Tiger
Tool and Usage
Project details
- License
- GPLv2
- Programming language
- shell script
- Authors
- Dave K. Hess
- Dave R. Safford
- Douglas Lee Schales
- Khalid Warraich
- Latest release
- 3.2.3 []
Project health
Links
Tiger project website |
Why this tool?
The Tiger tool is used to scan your system and perform a security audit. Tiger checks configuration files and the system state. Based on the findings it will show suggestions to improve the security level of the system.
The Tiger project also states on their project page it can be used as an intrusion detection tool. This promise is somewhat outdated. To be effective in the area of intrusion detection, its technology needs to be kept up-to-date. Still, the tool might find traces that give away a system breach.
How it works
The engine of Tiger is based on small scripts that do individual checks. A typical example of such check is to look for a configuration file and see if its settings are in a preferred state.
Like other tools in this category, Tiger is light on resources. It uses shell script as its core and leverages common system utilities to do the work.
Background information
Tiger was a popular tool to audit systems and originates from work at the Texas A&M University. After 2008 there were not many updates released, showing the project is stalled. For that reason, we suggest using more active projects.
Usage and audience
Tiger is commonly used for intrusion detection, IT audit, system hardening, or vulnerability scanning. Target users for this tool are security professionals and system administrators.
Features
- Command line interface
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
Strengths
- + Used language is shell script
- + Project is mature (10+ years)
- + The source code of this software is available
Weaknesses
- - No updates for a while
Installation
Supported operating systems
Tiger is known to work on AIX, FreeBSD, Linux, NetBSD, OpenBSD, and Solaris.
Tiger alternatives
Similar tools to Tiger:
Lynis
Lynis is a security auditing tool for systems running Linux, macOS, or Unix. It can be used for security assessments and configuration audits.
otseca
Otseca is a security tool that helps with gathering system information. It can be useful for penetration tests and security assessments, to automate some parts of the process.
orthrus
Orthrus is a security framework and auditing tool. It allows monitoring and analyzing security configurations across multiple environments.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
Compare Tiger with other tools
Categories
This tool is categorized as a configuration audit tool and Linux security audit tool.