Hola amigos.
En esta ocasión,
vamos a ver las vulnerabilidades que tiene nuestro propio sistema
Linux. Para ello, vamos a utilizar Lynis, que ya está instalado
previamente en nuestro Kali.
Si ponemos lynis,
nos sale la ayuda:
[ Lynis 2.6.2 ]
################################################################################
Lynis comes with
ABSOLUTELY NO WARRANTY. This is free software, and you are
welcome to
redistribute it under the terms of the GNU General Public License.
See the LICENSE
file for details about using this software.
2007-2018, CISOfy
- https://cisofy.com/lynis/
Enterprise support
available (compliance, plugins, interface and tools)
################################################################################
[+] Initializing
program
------------------------------------
Usage: lynis
command [options]
Command:
audit
audit system
: Perform local security scan
audit system
remote <host> : Remote security scan
audit
dockerfile <file> : Analyze Dockerfile
show
show
: Show all commands
show version
: Show Lynis version
show help
: Show help
update
update info
: Show update details
Options:
--no-log
: Don't create a log file
--pentest
: Non-privileged scan (useful for pentest)
--profile
<profile> : Scan the system with the given
profile file
--quick (-Q)
: Quick mode, don't wait for user input
Layout options
--no-colors
: Don't use colors in output
--quiet (-q)
: No output
--reverse-colors
: Optimize color display for light backgrounds
Misc options
--debug
: Debug logging to screen
--view-manpage
(--man) : View man page
--verbose
: Show more details on screen
--version (-V)
: Display version number and quit
Enterprise
options
--plugin-dir
"<path>" : Define path of available
plugins
--upload
: Upload data to central node
More options
available. Run '/usr/sbin/lynis show options', or use the man page.
Si ponemos
lynis audit system
Como véis, nos
auditará nuestro propio sistema.
Y si ponemos
lynis audit system
–pentest
Nos hará pruebas de
pentesting.
No hay comentarios:
Publicar un comentario
Nota: solo los miembros de este blog pueden publicar comentarios.