Kali Linux Tutorial - Lynis - Penetration Testing Tools - Security Auditing Tool - Kali Linux Tools




What is Lynis ?

  • It is a computer / server scanning tool.
  • It is used to find potential security issues.
  • It performs an extensive health scan of your systems.
  • It provides guidance for the following terms:
 Lynis Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Lynis Tool - Ethical Hacking examples - Ethical Hacking programs

Alternatives of Lynis:

Secpod Saner Personal

  • Secpod saner personal is an enterprise-grade security solution, which is used for proactively accessing and securing system.
  • It is used for the following purposes:
    • To find out vulnerabilities in OS and application.
    • To identify common misconfigurations.
 Secpod Saner Personal

Learn Ethical Hacking - Ethical Hacking tutorial - Secpod Saner Personal - Ethical Hacking examples - Ethical Hacking programs

Sucuri

  • Sucurij is a web security portfolio, which is used for auditing, malware scanner and security hardening.
  • It is specialized in wordpress security.
  • It provides combination of both following terms:
    • Preventive security
    • Post-incident security services,
 Securi Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Securi Tool - Ethical Hacking examples - Ethical Hacking programs

Openvas

  • Openvas is a full-featured vulnerability scanner.
  • The OpenVas web interface runs on TCP port.
  • It is a framework of several services and tools.
  • It is used for the following responses:
    • Vulnerability scanning
    • Vulnerability management solution.
 Open Vas Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Open Vas Tool - Ethical Hacking examples - Ethical Hacking programs

Tiger

  • Tiger is a security software & Linux security tool.
  • It was developed by Douglas Lee Schales, Dave K. Hess, Kahalid Warraich and Dave R.Safford.
  • It has some features including a modular design, which is easy to expand.
  • It is used for the following purposes:
    • Security audit
    • Intrusion detection system
    • Audit tool
 Tiger Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Tiger Tool - Ethical Hacking examples - Ethical Hacking programs

Step by Step Procedures

Step 1 :

  • Open Browser. Search lynis kalilinux in browser and then install the lynis tool.

Step 2:

  • Type the command "ls" to list out the lynis-2.7.5 folder files then lynis tool is shown here.
 Command to List Lyniz Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Command to List Lyniz Tool - Ethical Hacking examples - Ethical Hacking programs

Step 3 :

  • Type the command lynis to executing lynis tool then the tool is loading. The help commands & lynis tool version are displayed.
 Help Commands

Learn Ethical Hacking - Ethical Hacking tutorial - Help Commands - Ethical Hacking examples - Ethical Hacking programs

Step 4 :

  • Tool usage procedures are displayed.
 Procedures

Learn Ethical Hacking - Ethical Hacking tutorial - Procedures - Ethical Hacking examples - Ethical Hacking programs

Step 5 :

  • Some options are displayed such as Layout (which means output page configuration) , Misc means output result configuration , Enterprise means adding plugins like debin, pkg, etc.,
 Options Displayed

Learn Ethical Hacking - Ethical Hacking tutorial - Options Displayed - Ethical Hacking examples - Ethical Hacking programs

Step 6 :

  • Type the command lynis show to view all the available lynis commands.
 Type Lynis Show

Learn Ethical Hacking - Ethical Hacking tutorial - Type Lynis Show - Ethical Hacking examples - Ethical Hacking programs

Step 7 :

  • Separate commands are displayed, which are help, profiles, settings, version & etc..,
    • help - Provide a help screen
    • profiles - Show discovered audit profiles
    • settings - Show active settings
    • version - Show Lynis version
 Separate Commands

Learn Ethical Hacking - Ethical Hacking tutorial - Separate Commands - Ethical Hacking examples - Ethical Hacking programs

Step 8 :

  • Type lynis audit system which is used to full scanning mode, means scan your system completely.
  • System auditing is started. It will display current system os, os version, hardware, etc.,
 System Auditing

Learn Ethical Hacking - Ethical Hacking tutorial - System Auditing - Ethical Hacking examples - Ethical Hacking programs

Step 9 :

  • Plugins are scanned ( Debin plugin means my operating system name ) and generate some details like package installations. Finally, get many information.
 Plugins Scanned

Learn Ethical Hacking - Ethical Hacking tutorial - Plugins Scanned - Ethical Hacking examples - Ethical Hacking programs

Step 10 :

  • Here Systems Boot and Services are scanned, it will shows booting and services issues and the status displayed.
 System Boot and Services

Learn Ethical Hacking - Ethical Hacking tutorial - System Boot and Services - Ethical Hacking examples - Ethical Hacking programs

Step 11 :

  • Finally the results are displayed which means scanning is completed and issues are displayed. Then, 5 warnings are shown which means this systems security level is poor and also some tips for rectifying the issues.
 Result and Warnings Displayed

Learn Ethical Hacking - Ethical Hacking tutorial - Result and Warnings Displayed - Ethical Hacking examples - Ethical Hacking programs

Step 12 :

  • Finally, the output files stored in /var/log/lynis.log which means the output files are stored in .log and .dat formats.
 Output File Stored

Learn Ethical Hacking - Ethical Hacking tutorial - Output File Stored - Ethical Hacking examples - Ethical Hacking programs

Step 13 :

 Open Files

Learn Ethical Hacking - Ethical Hacking tutorial - Open Files - Ethical Hacking examples - Ethical Hacking programs

Step 14 :

  • Go to Other locations and click computer
 Click Computer

Learn Ethical Hacking - Ethical Hacking tutorial - Click Computer - Ethical Hacking examples - Ethical Hacking programs

Step 15 :

  • Search and Open var folder.
 Open Var Folder

Learn Ethical Hacking - Ethical Hacking tutorial - Open Var Folder - Ethical Hacking examples - Ethical Hacking programs

Step 16 :

  • Click log folder.
 Click Log Folder

Learn Ethical Hacking - Ethical Hacking tutorial - Click Log Folder - Ethical Hacking examples - Ethical Hacking programs

Step 17 :

  • The output files are stored here.
 Output Stored

Learn Ethical Hacking - Ethical Hacking tutorial - Output Stored - Ethical Hacking examples - Ethical Hacking programs

Step 18 :



Related Searches to Lynis - Penetration Testing Tools - Security Auditing Tool

Adblocker detected! Please consider reading this notice.

We've detected that you are using AdBlock Plus or some other adblocking software which is preventing the page from fully loading.

We don't have any banner, Flash, animation, obnoxious sound, or popup ad. We do not implement these annoying types of ads!

We need money to operate the site, and almost all of it comes from our online advertising.

Please add wikitechy.com to your ad blocking whitelist or disable your adblocking software.

×