Check the safety of your team with Tiger

Tiger is a application It can be used both to perform system security audits and to detect intrusions. Its operation is simple and by means of a simple command we can carry out a security test of our equipment and even obtain a log in .html format. This will make it easier for us to conduct our own subsequent searches for reported bugs, if any. Tiger will perform checks on our passwords, user accounts, ftp configuration, search for rootkits, process checks, etc.



Tiger is in the repositories of numerous distributions. If you can't find it, you can proceed to download it from its official website.

The tiger man shows us the possible variables that we can apply to the basic command "tiger". In this case, and to begin with, we will use tiger to do the security check, show the log in an .html file and save it in the directory that we indicate. For example, being root, we execute:

tiger -H -l / home / user / mislogs

With this command we have ordered tiger to perform its tests, create a .html file with the results list and save it in / home / user / mislogs. The time taken by the process may vary depending on the power of your equipment, its configuration and installed services.

To see the file, we must open it (also as root) with our web browser. For example:

firefox security.report.user-laptop.100305-13: 47.html

If you have problems opening the html file, rename it by removing the colon ":".

Ready. Now we “only” have to read the log and start investigating what it announces.

homesite: nongnu.org/tiger

Seen in | linux-zone


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.