• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2016
  • November
  • 19
  • Lynis – Security auditing tool for Linux, macOS, and UNIX-based systems

Lynis – Security auditing tool for Linux, macOS, and UNIX-based systems

November 19, 2016July 27, 2019 Comments Off on Lynis – Security auditing tool for Linux, macOS, and UNIX-based systems
linux auditing tool lynis

Lynis is a security auditing for UNIX derivatives like Linux, macOS, BSD, and others. It performs an in-depth security scan and runs on the system itself. The primary goal is to test security defenses and provide tips for further system hardening. It will also scan for general system information, vulnerable software packages, and possible configuration issues. Lynis was commonly used by people in the “blue team” to assess the security defenses of their systems. Nowadays, penetration testers also have Lynis in their toolkit.

We believe software should be simple, updated on a regular basis, and open. You should be able to trust, understand, and have the option to change the software. Many agree with us, as the software is being used by thousands every day to protect their systems.

Goals

The main goals are:

  • Automated security auditing
  • Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)
  • Vulnerability detection

The software (also) assists with:

  • Configuration management
  • Software patch management
  • System hardening
  • Penetration testing
  • Intrusion detection

Audience

Typical users of the software:

  • System administrators
  • Auditors
  • Security officers
  • Security professionals

Installation

Git

  1. Clone or download the project files (no compilation nor installation is required) ;
    git clone https://github.com/CISOfy/lynis
    
  2. Execute:
    ./lynis audit system
    

If you want to run the software as root, we suggest changing the ownership of the files. Use chown -R 0:0 to recursively alter the owner and group and set it to user ID 0 (root).

Package

Stable releases of Lynis are packaged and made available as RPM or DEB package. The CISOfy software repository can be used to install Lynis on systems running : CentOS, Debian, Fedora, OEL, openSUSE, RHEL, Ubuntu, and others.

Enterprise version

This software component is also part of an enterprise solution. Same quality, yet with more functionality.

Focus areas include compliance (PCI DSS, HIPAA, ISO27001, and others). The Enterprise version comes with:

  • a web interface and features a dashboard ;
  • hardening snippets ;
  • and an improvement plan.

Documentation

Full documentation: https://cisofy.com/documentation/lynis/.

 

Download here

Post navigation

ShinoBOT – The Rat/Bot Malware Simulator
CrackMapExec – Swiss army knife for pentesting Windows/Active Directory

Related Articles

Whids – Open Source Endpoint Detection System for Windows

- Firewall
October 25, 2019

Armourbird – Container Security Framework

- Firewall
September 4, 2019

PingCastle – Active Directory Security Assessment Tool

- Firewall
August 29, 2019
hacker gadgets
hacker phone covers

Recent Posts

pybeacon: dealing with Cobalt Strike beacons in Python

pybeacon: dealing with Cobalt Strike beacons in Python

January 25, 2021
Search your target in over 25TB database.

Recon Simplified with Spyse

January 25, 2021
ffuf v1.2.1 releases: Fast web fuzzer written in Go

ffuf v1.2.1 releases: Fast web fuzzer written in Go

January 25, 2021
WSuspicious - A Tool To Abuse Insecure WSUS Connections For Privilege Escalations

WSuspicious – A Tool To Abuse Insecure WSUS Connections For Privilege Escalations

January 25, 2021
PortShellCrypter: E2E encryption for multi-hop tty sessions or portshells

PortShellCrypter: E2E encryption for multi-hop tty sessions or portshells

January 24, 2021
ATMMalScan -  Tool for Windows which helps to search for malware traces on an ATM during the DFIR process

ATMMalScan – Tool for Windows which helps to search for malware traces on an ATM during the DFIR process

January 24, 2021

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs
ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook
Twitter
Google-plus
Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW