ice Scorpion V4.0
1.The origin of the ice scorpion
The traditional webshell management tool "Chopper" has obvious attack traffic characteristics and is easy to be intercepted by detection equipment. Attackers urgently need a webshell with encrypted communication function.Due to traffic encryption, traditional WAF and IDS devices are difficult to detect.Therefore, a dynamic binary encrypted website management client "Ice Scorpion" came into being. The threats such as web page backdoor attacks and fileless attacks brought by Bing Scorpion have brought great trouble to traditional security products.
2Ice Scorpion V4.0
"Ice Scorpion" is one of the most popular WebShell management tools. The first-generation WebShell management tool "Chopper" has obvious traffic characteristics and can be easily detected.The traffic of Ice Scorpion is encrypted, which can effectively avoid the detection of traffic devices; the "Ice Scorpion" client is developed in Java, the latest version is v4.0, the management side is cross-platform, and supports ASP/ASPX/JSP/PHP and other environments.
Figure 1
In the latest V4.0, support Java Agent fileless land injection into memory horse.
Figure 2
It can be said that the revision of the Ice Scorpion made some of the measures and methods that the defenders made against the Ice Scorpion last year go to waste.
Second
Defense Suggestions for Ice Scorpion V4.0
1, Defendable points
(1) Focus on defending against file upload, file writing, and file inclusion vulnerabilities; (2) Built-in for Ice Scorpion V4.0Analyze the traffic side of all types of webshells, and detect each type of webshells in a targeted manner; (3) Enable monitoring of abnormal system behaviors to detect dangerous behaviors such as rebound shells and execution of high-risk system commands; (4) Do a good job of checking the security baseline, revise the security baseline in time, and record and warn of suspicious behaviors of suspicious files to facilitate auditing. |
2, Security Dog Cloud Eye can detect Ice Scorpion V4.0
The new-generation cloud host intrusion monitoring and security management platform "Cloud Eye" has functions such as "Webshell killing" and "Memory horse detection" that support the application of Ice Scorpion 4.0Attack detection. |
In addition, when an attacker uses the Ice Scorpion tool to connect to a virtual terminal and execute commands, functions such as "process monitoring" can also be detected.
Host Webshell killing
Figure 3
Host memory check
Figure 4
3Security Dog Cloud Armor can detect Ice Scorpion V4.0
The adaptive container security management system "Yunjia" supports functions such as "Image Webshell Scanning", "Container Webshell Scanning", and "Container Memory Horse Detection"Detect the attack of Ice Scorpion 4.0. |
In addition, when an attacker uses the Ice Scorpion tool to connect to a virtual terminal and execute commands, functions such as "process monitoring" and "behavior model" can also be detected.
Mirror Webshell killing
Figure 5
Container Webshell Killing
Figure 6
Container memory detection
Figure 7
References
https://github.com/rebeyond/Behinder
边栏推荐
- ASP.NET应用程序--Hello World
- 开发Hololens遇到The type or namespace name ‘HandMeshVertex‘ could not be found..
- Turn: Charles Handy: Who you are is more important than what you do
- Package zip is not available, but is referred to by another package.
- The pit of std::string::find return value
- sql server 安装提示用户名不存在
- In 2022, you still can't "low code"?Data science can also play with Low-Code!
- Why is the pca component not associated
- private封装
- 十五. 实战——mysql建库建表 字符集 和 排序规则
猜你喜欢
Beidou no. 3 short message terminal high slope in open-pit mine monitoring programme
presto启动成功后出现2022-08-04T17:50:58.296+0800 ERROR Announcer-3 io.airlift.discovery.client.Announcer
【七夕节】浪漫七夕,代码传情。将爱意变成绚烂的立体场景,给她(他)一个惊喜!(送代码)
Why is the pca component not associated
Kubernetes 网络入门
QT language file production
The Tanabata copywriting you want has been sorted out for you!
[论文笔记] MapReduce: Simplified Data Processing on Large Clusters
How to sort multiple fields and multiple values in sql statement
Study Notes-----Left-biased Tree
随机推荐
ffmpeg enumeration decoders, encoders analysis
龙蜥社区第二届理事大会圆满召开!理事换届选举、4 位特约顾问加入
.NET Application -- Helloworld (C#)
Developing Hololens encountered The type or namespace name 'HandMeshVertex' could not be found..
One hundred - day plan -- -- DAY2 brush
(11) Metaclass
【滤波跟踪】基于matlab无迹卡尔曼滤波惯性导航+DVL组合导航【含Matlab源码 2019期】
Call Alibaba Cloud oss and sms services
905. 区间选点
21天学习挑战赛(2)图解设备树的使用
Android实战开发-Kotlin教程(入门篇-登录功能实现 3.3)
Likou - preorder traversal, inorder traversal, postorder traversal of binary tree
[Storage] Dawning Storage DS800-G35 ISCSI maps each LUN to the server
人人都在说的数据中台,你需要关注的核心特点是什么?
Physical backup issues caused by soft links
After the large pixel panorama is completed, what are the promotion methods?
2022 High-level installation, maintenance, and removal of exam questions mock exam question bank and online mock exam
运维监控系统之Open-Falcon
leetcode - symmetric binary tree
PostgreSQL数据库 用navicat 打开表结构的时候报错 cannot update secondarysnapshot during a parallel operation 怎么解决?