On Wed, Jul 6, 2022 at 8:33 AM Yehuda Katz <yehuda@xxxxxxxxxx> wrote:Your log doesn't start early enough. Someone uploaded a web shell (or found an existing web shell) to your server, possibly using an upload for that doesn't validate the input, then used that shell to run commands on your server.Here is another old log paste https://zerobin.net/?a4d9f5b146676594#hkpTU0ljaG5W0GUNVEsaYqvffQilrXavBmbK+V9mzUw=
175.141.226.202 - - [19/Jun/2022:03:35:03 +0530] "GET /dashboard/upload/wordpdf/origiinal-shellbackdoor-anonymous-bypass-kak827j.php?path=/var/www/html HTTP/1.1"
I would like to know what other details / analysis we need to perform to find out how the attacker got access and what time the backdoor was installed and through what vulnerability they exploited ?I request your tips to investigate further and to find the root cause of this kind of attack and how to prevent it in future..??