CIP Cyber

Lynis Security & System Auditing Tool

Table of Contents

P { margin-bottom: 0.08in; }A:link { }

http://www.ehacking.net/2014/03/lynis-security-system-auditing-tool.html
Lynis is an auditing tool for
Unix/Linux. It performs a security scan and determines the hardening
state of the machine. Any detected security issues will be provided
in the form of a suggestion or warning. Beside security related
information it will also scan for general system information,
installed packages and possible configuration errors. In general it
is a security and system auditing tool to harden Linux systems.

This
software aims in assisting automated auditing, hardening, software
patch management, vulnerability and malware scanning of Unix/Linux
based systems. It can be run without prior installation, so inclusion
on read only storage is possible (USB stick, cd/dvd).

Lynis
assists auditors in performing Basel II, GLBA, HIPAA, PCI DSS and SOx
(Sarbanes-Oxley) compliance audits.

Intended audience:

Security specialists, penetration testers, system auditors,
system/network managers.

Examples of audit
tests:

    – Available authentication methods
    – Expired SSL
    certificates
    – Outdated software
    – User accounts without
    password
    – Incorrect file permissions
    – Configuration errors

    Firewall auditing
     
Lynis is an audit script written in the
common shell scripting language (sh). Therefore it runs on most
systems without any adjustments. Packages are created by several
maintainers, for easier installation. Still, if one would like to use
the latest version, simply download the tarball, extract it to a
temporary directory and run the tool. 
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

LINUX GAME HACKING GUIDE 2021

In the past, most games had cheat codes, yet these days it’s more uncommon. As a programmer, I like to perceive how things work, so

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings