婷婷综合国产,91蜜桃婷婷狠狠久久综合9色 ,九九九九九精品,国产综合av

主頁 > 知識庫 > 利用lynis如何進行l(wèi)inux漏洞掃描詳解

利用lynis如何進行l(wèi)inux漏洞掃描詳解

熱門標簽:電銷機器人怎么接線路 如何分析地圖標注 電銷機器人價值 外呼系統(tǒng)坐席費計入會計哪個科目 高德地圖標注好做嗎 達亞電銷機器人官網(wǎng) 撫順地圖標注 新余高德地圖標注怎么修改 大連400電話如何申請

前言

lynis 是一款運行在 Unix/Linux 平臺上的基于主機的、開源的安全審計軟件。Lynis是針對Unix/Linux的安全檢查工具,可以發(fā)現(xiàn)潛在的安全威脅。這個工具覆蓋可疑文件監(jiān)測、漏洞、惡意程序掃描、配置錯誤等。下面一起來看看使用lynis進行l(wèi)inux漏洞掃描的相關內容吧

安裝lynis

在 archlinux 上可以直接通過 pacman 來安裝

sudo pacman -S lynis --noconfirm
resolving dependencies...
looking for conflicting packages...
 
Packages (1) lynis-2.6.4-1
 
Total Installed Size: 1.35 MiB
Net Upgrade Size:  0.00 MiB
 
:: Proceed with installation? [Y/n] 
(0/1) checking keys in keyring      [----------------------] 0%
(1/1) checking keys in keyring      [######################] 100%
(0/1) checking package integrity     [----------------------] 0%
(1/1) checking package integrity     [######################] 100%
(0/1) loading package files      [----------------------] 0%
(1/1) loading package files      [######################] 100%
(0/1) checking for file conflicts     [----------------------] 0%
(1/1) checking for file conflicts     [######################] 100%
(0/1) checking available disk space    [----------------------] 0%
(1/1) checking available disk space    [######################] 100%
:: Processing package changes...
(1/1) reinstalling lynis       [----------------------] 0%
(1/1) reinstalling lynis       [######################] 100%
:: Running post-transaction hooks...
(1/2) Reloading system manager configuration...
(2/2) Arming ConditionNeedsUpdate...

使用lynis進行主機掃描

首先讓我們不帶任何參數(shù)運行 lynis, 這會列出 lynis 支持的那些參數(shù)

[lujun9972@T520 linux和它的小伙伴]$ lynis
 
[ Lynis 2.6.4 ]
 
################################################################################
 Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
 welcome to redistribute it under the terms of the GNU General Public License.
 See the LICENSE file for details about using this software.
 
 2007-2018, CISOfy - https://cisofy.com/lynis/
 Enterprise support available (compliance, plugins, interface and tools)
################################################################################
 
 
[+] Initializing program
------------------------------------
 
 
 Usage: lynis command [options]
 
 
 Command:
 
 audit
  audit system     : Perform local security scan
  audit system remote <host> : Remote security scan
  audit dockerfile <file>  : Analyze Dockerfile
 
 show
  show       : Show all commands
  show version     : Show Lynis version
  show help      : Show help
 
 update
  update info     : Show update details
 
 
 Options:
 
 --no-log       : Don't create a log file
 --pentest       : Non-privileged scan (useful for pentest)
 --profile <profile>    : Scan the system with the given profile file
 --quick (-Q)      : Quick mode, don't wait for user input
 
 Layout options
 --no-colors      : Don't use colors in output
 --quiet (-q)      : No output
 --reverse-colors     : Optimize color display for light backgrounds
 
 Misc options
 --debug       : Debug logging to screen
 --view-manpage (--man)   : View man page
 --verbose       : Show more details on screen
 --version (-V)     : Display version number and quit
 
 Enterprise options
 --plugindir <path>    : Define path of available plugins
 --upload       : Upload data to central node
 
 More options available. Run '/usr/bin/lynis show options', or use the man page.
 
 No command provided. Exiting..

從上面可以看出,使用 lynis 進行主機掃描很簡單,只需要帶上參數(shù) audit system 即可。 Lynis在審計的過程中,會進行多種類似的測試,在審計過程中會將各種測試結果、調試信息、和對系統(tǒng)的加固建議都被寫到 stdin 。 我們可以執(zhí)行下面命令來跳過檢查過程,直接截取最后的掃描建議來看。

sudo lynis audit system |sed '1,/Results/d'

lynis將掃描的內容分成幾大類,可以通過 show groups 參數(shù)來獲取類別

lynis show groups

accounting
authentication
banners
boot_services
containers
crypto
databases
dns
file_integrity
file_permissions
filesystems
firewalls
hardening
homedirs
insecure_services
kernel
kernel_hardening
ldap
logging
mac_frameworks
mail_messaging
malware
memory_processes
nameservices
networking
php
ports_packages
printers_spools
scheduling
shells
snmp
squid
ssh
storage
storage_nfs
system_integrity
time
tooling
usb
virtualization
webservers

若指向掃描某幾類的內容,則可以通過 –tests-from-group 參數(shù)來指定。

比如我只想掃描 shells 和 networking 方面的內容,則可以執(zhí)行

sudo lynis --tests-from-group "shells networking" --no-colors
[ Lynis 2.6.4 ]
 
################################################################################
 Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
 welcome to redistribute it under the terms of the GNU General Public License.
 See the LICENSE file for details about using this software.
 
 2007-2018, CISOfy - https://cisofy.com/lynis/
 Enterprise support available (compliance, plugins, interface and tools)
################################################################################
 
 
[+] Initializing program
------------------------------------
- Detecting OS...  [ DONE ]
- Checking profiles... [ DONE ]
- Detecting language and localization [ zh ]
Notice: no language file found for 'zh' (tried: /usr/share/lynis/db/languages/zh)
 
 ---------------------------------------------------
 Program version:   2.6.4
 Operating system:   Linux
 Operating system name:  Arch Linux
 Operating system version: Rolling release
 Kernel version:   4.16.13
 Hardware platform:   x86_64
 Hostname:     T520
 ---------------------------------------------------
 Profiles:     /etc/lynis/default.prf
 Log file:     /var/log/lynis.log
 Report file:    /var/log/lynis-report.dat
 Report version:   1.0
 Plugin directory:   /usr/share/lynis/plugins
 ---------------------------------------------------
 Auditor:     [Not Specified]
 Language:     zh
 Test category:    all
 Test group:    shells networking
 ---------------------------------------------------
- Program update status...  [ NO UPDATE ]
 
[+] System Tools
------------------------------------
- Scanning available tools...
- Checking system binaries...
 
[+] Plugins (phase 1)
------------------------------------
Note: plugins have more extensive tests and may take several minutes to complete
 
- Plugins enabled [ NONE ]
 
[+] Shells
------------------------------------
- Checking shells from /etc/shells
Result: found 5 shells (valid shells: 5).
- Session timeout settings/tools [ NONE ]
- Checking default umask values
- Checking default umask in /etc/bash.bashrc [ NONE ]
- Checking default umask in /etc/profile [ WEAK ]
 
[+] Networking
------------------------------------
- Checking IPv6 configuration [ ENABLED ]
Configuration method [ AUTO ]
IPv6 only [ NO ]
- Checking configured nameservers
- Testing nameservers
Nameserver: 202.96.134.33 [ SKIPPED ]
Nameserver: 202.96.128.86 [ SKIPPED ]
- Minimal of 2 responsive nameservers [ SKIPPED ]
- Getting listening ports (TCP/UDP) [ DONE ]
* Found 11 ports
- Checking status DHCP client [ RUNNING ]
- Checking for ARP monitoring software [ NOT FOUND ]
 
[+] Custom Tests
------------------------------------
- Running custom tests...  [ NONE ]
 
[+] Plugins (phase 2)
------------------------------------
 
================================================================================
 
 -[ Lynis 2.6.4 Results ]-
 
 Great, no warnings
 
 Suggestions (1):
 ----------------------------
 * Consider running ARP monitoring software (arpwatch,arpon) [NETW-3032] 
 
https://cisofy.com/controls/NETW-3032/
 
 Follow-up:
 ----------------------------
 - Show details of a test (lynis show details TEST-ID)
 - Check the logfile for all details (less /var/log/lynis.log)
 - Read security controls texts (https://cisofy.com)
 - Use --upload to upload data to central system (Lynis Enterprise users)
 
================================================================================
 
 Lynis security scan details:
 
 Hardening index : 33 [######    ]
 Tests performed : 13
 Plugins enabled : 0
 
 Components:
 - Firewall    [X]
 - Malware scanner  [X]
 
 Lynis Modules:
 - Compliance Status  [?]
 - Security Audit   [V]
 - Vulnerability Scan  [V]
 
 Files:
 - Test and debug information  : /var/log/lynis.log
 - Report data      : /var/log/lynis-report.dat
 
================================================================================
 
 Lynis 2.6.4
 
 Auditing, system hardening, and compliance for UNIX-based systems
 (Linux, macOS, BSD, and others)
 
 2007-2018, CISOfy - https://cisofy.com/lynis/
 Enterprise support available (compliance, plugins, interface and tools)
 
================================================================================
 
 [TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)

查看詳細說明

在查看審計結果時,你可以通過 show details 參數(shù)來獲取關于某條警告/建議的詳細說明。其對應的命令形式為:

lynis show details ${test_id}

比如,上面圖中有一個建議

* Consider running ARP monitoring software (arpwatch,arpon) [NETW-3032]

我們可以運行命令:

sudo lynis show details NETW-3032
2018-06-08 18:18:01 Performing test ID NETW-3032 (Checking for ARP monitoring software)
2018-06-08 18:18:01 IsRunning: process 'arpwatch' not found
2018-06-08 18:18:01 IsRunning: process 'arpon' not found
2018-06-08 18:18:01 Suggestion: Consider running ARP monitoring software (arpwatch,arpon) [test:NETW-3032] [details:-] [solution:-]
2018-06-08 18:18:01 Checking permissions of /usr/share/lynis/include/tests_printers_spools
2018-06-08 18:18:01 File permissions are OK
2018-06-08 18:18:01 ===---------------------------------------------------------------===

查看日志文件

lynis在審計完成后會將詳細的信息記錄在 /var/log/lynis.log 中.

sudo tail /var/log/lynis.log
2018-06-08 17:59:46 ================================================================================
2018-06-08 17:59:46 Lynis 2.6.4
2018-06-08 17:59:46 2007-2018, CISOfy - https://cisofy.com/lynis/
2018-06-08 17:59:46 Enterprise support available (compliance, plugins, interface and tools)
2018-06-08 17:59:46 Program ended successfully
2018-06-08 17:59:46 ================================================================================
2018-06-08 17:59:46 PID file removed (/var/run/lynis.pid)
2018-06-08 17:59:46 Temporary files: /tmp/lynis.sGxCR0hSPz
2018-06-08 17:59:46 Action: removing temporary file /tmp/lynis.sGxCR0hSPz
2018-06-08 17:59:46 Lynis ended successfully.

同時將報告數(shù)據(jù)被保存到 /var/log/lynis-report.dat 中.

sudo tail /var/log/lynis-report.dat

另外需要注意的是,每次審計都會覆蓋原日志文件.

檢查更新

審計軟件需要隨時進行更新從而得到最新的建議和信息,我們可以使用 update info 參數(shù)來檢查更新:

lynis update info --no-colors
== Lynis ==
 
 Version   : 2.6.4
 Status    : Up-to-date
 Release date  : 2018-05-02
 Update location : https://cisofy.com/lynis/
 
 
2007-2018, CISOfy - https://cisofy.com/lynis/

自定義lynis安全審計策略

lynis的配置信息以 .prf 文件的格式保存在 /etc/lynis 目錄中。 其中,默認lynis自帶一個名為 default.prf 的默認配置文件。

不過我們無需直接修改這個默認的配置文件,只需要新增一個 custom.prf 文件將自定義的信息加入其中就可以了。

關于配置文件中各配置項的意義,在 default.prf 中都有相應的注釋說明,這里就不詳述了。

想了解lynis的更多信息,可以訪問它的官網(wǎng).

總結

以上就是這篇文章的全部內容了,希望本文的內容對大家的學習或者工作具有一定的參考學習價值,如果有疑問大家可以留言交流,謝謝大家對腳本之家的支持。

標簽:湖南 黃石 楊凌 遼源 南通 衡水 新鄉(xiāng) 海東

巨人網(wǎng)絡通訊聲明:本文標題《利用lynis如何進行l(wèi)inux漏洞掃描詳解》,本文關鍵詞  利用,lynis,如何,進行,linux,;如發(fā)現(xiàn)本文內容存在版權問題,煩請?zhí)峁┫嚓P信息告之我們,我們將及時溝通與處理。本站內容系統(tǒng)采集于網(wǎng)絡,涉及言論、版權與本站無關。
  • 相關文章
  • 下面列出與本文章《利用lynis如何進行l(wèi)inux漏洞掃描詳解》相關的同類信息!
  • 本頁收集關于利用lynis如何進行l(wèi)inux漏洞掃描詳解的相關信息資訊供網(wǎng)民參考!
  • 推薦文章
    主站蜘蛛池模板: 潞西市| 泰州市| 神农架林区| 莒南县| 鞍山市| 临沧市| 渝中区| 蒙城县| 随州市| 天水市| 陇南市| 茶陵县| 宜君县| 九龙城区| 迭部县| 漳浦县| 五河县| 耒阳市| 砀山县| 卓尼县| 永康市| 吴川市| 沿河| 安新县| 栖霞市| 寻甸| 康平县| 荆门市| 乌拉特后旗| 安福县| 泾源县| 霞浦县| 新野县| 定陶县| 祥云县| 双桥区| 道孚县| 遂平县| 新乡县| 航空| 香格里拉县|