Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Sandworm: Web Shell Emulation

Discover how Advanced Persistent Threat (APT) Actors such as Sandworm deploy web shells on vulnerable web applications for remote code execution, file upload, persistent access, and more.

Beginner
6m
(5)

Created by Matthew Lloyd Davies

Last Updated Oct 16, 2024

Course Thumbnail
  • Course

Sandworm: Web Shell Emulation

Discover how Advanced Persistent Threat (APT) Actors such as Sandworm deploy web shells on vulnerable web applications for remote code execution, file upload, persistent access, and more.

Beginner
6m
(5)

Created by Matthew Lloyd Davies

Last Updated Oct 16, 2024

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests. Adversaries often communicate with their targets using application layer protocols associated with web traffic. This avoids detection by blending in with existing traffic because commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server.

Protocols such as HTTP(S)] that carry web traffic are very common in most environments and the packets using these protocols have many fields and headers in which data can be hidden. In this course, Sandworm Team: T1505.003 Server Software Component Web Shell Emulation, you’ll learn how APTs take advantage of common web protocols to establish complex command and control networks to maintain persistence and to remain stealthy.

Sandworm: Web Shell Emulation
Beginner
6m
(5)
Table of contents

About the author
Matthew Lloyd Davies - Pluralsight course - Sandworm: Web Shell Emulation
Matthew Lloyd Davies
41 courses 4.7 author rating 47 ratings

Matt has a degree in Chemical engineering and a PhD in mathematical chemistry. He is also a GIAC certified incident handler and penetration tester and has regulated cyber security in the UK civil nuclear sector for many years.

Get started with Pluralsight