Filewatcher File Search File Search
Catalog
Content Search
» » » » »

tiger

Report system security vulnerabilities

Variants:
TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs and data files which are used to perform a security audit of different operating systems. The tools can be both run altogether once to generate an audit report of the system and they can also be run periodically to provide information on changes to the system's security once a security baseline has been defined. Consequently, they can be used also as a host intrusion detection mechanism.

The tools rely on specialised external security tools such as John the Ripper, Chkroot and integrity check tools (like Tripwire, Integrit or Aide) for some of the tasks. The periodic review mechanism relies on the use of the cron task scheduler and an email delivery system.

TIGER has one primary goal: report ways the system's security can be compromised.

Debian's TIGER incorporates new checks primarily oriented towards Debian distribution including: md5sums checks of installed files, location of files not belonging to packages, check of security advisories and analysis of local listening processes.

This package provides all the security scripts and data files.

Homepage:
Package version:1:3.2.3-10
Architecture:amd64
Distribution:Debian
Filename:tiger_3.2.3-10_amd64.deb

/usr/lib/tiger/check.d/README

#
#     tiger - A UN*X security checking system
#     Copyright (C) 1993 Douglas Lee Schales, David K. Hess, David R. Safford
#
#    This program is free software; you can redistribute it and/or modify
#    it under the terms of the GNU General Public License as published by
#    the Free Software Foundation; either version 1, or (at your option)
#    any later version.
#
#    This program is dist
more»

/usr/share/doc/tiger/README.1st

Read the README file about the 'tigerrc' file!

Have a look at the USING file as well...

/usr/share/doc/tiger/README.Debian.gz

Tiger for Debian
----------------------

PLEASE NOTE:

Some of the checks do not apply completely to Debian systems
or Debian's defaults are somewhat different. This might lead to
somethings being reported as a security issue when they really 
aren't (known in the security field as 'false positives')
In some cases this might be Tiger's problem (of it being an old UNIX
auditing program) or it might
more»

/usr/share/doc/tiger/README.gz

For starters
------------

'tiger' is a set of scripts that scan a Un*x system looking for
security
more»

/usr/share/doc/tiger/README.hostids.gz

Notes on using Tiger as a host-IDS
..................................

Tiger is a two-sided tool fo
more»

/usr/share/doc/tiger/README.ignore

Tiger's ignore mechanism
------------------------

Tiger, since version 3.2, provides a new 'ignore'
more»

/usr/share/doc/tiger/README.linux

Notice of third party modifications as per the GNU GENERAL PUBLIC LICENSE.

Further changes made by 
more»

/usr/share/doc/tiger/README.logo

Tiger's logo
------------

The original Tiger tool did not have a logo so I started a logo contest

more»

Browse inside tiger_3.2.3-10_amd64.deb

         [DIR]DEBIAN/ (8)  65535+ mirrors
         [DIR]etc/ (3)  65535+ mirrors
         [DIR]usr/ (3)  65535+ mirrors
         [DIR]var/ (2)  56408+ mirrors

Download tiger_3.2.3-10_amd64.deb

Results 1 - 1 of 1
Help - FTP Sites List - Software Dir.
Search over 15 billion files
© 1997-2016 FileWatcher.com