{"id":7263,"date":"2019-01-07T10:06:00","date_gmt":"2019-01-07T10:06:00","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/?p=7263"},"modified":"2019-01-08T12:56:06","modified_gmt":"2019-01-08T12:56:06","slug":"the-unix-security-audit-and-intrusion-detection-tool","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2019\/01\/07\/the-unix-security-audit-and-intrusion-detection-tool\/","title":{"rendered":"The Unix Security Audit and Intrusion Detection Tool"},"content":{"rendered":"<p><strong>Tiger<\/strong>\u00a0is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It\u2019s a security checker written entirely in shell language and employs various POSIX tools in the backend. It\u2019s major purpose is to check the system configuration and status.<\/p>\n<p>It\u2019s very extensible than the other security tools, and has a good configuration file. It scans system configuration files, file systems, and user configuration files for possible security problems and reports them.<\/p>\n<p>In this article, we will show how to install and use Tiger security checker with basic examples in Linux.<\/p>\n<h3>How to Install Tiger Security Tool in Linux<\/h3>\n<p>On\u00a0<strong>Debian<\/strong>\u00a0and its derivatives such\u00a0<strong>Ubuntu<\/strong>\u00a0and\u00a0<strong>Linux Mint<\/strong>, you can easily install\u00a0<strong>Tiger<\/strong>\u00a0security tool from the default repositories using package manger as shown.<\/p>\n<pre>$ sudo apt install tiger \r\n<\/pre>\n<p>On other Linux distributions, you can\u00a0<a href=\"https:\/\/download.savannah.gnu.org\/releases\/tiger\/\" target=\"_blank\" rel=\"nofollow noopener\">download the latest source<\/a>\u00a0(the current stable release is\u00a0<strong>3.2.3<\/strong>, at the time of writing) and run it straight away from the terminal as as root or use the\u00a0<a href=\"https:\/\/www.tecmint.com\/sudoers-configurations-for-setting-sudo-in-linux\/\" target=\"_blank\" rel=\"noopener\">sudo command<\/a>\u00a0to gain root privileges.<\/p>\n<pre>$ wget  -c  http:\/\/download.savannah.gnu.org\/releases\/tiger\/tiger-3.2rc3.tar.gz\r\n$ tar -xzf tiger-3.2rc3.tar.gz\r\n$ cd tiger-3.2\/\r\n$ sudo .\/tiger\r\n<\/pre>\n<p>By default all checks are enabled, in the\u00a0<strong>tigerrc<\/strong>\u00a0file and you can edit it using a CLI editor of your liking to enable only the checks you are interested in:<\/p>\n<div id=\"attachment_31473\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/run-tiger-without-options.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-31473\" src=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/run-tiger-without-options.png\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" srcset=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/run-tiger-without-options.png 792w, https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/run-tiger-without-options-768x720.png 768w\" alt=\"Run Tiger Security Audit Tool on Linux\" width=\"792\" height=\"743\" data-lazy-loaded=\"true\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Run Tiger Security Audit Tool on Linux<\/p>\n<\/div>\n<p>When the security scan is complete, a security report will be generated in the log sub directory, you will see a message similar to this (where\u00a0<strong>tecmint<\/strong>\u00a0is the hostname):<\/p>\n<pre>Security report is in `log\/\/security.report.tecmint.181229-11:12'.\r\n<\/pre>\n<p>You can view the contents of the security report file using\u00a0<a href=\"https:\/\/www.tecmint.com\/13-basic-cat-command-examples-in-linux\/\" target=\"_blank\" rel=\"noopener\">cat command<\/a>.<\/p>\n<pre>$ sudo cat log\/security.report.tecmint.181229-11\\:12\r\n<\/pre>\n<div id=\"attachment_31474\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/view-security-report-file.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-31474\" src=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/view-security-report-file.png\" sizes=\"auto, (max-width: 912px) 100vw, 912px\" srcset=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/view-security-report-file.png 912w, https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/view-security-report-file-768x562.png 768w\" alt=\"View Security Report\" width=\"912\" height=\"667\" data-lazy-loaded=\"true\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">View Security Report<\/p>\n<\/div>\n<p>If you just want more information on a specific security message, run the\u00a0<strong>tigexp<\/strong>\u00a0(<strong>TIGer EXPlain<\/strong>) command and provide the\u00a0<strong>msgid<\/strong>\u00a0as an argument, where \u201c<strong>msgid<\/strong>\u201d is the text inside the\u00a0<strong>[]<\/strong>\u00a0associated with each message.<\/p>\n<p>For example, to get more information about the following messages, where\u00a0<strong>[acc001w]<\/strong>\u00a0and\u00a0<strong>[path009w]<\/strong>\u00a0are the msgids:<\/p>\n<pre>--WARN-- [acc015w] Login ID nobody has a duplicate home directory (\/nonexistent) with another user.  \r\n--WARN-- [path009w] \/etc\/profile does not export an initial setting for PATH.\r\n<\/pre>\n<p>Simply run these commands:<\/p>\n<pre>$ sudo .\/tigexp acc015w\r\n$ sudo .\/tigexp path009w\r\n<\/pre>\n<div id=\"attachment_31477\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/show-more-info-about-security-messages.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-31477\" src=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/show-more-info-about-security-messages.png\" alt=\"View Security Messages\" width=\"762\" height=\"211\" data-lazy-loaded=\"true\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">View Security Messages<\/p>\n<\/div>\n<p>If you want to insert the explanations (more information on a particular message generated by tiger) in the report, you can either run tiger with the\u00a0<code>-E<\/code>\u00a0flag.<\/p>\n<pre>$ sudo .\/tiger -E \r\n<\/pre>\n<p>Or if you have already run it, then use\u00a0<strong>tigexp<\/strong>\u00a0command with the\u00a0<strong>-F<\/strong>\u00a0flag to specify the report file, for example:<\/p>\n<pre>$ sudo .\/tigexp -F log\/security.report.tecmint.181229-11\\:12\r\n<\/pre>\n<div id=\"attachment_31475\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/view-security-report-with-messages-explanations.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-31475\" src=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/view-security-report-with-messages-explanations.png\" sizes=\"auto, (max-width: 982px) 100vw, 982px\" srcset=\"https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/view-security-report-with-messages-explanations.png 982w, https:\/\/www.tecmint.com\/wp-content\/uploads\/2019\/01\/view-security-report-with-messages-explanations-768x447.png 768w\" alt=\"View Security Report with Messages\" width=\"982\" height=\"572\" data-lazy-loaded=\"true\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">View Security Report with Messages<\/p>\n<\/div>\n<p>To generate a separate explanation file from a report file, run the following command (where\u00a0<code>-f<\/code>\u00a0is used to specify the report file):<\/p>\n<pre>$ sudo .\/tigexp -f log\/security.report.tecmint.181229-11\\:12\r\n<\/pre>\n<p>As you can see, installing\u00a0<strong>tiger<\/strong>\u00a0is not necessary. However, if you want to install it on your system for purposes of convenience, run the following commands (use\u00a0<strong>.\/configure \u2013 -help<\/strong>\u00a0to check configure script options):<\/p>\n<pre>$ .\/configure\r\n$ sudo make install\r\n<\/pre>\n<p>For more information, see the man pages under the\u00a0<strong>.\/man\/<\/strong>\u00a0sub-directory, and use the\u00a0<a href=\"https:\/\/www.tecmint.com\/13-basic-cat-command-examples-in-linux\/\" target=\"_blank\" rel=\"noopener\">cat command<\/a>\u00a0to view them. But if you have installed the package, run:<\/p>\n<pre>$ man tiger \r\n$ man tigerexp\r\n<\/pre>\n<p>Tiger project homepage:\u00a0<a href=\"https:\/\/www.nongnu.org\/tiger\/\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/www.nongnu.org\/tiger\/<\/a><\/p>\n<p><strong>Tiger<\/strong>\u00a0is a set of scripts that scan a Unix-like system looking for security problems \u2013 it\u2019s a security checker. In this article, we have shown how to install and use Tiger in Linux. Use the feedback form to ask questions or share your thoughts about this tool.<\/p>\n<p><a href=\"https:\/\/www.tecmint.com\/tiger-linux-security-audit-intrusion-detection-tool\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tiger\u00a0is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It\u2019s a security checker written entirely in shell language and employs various POSIX tools in the backend. It\u2019s major purpose is to check the system configuration and status. It\u2019s very extensible than the &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2019\/01\/07\/the-unix-security-audit-and-intrusion-detection-tool\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The Unix Security Audit and Intrusion Detection Tool&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7263","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/7263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=7263"}],"version-history":[{"count":1,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/7263\/revisions"}],"predecessor-version":[{"id":7601,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/7263\/revisions\/7601"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=7263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=7263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=7263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}