<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>auditing Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/auditing/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/auditing/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Mon, 22 Mar 2021 13:35:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>auditing Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/auditing/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Linux Security Auditing With Lynis</title>
		<link>http://kostacipo.stream/linux-security-auditing-with-lynis/</link>
					<comments>http://kostacipo.stream/linux-security-auditing-with-lynis/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 22 Mar 2021 13:35:37 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[auditing]]></category>
		<category><![CDATA[linux]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2069</guid>

					<description><![CDATA[<p>Installing Lynis Lynis is an extensible security audit tool for computer systems running Linux, FreeBSD, macOS, OpenBSD, Solaris, and other Unix derivatives. It assists system administrators and security professionals with scanning a system and its security defenses, with the final goal being system hardening. Lynis is available as a package for most Linux distributions, we [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/linux-security-auditing-with-lynis/">Linux Security Auditing With Lynis</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="g1-content-narrow g1-typography-xl entry-content">
<h1><b>Installing Lynis</b></h1>
<p>Lynis is an extensible security audit tool for computer systems running Linux, FreeBSD, macOS, OpenBSD, Solaris, and other Unix derivatives. It assists system administrators and security professionals with scanning a system and its security defenses, with the final goal being system hardening.</p>
<p>Lynis is available as a package for most Linux distributions, we can install it by running the following command:<br />
<strong><span style="font-family: terminal, monaco, monospace;">sudo apt install lynis</span></strong></p>
<p>To display all the options and commands available, we can run the following command:<br />
<strong><span style="font-family: terminal, monaco, monospace;">lynis show options</span></strong></p>
<p>Before we get started with scanning, we need to ensure that Lynis is up to date. To check if we are running the latest version we can run the following command:</p>
<div class="showyourterms dark nostatusbar" data-title="Terminal">
<div>
<div class="command" data-line="0"><strong><span style="font-family: terminal, monaco, monospace;">sudo lynis update info</span></strong></div>
</div>
</div>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-2968 lazyloaded" src="https://hackersploit.org/wp-content/uploads/2021/03/image4-1.png" sizes="(max-width: 640px) 100vw, 640px" srcset="https://hackersploit.org/wp-content/uploads/2021/03/image4-1.png 778w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-300x162.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-768x416.png 768w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-561x304.png 561w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-364x197.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-728x394.png 728w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-608x329.png 608w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-758x410.png 758w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-89x48.png 89w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-177x96.png 177w" alt="" width="640" height="346" data-expand="600" data-src="https://hackersploit.org/wp-content/uploads/2021/03/image4-1.png" data-srcset="https://hackersploit.org/wp-content/uploads/2021/03/image4-1.png 778w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-300x162.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-768x416.png 768w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-561x304.png 561w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-364x197.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-728x394.png 728w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-608x329.png 608w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-758x410.png 758w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-89x48.png 89w, https://hackersploit.org/wp-content/uploads/2021/03/image4-1-177x96.png 177w" data-sizes="(max-width: 640px) 100vw, 640px" /></p>
<h2><b>System Auditing With Lynis</b></h2>
<p>To perform a system audit with Lynis we run the following command:<br />
<strong><span style="font-family: terminal, monaco, monospace;">sud</span></strong></p>
<p>Lynis will output a lot of information that will also be stored under the /var/log/lynis.log file for easier access. The summary of the system audit will reveal important information about your system’s security posture and various security misconfigurations and vulnerabilities.</p>
<p>Lynis will also generate output on how these vulnerabilities and misconfigurations can be fixed or tweaked.</p>
<p><img decoding="async" class="alignnone wp-image-2969 lazyloaded" src="https://hackersploit.org/wp-content/uploads/2021/03/image5-1.png" sizes="(max-width: 608px) 100vw, 608px" srcset="https://hackersploit.org/wp-content/uploads/2021/03/image5-1.png 952w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-300x201.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-768x514.png 768w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-180x120.png 180w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-561x375.png 561w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-364x244.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-728x487.png 728w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-608x407.png 608w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-758x507.png 758w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-72x48.png 72w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-143x96.png 143w" alt="" width="608" height="407" data-expand="600" data-src="https://hackersploit.org/wp-content/uploads/2021/03/image5-1.png" data-srcset="https://hackersploit.org/wp-content/uploads/2021/03/image5-1.png 952w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-300x201.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-768x514.png 768w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-180x120.png 180w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-561x375.png 561w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-364x244.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-728x487.png 728w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-608x407.png 608w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-758x507.png 758w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-72x48.png 72w, https://hackersploit.org/wp-content/uploads/2021/03/image5-1-143x96.png 143w" data-sizes="(max-width: 608px) 100vw, 608px" /></p>
<p>The output also contains a hardening index score that is rated out of 100, this is used to give you a trackable tangible score of your system’s current security posture.</p>
<p>Lynis will also display any potential warnings that will indicate a severe security vulnerability or misconfiguration that needs to be fixed or patched, in this case, we have no warnings.</p>
<p><img decoding="async" class="alignnone size-full wp-image-2970 lazyloaded" src="https://hackersploit.org/wp-content/uploads/2021/03/image6-1.png" sizes="(max-width: 434px) 100vw, 434px" srcset="https://hackersploit.org/wp-content/uploads/2021/03/image6-1.png 434w, https://hackersploit.org/wp-content/uploads/2021/03/image6-1-300x88.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image6-1-364x107.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image6-1-163x48.png 163w, https://hackersploit.org/wp-content/uploads/2021/03/image6-1-326x96.png 326w" alt="" width="434" height="128" data-expand="600" data-src="https://hackersploit.org/wp-content/uploads/2021/03/image6-1.png" data-srcset="https://hackersploit.org/wp-content/uploads/2021/03/image6-1.png 434w, https://hackersploit.org/wp-content/uploads/2021/03/image6-1-300x88.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image6-1-364x107.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image6-1-163x48.png 163w, https://hackersploit.org/wp-content/uploads/2021/03/image6-1-326x96.png 326w" data-sizes="(max-width: 434px) 100vw, 434px" /></p>
<p>To increase our hardening index score, Lynis provides us with helpful suggestions that detail the various security configurations we need to make.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-2967 lazyloaded" src="https://hackersploit.org/wp-content/uploads/2021/03/image3-1.png" sizes="auto, (max-width: 629px) 100vw, 629px" srcset="https://hackersploit.org/wp-content/uploads/2021/03/image3-1.png 1100w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-300x186.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-1024x634.png 1024w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-768x475.png 768w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-561x347.png 561w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-364x225.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-728x451.png 728w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-608x376.png 608w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-758x469.png 758w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-78x48.png 78w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-155x96.png 155w" alt="" width="629" height="390" data-expand="600" data-src="https://hackersploit.org/wp-content/uploads/2021/03/image3-1.png" data-srcset="https://hackersploit.org/wp-content/uploads/2021/03/image3-1.png 1100w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-300x186.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-1024x634.png 1024w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-768x475.png 768w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-561x347.png 561w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-364x225.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-728x451.png 728w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-608x376.png 608w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-758x469.png 758w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-78x48.png 78w, https://hackersploit.org/wp-content/uploads/2021/03/image3-1-155x96.png 155w" data-sizes="(max-width: 629px) 100vw, 629px" /></p>
<p>After following the suggestions and making the necessary changes, we can run the system audit with Lynis again.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-2966 lazyloaded" src="https://hackersploit.org/wp-content/uploads/2021/03/image2-1.png" sizes="auto, (max-width: 637px) 100vw, 637px" srcset="https://hackersploit.org/wp-content/uploads/2021/03/image2-1.png 861w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-300x177.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-768x452.png 768w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-561x330.png 561w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-364x214.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-728x429.png 728w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-608x358.png 608w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-758x446.png 758w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-82x48.png 82w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-163x96.png 163w" alt="" width="637" height="375" data-expand="600" data-src="https://hackersploit.org/wp-content/uploads/2021/03/image2-1.png" data-srcset="https://hackersploit.org/wp-content/uploads/2021/03/image2-1.png 861w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-300x177.png 300w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-768x452.png 768w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-561x330.png 561w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-364x214.png 364w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-728x429.png 728w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-608x358.png 608w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-758x446.png 758w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-82x48.png 82w, https://hackersploit.org/wp-content/uploads/2021/03/image2-1-163x96.png 163w" data-sizes="(max-width: 637px) 100vw, 637px" /></p>
<p>As shown above, there is a significant improvement in the hardening index score that confirms the changes and configurations we made are applied and effective.</p>
<h2><b>Pentest With Lynis</b></h2>
<p>Lynis also has the ability to simulate a privileged/internal pentest on the system, this can be invoked by using the following command:<br />
<strong><span style="font-family: terminal, monaco, monospace;">sudo lynis &#8211;pentest</span></strong></p>
<p>This will perform a pentest on the system and will output a hardening index score that reflects the overall security posture of the system.</p>
</div>
<p>The post <a href="http://kostacipo.stream/linux-security-auditing-with-lynis/">Linux Security Auditing With Lynis</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/linux-security-auditing-with-lynis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
