Lynis 3.0: Open source auditing program on Linux system

Lynis is a control tool open source. It is used by system administrators, security professionals, and penetration testers to assess the security defenses of Linux and UNIX-based systems.

It runs on the host itself, so it performs more extensive security scans than vulnerability scanners.

Supported operating systems

Lynis runs on almost all UNIX-based systems and versions, including:

  • AIX
  • FreeBSD
  • HP-UX
  • Linux
  • MacOS
  • NetBSD
  • OpenBSD
  • Solaris
  • and other

It even runs on Raspberry Pi or QNAP devices.

Optional installation

Lynis is lightweight and easy to use. The installation is optional: just copy it to a system and use the "./lynis audit system" command to start the security scan.

It is written in a script shell and is released as open source software (GPL). Software packages are available from the project repository.

Use

Runs hundreds of individual tests. Each test helps determine a system's security status. What happens during of a scan with Lynis:

Steps

  1. Identify the operating system
  2. Search for available tools and utilities
  3. Check for Lynis updates
  4. Perform tests with enabled plugins
  5. Perform safety tests by category
  6. Report the status of the security scan

In addition to the data shown in , all technical details about the scan are stored in a log file. Any findings (alerts, suggestions, data collection) are saved in a report file.

Snapshots ς

You can download it from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).