/Hunt Catalog/web.md

https://github.com/randomuserid/Adama · Markdown · 117 lines · 116 code · 1 blank · 0 comment · 0 complexity · 934cf68fd55e39ab93d6281b21ff1115 MD5 · raw file

  1. Searches for attacks on web servers and applications using web service logs
  2. | Category | Search Name |
  3. |----------------------|--------------------------------------------------------------------------------|
  4. | Execution | .htaccess access |
  5. | Execution | .htaccess request |
  6. | Execution | /etc/shadow detected in uri |
  7. | Behavioral Detection | /system32/ in uri - possible protected directory access attempt |
  8. | Behavioral Detection | coldfusion adminapi access |
  9. | Behavioral Detection | coldfusion adminapi access |
  10. | Behavioral Detection | coldfusion adminapi access |
  11. | Behavioral Detection | coldfusion administrator access |
  12. | Behavioral Detection | coldfusion administrator access |
  13. | Behavioral Detection | coldfusion administrator access |
  14. | Behavioral Detection | coldfusion administrator access |
  15. | Behavioral Detection | coldfusion administrator access |
  16. | Behavioral Detection | coldfusion componentutils access |
  17. | Execution | crlf injection - newline characters in url - %0d%0a |
  18. | Execution | exploit suspected php injection attack (cmd=) |
  19. | Behavioral Detection | http pass= in cleartext |
  20. | Execution | php easteregg request |
  21. | Behavioral Detection | php setup activity |
  22. | Execution | tilde in uri - potential .php~ source disclosure vulnerability |
  23. | Behavioral Detection | web-php phpinfo access |
  24. | Behavioral Detection | web-php phpinfo access |
  25. | Execution | wordpress google doc embedder local file inclusion attempt |
  26. | Execution | wp generic revslider arbitrary file download |
  27. | Execution | /cgi-bin/../in uri - possible protected directory access attempt |
  28. | Execution | /etc/ activity in web requests |
  29. | Execution | /etc/passwd in web request |
  30. | Behavioral Detection | Anomalous encoding in request |
  31. | Behavioral Detection | Anomalous referrer |
  32. | Behavioral Detection | Anonymizer activity |
  33. | Behavioral Detection | Asterix |
  34. | Execution | Attempt to get sql server version in uri using select version |
  35. | Execution | Binary data in web request |
  36. | Behavioral Detection | Bugzilla |
  37. | Behavioral Detection | Burp activity |
  38. | Behavioral Detection | Cgi scripts |
  39. | Behavioral Detection | Cisco telephony service |
  40. | Behavioral Detection | Citrix |
  41. | Behavioral Detection | Cold fusion |
  42. | Execution | Cross site scripting (xss) |
  43. | Behavioral Detection | Denied by server configuration |
  44. | Behavioral Detection | Directory index forbidden |
  45. | Execution | Directory traversal |
  46. | Execution | Downloads from ip addresses |
  47. | Behavioral Detection | Dprk / apt37 user agent |
  48. | Execution | Drupal 2019-6340 |
  49. | Execution | Drupalgeddon |
  50. | Execution | Drupalgeddon 2 |
  51. | Behavioral Detection | Excessive use of a feature of method |
  52. | Execution | Exploits - xss |
  53. | Execution | Exploits - xss |
  54. | Behavioral Detection | Extraclient access: unvalidated data in request |
  55. | Behavioral Detection | Flash activity |
  56. | Behavioral Detection | Invalid uri "invalid uri in request" or "uri too long" or "file name too long" |
  57. | Behavioral Detection | Jsp |
  58. | Behavioral Detection | Kubernetes access from the internet |
  59. | Execution | Large http request |
  60. | Behavioral Detection | Linux /tmp reference - /tmp |
  61. | Behavioral Detection | Linux commands - curl,chmod,echo,exec, wget |
  62. | Behavioral Detection | Long byte counts in web requests |
  63. | Behavioral Detection | Long uris with null referrers |
  64. | Behavioral Detection | Long user agent strings |
  65. | Behavioral Detection | Magento admin request |
  66. | Behavioral Detection | Metadata request |
  67. | Execution | Mssql command shell - xp_cmdshell |
  68. | Behavioral Detection | Mysqlmanager activity |
  69. | Execution | Noop sled - /x90 |
  70. | Execution | Null user agents |
  71. | Behavioral Detection | One time token reuse |
  72. | Execution | Pass= or passw= or password= in uri |
  73. | Execution | Passw=' or pass=' in uri |
  74. | Execution | Pcrat/gh0st |
  75. | Execution | Php errors - php warning: php fatal error: php parse error: |
  76. | Behavioral Detection | Php net utils |
  77. | Behavioral Detection | Phpmyadmin activity |
  78. | Behavioral Detection | Phpmyadmin activity |
  79. | Behavioral Detection | Phpmyadmin activity |
  80. | Execution | Possible php attack |
  81. | Execution | Process activity in web requests |
  82. | Execution | Rci - environment variable in http request |
  83. | Behavioral Detection | Rdp request |
  84. | Execution | Remote command injection |
  85. | Execution | Remote command injection |
  86. | Execution | Rm or rm -rf activity |
  87. | Execution | Script interpreter user agent |
  88. | Execution | Sensitive file access |
  89. | Execution | Server side template injection |
  90. | Execution | Shell commands in web request |
  91. | Execution | Shell_exec in web request |
  92. | Execution | Sql command in uri |
  93. | Execution | Sql injection |
  94. | Execution | Sql injection - windows |
  95. | Execution | Sql injection local file access attempt using load_file |
  96. | Execution | Sql statements in uris |
  97. | Execution | Suspicious user agents |
  98. | Execution | Thinkphp getshell rci |
  99. | Behavioral Detection | Token use by different ip addresses |
  100. | Behavioral Detection | Token use by different user agents |
  101. | Behavioral Detection | Tomcat admin access |
  102. | Behavioral Detection | Unauthorized response codes to scripted requests |
  103. | Behavioral Detection | Uri contains ephemeral port |
  104. | Behavioral Detection | Uri contains jsesssionid= |
  105. | Behavioral Detection | Uri contains password or pass string |
  106. | Behavioral Detection | Uri contains username string |
  107. | Execution | Waf alert |
  108. | Execution | Waf deny |
  109. | Behavioral Detection | Web scanner |
  110. | Execution | Web shells |
  111. | Execution | Wget or curl commands in web request |
  112. | Execution | Windows command - cmd.exe or cmd |
  113. | Behavioral Detection | Wordpress |
  114. | Execution | Wordpress / wordfence attack detect |
  115. | Execution | Wp jetpack twenty fifteen xss |
  116. | Behavioral Detection | Yabb activity |