{"id":3934,"date":"2015-08-31T23:37:30","date_gmt":"2015-08-31T15:37:30","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3934"},"modified":"2015-09-09T19:36:34","modified_gmt":"2015-09-09T11:36:34","slug":"tiger-unix-security-audit-intrusion-detection-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/08\/tiger-unix-security-audit-intrusion-detection-tool\/","title":{"rendered":"Tiger – Unix Security Audit & Intrusion Detection Tool"},"content":{"rendered":"

Tiger is a Unix security audit tool that can be use both for auditing and as an intrusion detection system. It supports multiple Unix platforms and it is free and provided under a GPL license. Unlike other tools, Tiger needs only POSIX tools and is written entirely in shell language.<\/p>\n

Tiger has some interesting features that merit its resurrection, including a modular design that is easy to expand, and its double edge, it can be used as an audit tool and a host intrusion detection system tool.<\/p>\n

\"Tiger<\/p>\n

Free Software intrusion detection is currently going many ways, from network IDS (with Snort), to the kernel (LIDS, or SNARE for Linux and Systrace for OpenBSD, for example), not mentioning file integrity checkers (many of these: aide, integrit, samhain<\/a>, tripwire…) and logcheckers (even more of these, check the Log Analysis pages). But few of them focus on the host-side of intrusion detection fully.<\/p>\n

Tiger complements these tools and also provides a framework in which all of them can work together. Tiger is not a logchecker, nor it focused in integrity analysis. It does “the other stuff”, it checks the system configuration and status. Read the manpage for a full description of checks implemented in Tiger. A good example of what Tiger can do is, for example, check_findeleted, a module that can determine which network servers running in a system are using deleted files (because libraries were patched during an upgrade but the server’s services not restarted).<\/p>\n