Pular para o conteúdo

Tiger

Tiger is a comprehensive security audit tool for UNIX and Linux systems that performs automated security checks, analyzes system configuration, and detects intrusion attempts. It examines user accounts, file systems, network services, and system logs to identify security vulnerabilities and suspicious activities.

Tiger runs as a scheduled daemon or manual audit tool, generating detailed reports on system security posture. It’s particularly useful for compliance audits, baseline establishment, and continuous monitoring.

sudo apt-get update
sudo apt-get install tiger
git clone https://github.com/tiger-tools/tiger.git
cd tiger
./install.sh
docker run -v /etc:/etc:ro kalilinux/kali-rolling tiger -B
CommandPurpose
tigerRun comprehensive system audit
tiger -BGenerate binary database for comparison
tiger -wWrite audit report to file
tiger -c config_fileUse custom configuration
tiger -l logdirSpecify log directory location
tiger -xExamine specific areas only
# Run full Tiger audit
tiger -B

# Generate baseline database
tiger -B -w

# Compare current system to baseline
tiger -c /etc/tiger/tiger.conf
# Create custom Tiger configuration
sudo nano /etc/tiger/tiger.conf

# Enable specific checks
DOCHK_FILE='Y'      # File permissions check
DOCHK_PASSWD='Y'    # User/password check
DOCHK_NETWORK='Y'   # Network audit
DOCHK_ROOTKIT='Y'   # Rootkit detection
Report SectionDescription
Files & PermissionsDangerous file permissions, world-writable files, SUID/SGID binaries
User AccountsWeak passwords, duplicate UIDs, unauthorized shells, dormant accounts
Network ServicesOpen ports, running daemons, listening services, suspicious connections
System LogsFailed logins, root access attempts, system errors, suspicious patterns
FilesystemUnmounted filesystems, unusual directories, inode anomalies
RootkitsSigns of rootkit installation, hidden processes, modified binaries
# Full audit with verbose output
tiger -B -w -v

# Generate HTML report
tiger -B -w -f html

# Create baseline for comparison
tiger -B -w baseline
# Scan for setuid binaries
tiger -B | grep -i suid

# Find all SUID executables
find / -perm /4000 -type f 2>/dev/null
# Tiger automatically checks for world-writable files
tiger -B -w

# Manual world-writable scan
find / -perm -002 -type f 2>/dev/null
# Create baseline of critical files
tiger -B -w /etc /usr/bin

# Monitor for changes
tiger -B -l /var/log/tiger
# Tiger checks user accounts automatically
tiger -B -w

# Manual password policy review
cat /etc/login.defs | grep PASS_

# Check for dormant accounts
lastlog -b 30
# Find users with UID 0 (root)
awk -F: '$3 == 0 {print $1}' /etc/passwd

# Check for null-password accounts
awk -F: '($2 == "" || $2 == "!" || $2 == "!!") {print $1}' /etc/shadow
# Tiger network checks
tiger -B -w

# View Tiger's network analysis
cat /var/log/tiger/[report].txt | grep -i network
# Check all listening services
netstat -tlnp | grep LISTEN

# View network connections in Tiger report
tiger -B -w | grep "port\|service"
# Configure Tiger for rootkit detection
echo "DOCHK_ROOTKIT='Y'" | sudo tee -a /etc/tiger/tiger.conf

# Run rootkit checks
tiger -B -w
# Check for kernel module anomalies
lsmod | wc -l

# Examine suspicious modules
lsmod | grep -v 'Used by'

# Compare process visibility
ps aux | wc -l
# View latest Tiger report
sudo tail -f /var/log/tiger/security.report

# Search for critical findings
grep -i "critical\|alert" /var/log/tiger/security.report
# Tiger analyzes auth logs automatically
tiger -B -w

# Manual failed login review
grep "Failed password" /var/log/auth.log | tail -20

# Count failed attempts by user
grep "Failed password" /var/log/auth.log | awk '{print $9}' | sort | uniq -c
# Add Tiger audit to crontab
0 2 * * * /usr/sbin/tiger -B -w -l /var/log/tiger

# Daily morning security report
0 8 * * * /usr/sbin/tiger -B -w | mail -s "Tiger Audit" admin@example.com
# Create Tiger audit service
sudo nano /etc/systemd/system/tiger-audit.service

[Unit]
Description=Tiger Security Audit
After=network.target

[Service]
Type=oneshot
ExecStart=/usr/sbin/tiger -B -w -l /var/log/tiger
User=root

# Create timer unit
sudo nano /etc/systemd/system/tiger-audit.timer

[Unit]
Description=Run Tiger Audit Daily

[Timer]
OnCalendar=daily
OnCalendar=*-*-* 02:00:00

[Install]
WantedBy=timers.target

# Enable timer
sudo systemctl enable tiger-audit.timer
sudo systemctl start tiger-audit.timer
# Create initial baseline
tiger -B -w baseline

# Create comparison database
tiger -B -w current

# Generate difference report
tiger -B -w comparison > baseline_diff.txt
# Quick incremental audit
tiger -i

# Focused checks only
tiger -B -x /etc /usr/bin

# Generate minimal report
tiger -B -w -q
# Configure Tiger to send logs to syslog
echo "SENDREPORT_CMD='logger -t tiger'" | sudo tee -a /etc/tiger/tiger.conf

# Monitor Tiger messages
sudo tail -f /var/log/syslog | grep tiger
# Create custom check script
sudo nano /etc/tiger/check.local

#!/bin/bash
# Custom security checks
find / -name ".ssh" -perm -004 2>/dev/null

# Make executable
sudo chmod +x /etc/tiger/check.local

# Run with custom checks
tiger -B -w
# Export Tiger findings in syslog format
tiger -B -w -f syslog > tiger_events.log

# Parse and forward to SIEM
cat tiger_events.log | nc siem.local 514
# Audit specific directories only
tiger -B -x /etc /usr/bin -l /var/log/tiger

# Skip slow checks
echo "DOCHK_NETWORK='N'" >> /etc/tiger/tiger.conf

# Reduce verbosity
tiger -B -w -q
# Run with nice priority
nice -n 10 tiger -B -w

# Limit scan to working hours
0 22 * * * /usr/sbin/tiger -B -w -q
IssueSolution
Permission deniedRun as root: sudo tiger
No reports generatedCheck log directory: ls -la /var/log/tiger/
Slow scanningExclude large directories: tiger -B -x /home
Memory issuesReduce check scope with -x flag
Cron not executingCheck crontab: sudo crontab -l
# Run with debugging enabled
tiger -d -B -w

# Verbose output
tiger -v -B -w

# Log all activities
tiger -B -w -l /var/log/tiger/debug
  1. Regular Auditing: Run Tiger weekly or monthly depending on environment
  2. Baseline Establishment: Create and maintain security baselines
  3. Report Review: Regularly analyze and act on Tiger findings
  4. Access Control: Restrict Tiger report access to authorized administrators
  5. Logging: Centralize Tiger logs for compliance and forensics
  6. Updates: Keep Tiger current for latest security checks

Tiger works on:

  • Linux distributions (Debian, Ubuntu, RHEL, CentOS)
  • BSD systems (FreeBSD, OpenBSD)
  • Solaris/SunOS
  • macOS (with limited functionality)
  • UNIX variants
  • Tiger Official: https://www.nongnu.org/tiger/
  • Documentation: /usr/share/doc/tiger/
  • Configuration: /etc/tiger/tiger.conf
  • Reports: /var/log/tiger/

Tiger provides comprehensive automated security auditing for UNIX systems, making it essential for system hardening, compliance verification, and incident detection across enterprise environments.