Binary package “tiger” in ubuntu bionic
Report system security vulnerabilities
TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
and data files which are used to perform a security audit of different
operating systems. The tools can be both run altogether once to generate an
audit report of the system and they can also be run periodically to
provide information on changes to the system's security once a
security baseline has been defined. Consequently, they can be used
also as a host intrusion detection mechanism.
.
The tools rely on specialised external security tools such as John the Ripper,
Chkroot and integrity check tools (like Tripwire, Integrit or Aide) for some
of the tasks. The periodic review mechanism relies on the use of the cron task
scheduler and an email delivery system.
.
TIGER has one primary goal: report ways the system's security can be
compromised.
.
Debian's TIGER incorporates new checks primarily oriented towards Debian
distribution including: md5sums checks of installed files, location of files
not belonging to packages, and analysis of local listening processes.
.
This package provides all the security scripts and data files.
Source package
Published versions
- tiger 1:3.2.4~rc1-1 in amd64 (Proposed)
- tiger 1:3.2.4~rc1-1 in amd64 (Release)
- tiger 1:3.2.4~rc1-1 in arm64 (Proposed)
- tiger 1:3.2.4~rc1-1 in arm64 (Release)
- tiger 1:3.2.4~rc1-1 in armhf (Proposed)
- tiger 1:3.2.4~rc1-1 in armhf (Release)
- tiger 1:3.2.4~rc1-1 in i386 (Proposed)
- tiger 1:3.2.4~rc1-1 in i386 (Release)
- tiger 1:3.2.4~rc1-1 in ppc64el (Proposed)
- tiger 1:3.2.4~rc1-1 in ppc64el (Release)
- tiger 1:3.2.4~rc1-1 in s390x (Proposed)
- tiger 1:3.2.4~rc1-1 in s390x (Release)