{"id":4,"date":"2014-06-20T16:12:24","date_gmt":"2014-06-20T16:12:24","guid":{"rendered":"http:\/\/ixyzero.com\/blog\/?p=4"},"modified":"2017-03-10T13:24:38","modified_gmt":"2017-03-10T05:24:38","slug":"linux%e6%8f%90%e6%9d%83%e5%b7%a5%e5%85%b7%e8%84%9a%e6%9c%ac__%e4%bf%a1%e6%81%af%e6%94%b6%e9%9b%86%e9%98%b6%e6%ae%b5%e6%80%a7%e6%80%bb%e7%bb%93","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/4.html","title":{"rendered":"Linux\u63d0\u6743\u5de5\u5177\/\u811a\u672c__\u4fe1\u606f\u6536\u96c6\u9636\u6bb5\u6027\u603b\u7ed3"},"content":{"rendered":"<p>=Start=<\/p>\n<h6>lynis\u00a0&#8211; Universal security auditing tool and rootkit scanner<\/h6>\n<ul>\n<li><a href=\"https:\/\/cisofy.com\/documentation\/lynis\/\">https:\/\/cisofy.com\/documentation\/lynis\/<\/a><\/li>\n<\/ul>\n<p><code>wget http:\/\/cisofy.com\/files\/lynis-2.4.5.tar.gz<\/code><\/p>\n<p>\u68c0\u6d4b\u7ed3\u679c\u9ed8\u8ba4\u5b58\u653e\u8def\u5f84\uff1a<br \/>\n\/var\/log\/lynis-report.dat<br \/>\n\/var\/log\/lynis.log<\/p>\n<h6>rkhunter<\/h6>\n<ul>\n<li><a href=\"https:\/\/sourceforge.net\/projects\/rkhunter\/\">https:\/\/sourceforge.net\/projects\/rkhunter\/<\/a><\/li>\n<\/ul>\n<h6>chkrootkit<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.chkrootkit.org\/\">http:\/\/www.chkrootkit.org\/<\/a><\/li>\n<\/ul>\n<hr \/>\n<h6>unix-privesc-check<\/h6>\n<p><code>wget http:\/\/pentestmonkey.net\/tools\/unix-privesc-check\/unix-privesc-check-1.4.tar.gz<\/code><\/p>\n<h6>enum4linux<\/h6>\n<p><code>wget --no-check-certificate\u00a0https:\/\/labs.portcullis.co.uk\/download\/enum4linux-0.8.9.tar.gz<\/code><\/p>\n<h6>information_gather.sh # Linux\u4fe1\u606f\u6536\u96c6\u7684\u811a\u672c<\/h6>\n<h6>history_top10.sh # \u6536\u96c6\u5e38\u7528\u547d\u4ee4\u7684\u811a\u672c<\/h6>\n<h6>ghdb.sh # \u6536\u96c6GHDB\u4fe1\u606f\u7684\u811a\u672c<\/h6>\n<h6>LinEnum.sh<\/h6>\n<ul>\n<li><a href=\"https:\/\/github.com\/rebootuser\/LinEnum\/\">https:\/\/github.com\/rebootuser\/LinEnum\/<\/a><\/li>\n<\/ul>\n<h6>Linux_Exploit_Suggester<\/h6>\n<ul>\n<li><a href=\"https:\/\/github.com\/PenturaLabs\/Linux_Exploit_Suggester\/\">https:\/\/github.com\/PenturaLabs\/Linux_Exploit_Suggester\/<\/a><\/li>\n<\/ul>\n<h6>chkexploit<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.if.usp.br\/pub\/unix\/security\/chkexploit-binary-elf\">http:\/\/www.if.usp.br\/pub\/unix\/security\/chkexploit-binary-elf<\/a><\/li>\n<\/ul>\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= lynis\u00a0&#8211; Universal security auditing tool  [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,25,12],"tags":[37],"class_list":["post-4","post","type-post","status-publish","format-standard","hentry","category-linux","category-security","category-tools","tag-security"],"views":20990,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":3,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4\/revisions"}],"predecessor-version":[{"id":3252,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4\/revisions\/3252"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=4"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=4"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}