Event Analysis: Detecting Compromises, Javascript, Backdoors, and more!
by Paul Asadoorian on March 3, 2011
There are a variety of indicators that a system has been compromised, ranging from the obvious to the very subtle.
Less obvious indications of a compromise include increased bandwidth, subtle IDS alerts (such as those indicating anomalous behavior) and mysterious configuration changes on systems. The questions that are typically asked include "How did they get in?" and "What did they do?" Tenable's Passive Vulnerability Scanner (PVS) provides useful information for answering these questions. Following are some of the alerts PVS may generate during an intrusion: