'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2025-08-19 | |
| Rule Name: | Tool Supershell Detection - HTTP Login | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | Supershell is a Web-based C2 remote control platform that obtains interactive shells through reverse SSH tunnels and supports payloads across multiple architectures. This rule is designed to detect thekeep-alive traffic generated bySSH tunnels. | |
| Impact: | Attackers use attack tools to attack targets, which can lead to data leakage, service interruption, system crash, data tampering, and illegal access. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| 1. Scan the server file system to ensure that no hacking tools and related malicious files are left. 2. Make a complete system backup to ensure the security of server data. 3. Secure the server, restrict access rights, install firewalls, and use secure access control lists. |