- play_arrow Set Up
- play_arrow Juniper Advanced Threat Prevention Cloud Overview
- play_arrow Enroll SRX Series Firewalls to Juniper Advanced Threat Prevention Cloud
- play_arrow Configure Security Policies on SRX Series Firewall
- play_arrow Configure SRX Series Firewall
- Configure the SRX Series Firewall to Block Outbound Requests to a C&C Host
- Configure the SRX Series Firewall to Block Infected Hosts
- Configure Reverse Proxy on the SRX Series Firewall
- Configure the IMAP Emails Policy on the SRX Series Firewall
- Configure the SMTP Emails Policy on the SRX Series Firewall
-
- play_arrow Configuration Statements and Operational Commands
- play_arrow SRX Series Firewall Commands to Configure Juniper ATP Cloud
-
- play_arrow Use Cases
- play_arrow SecIntel Feeds for MX Series Routers
- play_arrow Amazon Web Services GuardDuty with vSRX Virtual Firewall
- play_arrow Juniper ATP Cloud with Policy Enforcer
-
- play_arrow Troubleshoot
- Juniper ATP Cloud Troubleshooting Overview
- Troubleshooting Juniper ATP Cloud: Checking DNS and Routing Configurations
- Troubleshooting Juniper ATP Cloud: Checking Certificates
- Troubleshooting Juniper ATP Cloud: Checking the Routing Engine Status
- Troubleshooting Juniper ATP Cloud: Checking the Application-Identification License
- Viewing Juniper ATP Cloud System Log Messages
- Configure Traceoptions
- View the Traceoptions Log File
- Turning Off Traceoptions
- Juniper ATP Cloud Dashboard Reports Not Displaying
- Juniper ATP Cloud RMA Process
- play_arrow More Documentation
- play_arrow Additional Documentation on Juniper.net
-
Configure Reverse Shell Detection
Configure Reverse Shell Detection on SRX Series Firewall
A reverse shell allows the attacker to bypass firewalls and other security mechanisms to open the ports to the target system. It takes advantage of the vulnerabilities in the target system to start a shell session and access the system remotely. Reverse shell detection helps you to detect shell attacks and prevent potential data thefts. For more information, see Juniper Advanced Threat Prevention Cloud User Guide.
To enable reverse shell detection on SRX Series Firewalls, include the following CLI configurations:
Configure the security intelligence (SecIntel) profile and policy.
content_copy zoom_out_mapservices security-intelligence profile RevShellProfile category Reverse-Shell services security-intelligence profile RevShellProfile rule RevShellRule1 match threat-level 7 services security-intelligence profile RevShellProfile rule RevShellRule1 match threat-level 8 services security-intelligence profile RevShellProfile rule RevShellRule1 match threat-level 9services security-intelligence profile RevShellProfile rule RevShellRule1 match threat-level 10 services security-intelligence profile RevShellProfile rule RevShellRule1 then action permit services security-intelligence profile RevShellProfile rule RevShellRule1 then logservices security-intelligence policy secintel_policy Reverse-Shell RevShellProfile
Assign the SecIntel policy to a security firewall policy.
content_copy zoom_out_mapset security policies from-zone trust to-zone untrust policy atp_policy then permit application-services security-intelligence-policy secintel_policyset security policies from-zone untrust to-zone trust policy atp_policy then permit application-services security-intelligence-policy secintel_policy
Use the show services security-intelligence statistics
command to view the
SecIntel statistics.
show services security-intelligence statistics Logical system: root-logical-system Category Whitelist: Profile Whitelist: Total processed sessions: 1816 Permit sessions: 0 Reverse shell permit sessions: 0 Category Blacklist: Profile Blacklist: Total processed sessions: 1816 Block drop sessions: 0 Category CC: Profile feed-cc-log-only: Total processed sessions: 0 Permit sessions: 0 Block drop sessions: 0 Block close sessions: 0 Close redirect sessions: 0 Profile secintel_profile: Total processed sessions: 116 Permit sessions: 0 Block drop sessions: 0 Block close sessions: 0 Close redirect sessions: 0 Category Infected-Hosts: Profile ih_profile: Total processed sessions: 116 Permit sessions: 0 Block drop sessions: 0 Block close sessions: 0 Close redirect sessions: 0 Category Reverse-Shell: Profile RevShellProfile: Total processed sessions: 116 Permit sessions: 0 Block drop sessions: 0 Block close sessions: 0 Close redirect sessions: 0
Use the show services security-intelligence category summary
command to
view the summary of SecIntel category.
show services security-intelligence category summary Category name :Whitelist Status :Enable Description :Whitelist data Update interval :300s TTL :3456000s Feed name :whitelist_domain logical-system:root-logical-system Vrf name :junos-default-vrf Version :20230714.1 Objects number:0 Create time :2023-07-14 10:05:33 PDT Update time :2023-09-06 13:21:14 PDT Update status :N/A Expired :Yes Status :Active Options :N/A Feed name :whitelist_ip logical-system:root-logical-system Vrf name :junos-default-vrf Version :20230714.1 Objects number:0 Create time :2023-07-14 10:05:31 PDT Update time :2023-09-06 13:21:14 PDT Update status :N/A Expired :Yes Status :Active Options :N/A Feed name :whitelist_reverse_shell_domain logical-system:root-logical-system Vrf name :junos-default-vrf Version :20230629.2 Objects number:1 Create time :2023-08-22 21:05:02 PDT Update time :2023-09-06 13:21:14 PDT Update status :Store succeeded Expired :No Status :Active Options :N/A Feed name :whitelist_reverse_shell_ip logical-system:root-logical-system Vrf name :junos-default-vrf Version :20230823.2 Objects number:1 Create time :2023-08-22 21:04:48 PDT Update time :2023-09-06 13:21:14 PDT Update status :Store succeeded Expired :No Status :Active Options :N/A