Kali Linux Tutorial - Lynis - Penetration Testing Tools - Security Auditing Tool - Kali Linux Tools



What is Lynis ?

  • It is a computer / server scanning tool.
  • It is used to find potential security issues.
  • It performs an extensive health scan of your systems.
  • It provides guidance for the following terms:
 Lynis Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Lynis Tool - Ethical Hacking examples - Ethical Hacking programs

Alternatives of Lynis:

Secpod Saner Personal

  • Secpod saner personal is an enterprise-grade security solution, which is used for proactively accessing and securing system.
  • It is used for the following purposes:
    • To find out vulnerabilities in OS and application.
    • To identify common misconfigurations.
 Secpod Saner Personal

Learn Ethical Hacking - Ethical Hacking tutorial - Secpod Saner Personal - Ethical Hacking examples - Ethical Hacking programs

Sucuri

  • Sucurij is a web security portfolio, which is used for auditing, malware scanner and security hardening.
  • It is specialized in wordpress security.
  • It provides combination of both following terms:
    • Preventive security
    • Post-incident security services,
 Securi Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Securi Tool - Ethical Hacking examples - Ethical Hacking programs

Openvas

  • Openvas is a full-featured vulnerability scanner.
  • The OpenVas web interface runs on TCP port.
  • It is a framework of several services and tools.
  • It is used for the following responses:
    • Vulnerability scanning
    • Vulnerability management solution.
 Open Vas Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Open Vas Tool - Ethical Hacking examples - Ethical Hacking programs

Tiger

  • Tiger is a security software & Linux security tool.
  • It was developed by Douglas Lee Schales, Dave K. Hess, Kahalid Warraich and Dave R.Safford.
  • It has some features including a modular design, which is easy to expand.
  • It is used for the following purposes:
    • Security audit
    • Intrusion detection system
    • Audit tool
 Tiger Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Tiger Tool - Ethical Hacking examples - Ethical Hacking programs

Step by Step Procedures

Step 1 :

  • Open Browser. Search lynis kalilinux in browser and then install the lynis tool.

Step 2:

  • Type the command "ls" to list out the lynis-2.7.5 folder files then lynis tool is shown here.
 Command to List Lyniz Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Command to List Lyniz Tool - Ethical Hacking examples - Ethical Hacking programs

Step 3 :

  • Type the command lynis to executing lynis tool then the tool is loading. The help commands & lynis tool version are displayed.
 Help Commands

Learn Ethical Hacking - Ethical Hacking tutorial - Help Commands - Ethical Hacking examples - Ethical Hacking programs

Step 4 :

  • Tool usage procedures are displayed.
 Procedures

Learn Ethical Hacking - Ethical Hacking tutorial - Procedures - Ethical Hacking examples - Ethical Hacking programs

Step 5 :

  • Some options are displayed such as Layout (which means output page configuration) , Misc means output result configuration , Enterprise means adding plugins like debin, pkg, etc.,
 Options Displayed

Learn Ethical Hacking - Ethical Hacking tutorial - Options Displayed - Ethical Hacking examples - Ethical Hacking programs

Step 6 :

  • Type the command lynis show to view all the available lynis commands.
 Type Lynis Show

Learn Ethical Hacking - Ethical Hacking tutorial - Type Lynis Show - Ethical Hacking examples - Ethical Hacking programs

Step 7 :

  • Separate commands are displayed, which are help, profiles, settings, version & etc..,
    • help - Provide a help screen
    • profiles - Show discovered audit profiles
    • settings - Show active settings
    • version - Show Lynis version
 Separate Commands

Learn Ethical Hacking - Ethical Hacking tutorial - Separate Commands - Ethical Hacking examples - Ethical Hacking programs

Step 8 :

  • Type lynis audit system which is used to full scanning mode, means scan your system completely.
  • System auditing is started. It will display current system os, os version, hardware, etc.,
 System Auditing

Learn Ethical Hacking - Ethical Hacking tutorial - System Auditing - Ethical Hacking examples - Ethical Hacking programs

Step 9 :

  • Plugins are scanned ( Debin plugin means my operating system name ) and generate some details like package installations. Finally, get many information.
 Plugins Scanned

Learn Ethical Hacking - Ethical Hacking tutorial - Plugins Scanned - Ethical Hacking examples - Ethical Hacking programs

Step 10 :

  • Here Systems Boot and Services are scanned, it will shows booting and services issues and the status displayed.
 System Boot and Services

Learn Ethical Hacking - Ethical Hacking tutorial - System Boot and Services - Ethical Hacking examples - Ethical Hacking programs

Step 11 :

  • Finally the results are displayed which means scanning is completed and issues are displayed. Then, 5 warnings are shown which means this systems security level is poor and also some tips for rectifying the issues.
 Result and Warnings Displayed

Learn Ethical Hacking - Ethical Hacking tutorial - Result and Warnings Displayed - Ethical Hacking examples - Ethical Hacking programs

Step 12 :

  • Finally, the output files stored in /var/log/lynis.log which means the output files are stored in .log and .dat formats.
 Output File Stored

Learn Ethical Hacking - Ethical Hacking tutorial - Output File Stored - Ethical Hacking examples - Ethical Hacking programs

Step 13 :

 Open Files

Learn Ethical Hacking - Ethical Hacking tutorial - Open Files - Ethical Hacking examples - Ethical Hacking programs

Step 14 :

  • Go to Other locations and click computer
 Click Computer

Learn Ethical Hacking - Ethical Hacking tutorial - Click Computer - Ethical Hacking examples - Ethical Hacking programs

Step 15 :

  • Search and Open var folder.
 Open Var Folder

Learn Ethical Hacking - Ethical Hacking tutorial - Open Var Folder - Ethical Hacking examples - Ethical Hacking programs

Step 16 :

  • Click log folder.
 Click Log Folder

Learn Ethical Hacking - Ethical Hacking tutorial - Click Log Folder - Ethical Hacking examples - Ethical Hacking programs

Step 17 :

  • The output files are stored here.
 Output Stored

Learn Ethical Hacking - Ethical Hacking tutorial - Output Stored - Ethical Hacking examples - Ethical Hacking programs

Step 18 :



Related Searches to Lynis - Penetration Testing Tools - Security Auditing Tool