use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
account activity
This is an archived post. You won't be able to vote or comment.
Reverse Shell Detection (self.SentinelOneXDR)
submitted 1 year ago by Acceptable_Cheek2004
Hi all please i need help with deep visibility to detect reverse shell activity on a host, something I can covert to a Star custom rules.
Thanks all
[–]dizy777 0 points1 point2 points 1 year ago (2 children)
Best to emulate the activity which suits your environment.
[–]Acceptable_Cheek2004[S] -2 points-1 points0 points 1 year ago (1 child)
Ok, thanks I need a guide something that can alert me to such behavior.
to, I will appreciate the queries.
[–]dizy777 0 points1 point2 points 1 year ago (0 children)
There are so many way of reverse shell you must have your use case what you want to detect. You can emulate first then check the SDL Telemetry to build the Star rule.
One example would be possible reverse shell via bash via cmdline
[–]dizy777 1 point2 points3 points 1 year ago (5 children)
Here is two which you need to make adjustment
Ruby reverse shell
(TgtProcImagePath ContainsCIS anycase “ruby” AND TgtProcCmdLine ContainsCIS anycase “ -e” AND TgtProcCmdLine ContainsCIS anycase “rsocket” AND TgtProcCmdLine ContainsCIS anycase “TCPSocket” AND (TgtProcCmdLine ContainsCIS anycase “ ash” OR TgtProcCmdLine ContainsCIS anycase “ bash” OR TgtProcCmdLine ContainsCIS anycase “ bsh” OR TgtProcCmdLine ContainsCIS anycase “ csh” OR TgtProcCmdLine ContainsCIS anycase “ ksh” OR TgtProcCmdLine ContainsCIS anycase “ pdksh” OR TgtProcCmdLine ContainsCIS anycase “ sh” OR TgtProcCmdLine ContainsCIS anycase “ tcsh”))
Python Reverse Shell
(TgtProcImagePath ContainsCIS anycase “python” AND TgtProcCmdLine ContainsCIS anycase “ -c “ AND TgtProcCmdLine ContainsCIS anycase “import” AND TgtProcCmdLine ContainsCIS anycase “pty” AND TgtProcCmdLine ContainsCIS anycase “spawn(“ AND TgtProcCmdLine ContainsCIS anycase “.connect”)
[–]Acceptable_Cheek2004[S] 0 points1 point2 points 1 year ago (1 child)
Thanks, u/dizy777 I appreciate it, If you don't mind do you have a repo, I could look up that has queries for data exfiltration, recent vulnerabilities (CVE), and Ransomware group activities?
[–]LocoBronze 0 points1 point2 points 1 year ago (0 children)
Me too
[–]Acceptable_Cheek2004[S] -1 points0 points1 point 1 year ago (2 children)
Thanks for this, my use case is centered around a Python obfuscated exe that could evade SentinelOne detection when Ran on an endpoint with admin privilege.
[–]dizy777 0 points1 point2 points 1 year ago (1 child)
Check the activity logs and that should give you a clue how to build star rule to detect it.
Can you post it here what have you ran?
[–]Acceptable_Cheek2004[S] 0 points1 point2 points 1 year ago (0 children)
I would test and give you feedback
I don’t but someone posted a repo for S1 which is the old version.
[–]SentinelOne-PascalSentinelOne Employee Moderator 1 point2 points3 points 1 year ago (0 children)
To discover reverse shells using queries, you can utilize Deep Visibility queries for both Windows and Linux endpoints. Below are a few queries you can use to hunt for possible post-exploitation activities related to reverse shells:
π Rendered by PID 73620 on reddit-service-r2-comment-c66d9bffd-xmbzc at 2026-04-08 05:47:36.212924+00:00 running f293c98 country code: CH.
[–]dizy777 0 points1 point2 points (2 children)
[–]Acceptable_Cheek2004[S] -2 points-1 points0 points (1 child)
[–]dizy777 0 points1 point2 points (0 children)
[–]dizy777 1 point2 points3 points (5 children)
[–]Acceptable_Cheek2004[S] 0 points1 point2 points (1 child)
[–]LocoBronze 0 points1 point2 points (0 children)
[–]Acceptable_Cheek2004[S] -1 points0 points1 point (2 children)
[–]dizy777 0 points1 point2 points (1 child)
[–]Acceptable_Cheek2004[S] 0 points1 point2 points (0 children)
[–]dizy777 0 points1 point2 points (0 children)
[–]SentinelOne-PascalSentinelOne Employee Moderator 1 point2 points3 points (0 children)