Lynis 3.0: Open source auditing program on Linux system

Lynis is one ελέγχου ασφαλείας ανοιχτού . It is used by system administrators, security professionals, and penetration testers to assess the security defenses of Linux and UNIX-based systems.

It runs on the host itself, so it performs more extensive security scans than vulnerability scanners.

Supported operating systems

Lynis runs on almost all UNIX-based systems and versions, including:

  • AIX
  • FreeBSD
  • HP-UX
  • Linux
  • MacOS
  • OpenBSD
  • Solaris
  • and other

It even runs on Raspberry Pi or QNAP.

Optional installation

Lynis is lightweight and easy to use. Installation is optional: just copy it to one and use the "./lynis audit system" command to start the security scan.

It is written in a script shell and is released as open source software (GPL). Software packages are available from the project repository.

Use

Performs hundreds of individual tests. Each test helps determine the security status of the system. What happens during a scan with Lynis:

Steps

  1. Identify the operating system
  2. Search for available tools and utilities
  3. Check for Lynis updates
  4. Perform tests with enabled plugins
  5. Perform safety tests by category
  6. Report the status of the security scan

In addition to the data displayed on the screen, all technical details about the scan are stored in a log file. Any findings (warnings, suggestions, data collection) are stored in a reference file.

Application snapshots

You can download the program from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.083 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).