fbpx

DAws: The Advanced Web Shell

There’s multiple things that makes DAws better than every Web Shell out there:

  1. Bypasses Security Systems(IPS, WAFs,etc) like Suhosin(uses up to 20 php functions just to get a command executed).
  2. Drops CGI Shells and communicate with them to bypass Security Systems.
  3. Uses the SSH Authorized Keys method to bypass Security Systems.
  4. Uses Shellshock in 2 methods to bypass Security Systems.
  5. Is completely Post Based and uses a XOR Encryption based on a random
    key that gets generated with every new session + private base64
    functions to bypass Security Systems.
  6. Supports Windows and Linux.
  7. Finds a writeable and readable directory and moves there if it’s a
    web directory; DAws will output everything in that found directory.
  8. Drops a php.ini and a .htaccess file that clears all disablers incase “suphp” was installed.
  9. Has an advanced File Manager.
  10. Everything is done automatically so there’s nothing for the user to worry about.
  11. Open Source.
  12. and much more (check the source for more information; everything is well commented)

The shell now checks if it can CHMOD a directory(by comparing the values of the directory and the current process’s owners) instead of just skipping one that doens’t meat the requirements when looking for “DAws’s directory”.

You can now “Wipe” a file instead of just Deleting it which makes it mostly impossible to get it recovered. DAws will simply replace the old file bytes with null ones, this isn’t a very good “wiper” but it gets the job done pretty well.

Added File Owner and User’s Group to the File Manager. Having this information is needed and should’ve been here since the beginning because the permissions makes no sense without it and I kept pushing this update because it’s not “that” important since DAws checks everything for you but again, who cares? It’s here now, enjoy lol.

You can now execute Python, Perl and Ruby code on Windows.

Download now.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...