Tiger
Tiger is a set of Bourne shell scripts and C programs for security auditing and intrusion detection on Linux and Unix systems. It generates audit reports to identify ways the system's security can be compromised and supports periodic checks for deviations.
Description
TIGER, or the 'tiger' scripts, performs security audits of operating system components to detect elements that need fixing for hardening. It can run all tools at once for a comprehensive report or be scheduled periodically via cron for intrusion detection, reporting deviations via email. The Linux version includes Debian-specific checks like md5sums of installed files, stray files, and listening processes.
Most tools are independent, but some rely on external tools like John the Ripper, Chkrootkit, or integrity checkers (Tripwire, Integrit, Aide). A separate package (tiger-otheros) provides scripts for non-Linux Unix systems, enabling centralized auditing over networks like NFS. Alternatives in Debian include lynis, ossec, checksecurity, lsat, or yasat.
Tiger supports generating signatures for system binaries and can check diskless client configurations. Reports can include explanations and be formatted in HTML.
How It Works
Tiger uses Bourne shell scripts and C programs to check system components against security baselines, generating MD5 hashes and permissions for binaries. It performs checks like file integrity (md5sums), package verification, listening processes, and configuration analysis. Periodic runs via tigercron compare against baselines, detecting unauthorized changes, with reports emailed. Some checks integrate external tools for tasks like password cracking or rootkit detection.
Installation
sudo apt install tigerFlags
Examples
tiger -htiger -vtiger -qtiger -etiger -Gtiger -Htiger -l /custom/pathtigercron -h