<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: avoid threat: PHP Webshell Access(36180) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-threat-php-webshell-access-36180/m-p/25855#M18861</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Hello Phoenix&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;if I setup this exception; would we be exposed to this type of attack?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;EM&gt;Backdoor:PHP/WebShell.A is a backdoor trojan that allows unauthorized access and control of an affected computer by a remote attacker. The backdoor is written in PHP format and can affect both Windows and Linux operating systems.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;A href="http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Backdoor:PHP/WebShell.A"&gt;&lt;EM&gt;http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Backdoor:PHP/WebShell.A&lt;/EM&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I prefer that alerted me to this threat, but I also like to avoid registering false positives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the most recommended option (Action)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 Dec 2013 17:03:39 GMT</pubDate>
    <dc:creator>soporteseguridad</dc:creator>
    <dc:date>2013-12-23T17:03:39Z</dc:date>
    <item>
      <title>avoid threat: PHP Webshell Access(36180)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-threat-php-webshell-access-36180/m-p/25853#M18859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How to avoid this threat: PHP Webshell Access (36180). From Zone Trust, Zone to Untrust.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/10455_pastedImage_1.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Dec 2013 15:20:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-threat-php-webshell-access-36180/m-p/25853#M18859</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2013-12-23T15:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: avoid threat: PHP Webshell Access(36180)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-threat-php-webshell-access-36180/m-p/25854#M18860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello COS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we have to avoid the threat 36180. Find which security rule is used for Trust to Untrust. In that security rule find the Vulnerability profile. Go to that Vulnerability profile in the Objects Tab &amp;gt; Vulnerability profile Exceptions tab.&lt;/P&gt;&lt;P&gt;Select "show all signatures" search for the threat id 36180. Now chose the action "allow" so that the threat will not be seen in the logs any more. If you want to drop packets or reset or any other action you can select too. But the option Allow only will not log it and all other options would log them.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Vuln-1.png" class="jive-image" height="326" src="https://live.paloaltonetworks.com/legacyfs/online/10447_Vuln-1.png" style="width: 678.255033557047px; height: 326px;" width="678" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Dec 2013 15:44:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-threat-php-webshell-access-36180/m-p/25854#M18860</guid>
      <dc:creator>Phoenix</dc:creator>
      <dc:date>2013-12-23T15:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: avoid threat: PHP Webshell Access(36180)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-threat-php-webshell-access-36180/m-p/25855#M18861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Hello Phoenix&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;if I setup this exception; would we be exposed to this type of attack?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;EM&gt;Backdoor:PHP/WebShell.A is a backdoor trojan that allows unauthorized access and control of an affected computer by a remote attacker. The backdoor is written in PHP format and can affect both Windows and Linux operating systems.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;A href="http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Backdoor:PHP/WebShell.A"&gt;&lt;EM&gt;http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Backdoor:PHP/WebShell.A&lt;/EM&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I prefer that alerted me to this threat, but I also like to avoid registering false positives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the most recommended option (Action)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Dec 2013 17:03:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-threat-php-webshell-access-36180/m-p/25855#M18861</guid>
      <dc:creator>soporteseguridad</dc:creator>
      <dc:date>2013-12-23T17:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: avoid threat: PHP Webshell Access(36180)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-threat-php-webshell-access-36180/m-p/25856#M18862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well first of all, did you really verify that this actually was a false positive?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so you could save a recording of the traffic and send to PA so they could update this threatid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Besides this there is little you can do if you encounter a false positive, either you let this id be active (and analyze each alarm) or you disable this id.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that you can choose to disable this id either globally or for a specific flow - in your case if you just want to ignore this alarm you can set it to "allow" for the particular flow (so in case this shows up on some of your other webservers you will still get an alarm).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the action can be allow, block or alert. Allow is pretty obvious, block means drop the session AND log while alert means allow the session AND log (while allow means no logging at all).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 07:36:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-threat-php-webshell-access-36180/m-p/25856#M18862</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2014-01-21T07:36:20Z</dc:date>
    </item>
  </channel>
</rss>

