Kali Linux Tutorial - Lynis - Penetration Testing Tools - Security Auditing Tool - Kali Linux Tools
What is Lynis ?
- It is a computer / server scanning tool.
- It is used to find potential security issues.
- It performs an extensive health scan of your systems.
- It provides guidance for the following terms:
- Auditing
- System hardening
- Compliance testing
- Vulnerability detection and
- Penetration testing

Learn Ethical Hacking - Ethical Hacking tutorial - Lynis Tool - Ethical Hacking examples - Ethical Hacking programs
Alternatives of Lynis:
Secpod Saner Personal
- Secpod saner personal is an enterprise-grade security solution, which is used for proactively accessing and securing system.
- It is used for the following purposes:
- To find out vulnerabilities in OS and application.
- To identify common misconfigurations.

Learn Ethical Hacking - Ethical Hacking tutorial - Secpod Saner Personal - Ethical Hacking examples - Ethical Hacking programs
Sucuri

Learn Ethical Hacking - Ethical Hacking tutorial - Securi Tool - Ethical Hacking examples - Ethical Hacking programs
Openvas
- Openvas is a full-featured vulnerability scanner.
- The OpenVas web interface runs on TCP port.
- It is a framework of several services and tools.
- It is used for the following responses:
- Vulnerability scanning
- Vulnerability management solution.

Learn Ethical Hacking - Ethical Hacking tutorial - Open Vas Tool - Ethical Hacking examples - Ethical Hacking programs
Read Also
Tiger
- Tiger is a security software & Linux security tool.
- It was developed by Douglas Lee Schales, Dave K. Hess, Kahalid Warraich and Dave R.Safford.
- It has some features including a modular design, which is easy to expand.
- It is used for the following purposes:
- Security audit
- Intrusion detection system
- Audit tool

Learn Ethical Hacking - Ethical Hacking tutorial - Tiger Tool - Ethical Hacking examples - Ethical Hacking programs
Step by Step Procedures
Step 1 :
- Open Browser. Search lynis kalilinux in browser and then install the lynis tool.
Step 2:
- Type the command "ls" to list out the lynis-2.7.5 folder files then lynis tool is shown here.

Learn Ethical Hacking - Ethical Hacking tutorial - Command to List Lyniz Tool - Ethical Hacking examples - Ethical Hacking programs
Step 3 :
- Type the command
lynis
to executing lynis tool then the tool is loading. The help commands & lynis tool version are displayed.

Learn Ethical Hacking - Ethical Hacking tutorial - Help Commands - Ethical Hacking examples - Ethical Hacking programs
Step 4 :
- Tool usage procedures are displayed.

Learn Ethical Hacking - Ethical Hacking tutorial - Procedures - Ethical Hacking examples - Ethical Hacking programs
Step 5 :
- Some options are displayed such as Layout (which means output page configuration) , Misc means output result configuration , Enterprise means adding plugins like debin, pkg, etc.,

Learn Ethical Hacking - Ethical Hacking tutorial - Options Displayed - Ethical Hacking examples - Ethical Hacking programs
Step 6 :
- Type the command lynis show to view all the available lynis commands.

Learn Ethical Hacking - Ethical Hacking tutorial - Type Lynis Show - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 7 :
- Separate commands are displayed, which are help, profiles, settings, version & etc..,
- help - Provide a help screen
- profiles - Show discovered audit profiles
- settings - Show active settings
- version - Show Lynis version

Learn Ethical Hacking - Ethical Hacking tutorial - Separate Commands - Ethical Hacking examples - Ethical Hacking programs
Step 8 :
- Type lynis audit system which is used to full scanning mode, means scan your system completely.
- System auditing is started. It will display current system os, os version, hardware, etc.,

Learn Ethical Hacking - Ethical Hacking tutorial - System Auditing - Ethical Hacking examples - Ethical Hacking programs
Step 9 :
- Plugins are scanned ( Debin plugin means my operating system name ) and generate some details like package installations. Finally, get many information.

Learn Ethical Hacking - Ethical Hacking tutorial - Plugins Scanned - Ethical Hacking examples - Ethical Hacking programs
Step 10 :
- Here Systems Boot and Services are scanned, it will shows booting and services issues and the status displayed.

Learn Ethical Hacking - Ethical Hacking tutorial - System Boot and Services - Ethical Hacking examples - Ethical Hacking programs
Step 11 :
- Finally the results are displayed which means scanning is completed and issues are displayed. Then, 5 warnings are shown which means this systems security level is poor and also some tips for rectifying the issues.

Learn Ethical Hacking - Ethical Hacking tutorial - Result and Warnings Displayed - Ethical Hacking examples - Ethical Hacking programs
Step 12 :
- Finally, the output files stored in /var/log/lynis.log which means the output files are stored in .log and .dat formats.

Learn Ethical Hacking - Ethical Hacking tutorial - Output File Stored - Ethical Hacking examples - Ethical Hacking programs
Step 13 :
- Open files in Kali Linux

Learn Ethical Hacking - Ethical Hacking tutorial - Open Files - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 14 :
- Go to Other locations and click computer

Learn Ethical Hacking - Ethical Hacking tutorial - Click Computer - Ethical Hacking examples - Ethical Hacking programs
Step 15 :
- Search and Open var folder.

Learn Ethical Hacking - Ethical Hacking tutorial - Open Var Folder - Ethical Hacking examples - Ethical Hacking programs
Step 16 :
- Click log folder.

Learn Ethical Hacking - Ethical Hacking tutorial - Click Log Folder - Ethical Hacking examples - Ethical Hacking programs
Step 17 :
- The output files are stored here.

Learn Ethical Hacking - Ethical Hacking tutorial - Output Stored - Ethical Hacking examples - Ethical Hacking programs
Step 18 :
- If you want to learn about Ethical Hacking Course & Kali Linux Tutorial , you can refer the following links Ethical Hacking Training in Chennai , Ethical Hacking tutorial , Hacking Course , Ethical Hacking Course in Chennai