How to Install and Uninstall tiger Package on Kali Linux
Last updated: December 18,2024
1. Install "tiger" package
Please follow the guidelines below to install tiger on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
tiger
Copied
2. Uninstall "tiger" package
Please follow the guidance below to uninstall tiger on Kali Linux:
$
sudo apt remove
tiger
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the tiger package on Kali Linux
Package: tiger
Version: 1:3.2.4~rc1-3.2
Installed-Size: 7800
Maintainer: Javier Fernández-Sanguino Peña
Architecture: amd64
Depends: net-tools, binutils, bsdutils (>= 3.0-0), debianutils (>= 1.8), debconf (>= 0.5) | debconf-2.0, ucf, lsb-release, libc6 (>= 2.34)
Recommends: default-mta | mail-transport-agent, john, chkrootkit, tripwire | aide
Suggests: lsof, lynis
Size: 709232
SHA256: 344f1de61bc81e377e8d9d92ae1399c442de807d12f18bab70b6ea6f8a9623e9
SHA1: 4e982b333ade6d437ecb4d16634a0982c7c4a3cb
MD5sum: d81302694b4d87552dc10eec8372e2c6
Description: security auditing and intrusion detection tools for Linux
TIGER, or the 'tiger' scripts, is a set of tools (Bourne shell scripts and C
programs) which are used to perform a security audit of different operating
systems components. The tools can be both run all at once to generate an
audit report of the system and to detect elements that could be fixed
when hardening it.
.
TIGER has one primary goal: report ways the system's security can be
compromised.
.
Most of the tools are independent, but some of them rely on specialised
external security tools such as John the Ripper, Chkroot and integrity check
tools (like Tripwire, Integrit or Aide) to execute some tasks.
.
The same checks are also configured by default to run periodically and
detect deviations or unauthorised changes. This makes it possible to
used them also as a host intrusion detection mechanism.
This review mechanism relies on the use of the cron task scheduler and an
email delivery system to report errors and deviations.
.
This package provides all the security scripts and data files for Linux.
A separate package is available providing the scripts for other operating
systems so they can be run from a centralised repository.
.
The Linux scripts incorporate specific checks targetting the Debian OS
including: md5sums checks of installed files, location of files not belonging
to packages, and analysis of local listening processes.
.
Alternatives to TIGER available in Debian include lynis and ossec. If you are
aiming for a small set of checks, try checksecurity, lsat or yasat.
Description-md5:
Homepage: http://savannah.nongnu.org/projects/tiger/
Tag: admin::monitoring, implemented-in::c, implemented-in::shell,
interface::commandline, role::program, scope::application,
security::ids, security::integrity
Section: admin
Priority: optional
Filename: pool/main/t/tiger/tiger_3.2.4~rc1-3.2_amd64.deb
Version: 1:3.2.4~rc1-3.2
Installed-Size: 7800
Maintainer: Javier Fernández-Sanguino Peña
Architecture: amd64
Depends: net-tools, binutils, bsdutils (>= 3.0-0), debianutils (>= 1.8), debconf (>= 0.5) | debconf-2.0, ucf, lsb-release, libc6 (>= 2.34)
Recommends: default-mta | mail-transport-agent, john, chkrootkit, tripwire | aide
Suggests: lsof, lynis
Size: 709232
SHA256: 344f1de61bc81e377e8d9d92ae1399c442de807d12f18bab70b6ea6f8a9623e9
SHA1: 4e982b333ade6d437ecb4d16634a0982c7c4a3cb
MD5sum: d81302694b4d87552dc10eec8372e2c6
Description: security auditing and intrusion detection tools for Linux
TIGER, or the 'tiger' scripts, is a set of tools (Bourne shell scripts and C
programs) which are used to perform a security audit of different operating
systems components. The tools can be both run all at once to generate an
audit report of the system and to detect elements that could be fixed
when hardening it.
.
TIGER has one primary goal: report ways the system's security can be
compromised.
.
Most of the tools are independent, but some of them rely on specialised
external security tools such as John the Ripper, Chkroot and integrity check
tools (like Tripwire, Integrit or Aide) to execute some tasks.
.
The same checks are also configured by default to run periodically and
detect deviations or unauthorised changes. This makes it possible to
used them also as a host intrusion detection mechanism.
This review mechanism relies on the use of the cron task scheduler and an
email delivery system to report errors and deviations.
.
This package provides all the security scripts and data files for Linux.
A separate package is available providing the scripts for other operating
systems so they can be run from a centralised repository.
.
The Linux scripts incorporate specific checks targetting the Debian OS
including: md5sums checks of installed files, location of files not belonging
to packages, and analysis of local listening processes.
.
Alternatives to TIGER available in Debian include lynis and ossec. If you are
aiming for a small set of checks, try checksecurity, lsat or yasat.
Description-md5:
Homepage: http://savannah.nongnu.org/projects/tiger/
Tag: admin::monitoring, implemented-in::c, implemented-in::shell,
interface::commandline, role::program, scope::application,
security::ids, security::integrity
Section: admin
Priority: optional
Filename: pool/main/t/tiger/tiger_3.2.4~rc1-3.2_amd64.deb