• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

LSAT – Linux Security Auditing Tool

December 1, 2015

Views: 9,611

Linux Security Auditing Tool (LSAT) is a post install security auditing tool. It is modular in design, so new features can be added quickly. It checks inetd entries and scans for unneeded RPM packages. It is being expanded to work with Linux distributions other than Red Hat, and checks for kernel versions.

It (for now) works under Linux (x86: Gentoo, RedHat, Debian, Mandrake; Sparc: SunOS (2.x), Redhat sparc, Mandrake Sparc; Apple OS X).

LSAT - Linux Security Auditing Tool

You can also check out tools like:

– Lynis v1.6.0 Released For Download – Linux Security Auditing Tool
– Tiger – Unix Security Audit & Intrusion Detection Tool
– unix-privesc-check – Unix/Linux User Privilege Escalation Scanner

Modules/Features

  • checkbp: Checks for boot loader password.
  • checkcfg: This module is performed last
  • checkdotfiles: Looks for .forward, .exrc, .rhosts and .netrc files on the system.
  • checkfiles: Checks that /tmp and /var/tmp have sitcky bit set, checks utmp, wtmp, motd, mtab for chmod 644.
  • checkftpusers: Checks that all accounts in /etc/passwd are in /etc/ftpusers.
  • checkhostsfiles: Reads /etc/hosts.allow and /etc/hosts.deny files
  • checkinetd: Checks either /etc/inetd.conf or /etc/xinetd.d/*
  • checkinittab: Checks to see if default runlevel is 5. If it is, give the user a warning.
  • checkipv4: Checks to see that common forwarding and ignoring are off/on in ipv4.
  • checklimits: Performs simple check of limits.conf file
  • checklogging: Performs a simple check to see if auth and authpriv logging facilities are on.
  • checkmd5: Performs md5sum on all regular files on the system and saves in lsatmd5.out
  • checknetforward: Checks that ipv4 forwarding is disabled under linux
  • checkopenfiles: Checks all open files on the system using lsof (if installed)
  • checkpasswd: Checks /etc/passwd for unneeded accounts.
  • checkpkgs: Checks list of packages (rpms, debs) installed on the system.
  • checksecuretty: Check to see if ttys other than tty[1-6] are in /etc/securetty
  • checkset: Checks system for all setuid/setgid files.
  • checkssh: Check some security features of ssh for instance: root logins, X11 forwarding and the like.
  • checkumask: Checks that the default umask on the system is sensible.
  • checkwrite: Checks system for world writable files.
  • checklistening: Checks for applications listening. This is an “extra” test

Usage

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
./lsat [OPTIONS]
 
Options:
 
        -d                      diff current and old md5, output in lsatmd5.diff
        -f        Force a specific distribution test. Distro names are:
                                redhat
                                debian
                                mandrake
                                solaris
                                gentoo
                                macosx
                                If no -f option, lsat will guess. If lsat can
                                not guess the distribution, default is redhat.
        -a            Show this (advanced) help page
        -o            Output file name -- default is lsat.out
        -r            Check rpm integrity -- redhat or mandrake only
        -s            Silent mode
        -v            Verbose output
        -w            Output file in html format
        -x            eXclude module(s) in filelist from checks...
                                modules listed in filename will be excluded
                                from checks. Valid module names are the module
                                names themselves without the check.
                                (e.g. set not checkset) the check.

You can download LSAT here:

lsat-0.9.8.2.zip

Or read more here.

Related Posts:

  • An Introduction To Web Application Security Systems
  • testssl.sh - Test SSL Security Including Ciphers,…
  • nbtscan Download - NetBIOS Scanner For Windows & Linux
  • Pupy Download - Open-Source Remote Administration Tool - RAT
  • Post-Quantum Cryptography Implementation…
  • Caracal - Rust eBPF Rootkit for Stealthy Post-Exploitation
Share
Tweet
Share103
Buffer
WhatsApp
Email
103 Shares

Filed Under: Linux Hacking, Security Software Tagged With: Linux Hacking, linux-security



Reader Interactions

Comments

  1. fakeman says

    December 1, 2015 at 2:37 am

    why is the link to the website:
    “Or read more here.”
    sign as broken_link?

    • Darknet says

      December 1, 2015 at 5:56 pm

      Sourceforge was having some issues last night so it wasn’t always responding with a successful HTTP code, so the link was marked as broken. It should be ok now.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

TREVORspray - Credential Spray Toolkit for Azure, Okta, OWA & More

TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Views: 279

TREVORspray is a purpose-built password spraying utility designed for red teams and offensive … ...More about TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Force Push Scanner - Hunt GitHub Dangling Commits for Leaked Secrets

Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Views: 323

Force Push Scanner is an offensive security tool that identifies secrets inadvertently left in … ...More about Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Views: 3,928

Darknet marketplaces remain central to illicit trade in 2025, with evolving business models, payment … ...More about Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Caracal - Rust eBPF Rootkit for Stealthy Post-Exploitation

Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Views: 500

Caracal is a new Rust-based eBPF (extended Berkeley Packet Filter) rootkit that provides a stealth … ...More about Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Windows_EndPoint_Audit - Endpoint Security Auditing Toolkit

Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Views: 557

Windows_EndPoint_Audit from ITAuditMaverick introduces a powerful method for offensive security … ...More about Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Malvertising and TDS Cloaking Tactics Uncovered

Malvertising and TDS Cloaking Tactics Uncovered

Views: 389

As digital advertising continues to be exploited by malicious actors, malvertising and Traffic … ...More about Malvertising and TDS Cloaking Tactics Uncovered

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (2)
  • Countermeasures (231)
  • Cryptography (84)
  • Dark Web (1)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (432)
  • Forensics (65)
  • GenAI (4)
  • Hacker Culture (9)
  • Hacking News (230)
  • Hacking Tools (688)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (240)
  • Networking Hacking Tools (353)
  • Password Cracking Tools (105)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (236)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (170)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,332,905)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,352)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,838)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,811)
  • Password List Download Best Word List – Most Common Passwords (933,799)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,470)
  • Hack Tools/Exploits (673,471)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,458)

Search

Recent Posts

  • TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More July 14, 2025
  • Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets July 11, 2025
  • Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends July 9, 2025
  • Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation July 7, 2025
  • Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit July 4, 2025
  • Malvertising and TDS Cloaking Tactics Uncovered July 2, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy