0% found this document useful (0 votes)
147 views5 pages

7.1.1.6 Lab - Hardening A Linux System

7.1.1.6 Lab - Hardening a Linux System

Uploaded by

fordjoker37
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
147 views5 pages

7.1.1.6 Lab - Hardening A Linux System

7.1.1.6 Lab - Hardening a Linux System

Uploaded by

fordjoker37
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Lab – Hardening a Linux System

Objectives
Demonstrate the use of a security auditing tool to harden a Linux system.

Background / Scenario
Auditing a system for potential misconfigurations or unprotected services is an important aspect of system
hardening. Lynis is an open source security auditing tool with an automated set of scripts developed to test a
Linux system.

Required Resources
• PC with Ubuntu 16.04 Desktop LTS installed in a VirtualBox or VMware virtual machine.

Step 1: Open a terminal window in Ubuntu.


a. Log in to Ubuntu using the following credentials:
User: cisco
Password: password

b. Click the terminal icon to open a terminal window.

Step 2: The Lynis Tool


a. At the command prompt, enter the following command to change to the lynis directory:
cisco@ubuntu:~$ cd Downloads/lynis/

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5
Lab – Hardening a Linux System

b. At the command prompt, enter the following command and enter the password password when
prompted:
cisco@ubuntu:~/Dowloads/lynis$ sudo ./lynis update info

This command verifies that this is the latest version and updates for the tool at the time of writing of this
lab.

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 5
Lab – Hardening a Linux System

Step 3: Run the Tool


a. Type the following command in terminal and press Enter:
cisco@ubuntu:~/Downloads/lynis$ sudo ./lynis --auditor cisco

As displayed above, the tool will begin auditing using the user cisco as the auditor.
Notice: You will receive warnings.
b. To continue with each stage of the audit press Enter. You will receive warnings as shown below.

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 5
Lab – Hardening a Linux System

c. You will receive suggestions, as shown below.

d. You will receive a notification for any configuration that is weak as shown below:

e. You will receive detailed security enhancement suggestions as well as a final summary which provides
the location where you can find the log file.

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 5
Lab – Hardening a Linux System

Step 4: Review Results


a. Scroll up to the results section after the tool is finished running.
How many Warnings did you receive? 2
How many Suggestions did you receive? 2
b. Scroll through the suggestions and select one. You will research a suggestion that you can implement to
address the issue.
Which suggestion are you addressing?
I have a suggestion with the /etc/ssh/sshd_config

[+] File
What is Permissions
your suggested solution?
------------------------------------
i will look at the access rights to this file:
ls- -lStarting file permissions check
/etc/ssh/sshd_config
File: /etc/group [ OK ]
References
File: /etc/passwd
output: [ OK ]
Lynis: https://cisofy.com/lynis/
File: /etc/ssh/sshd_config [ SUGGESTION ]
-rw-r--r-- 1 root wheel 3523 Aug 24 2022 /etc/ssh/sshd_config
File: /etc/hosts.equiv [ OK ]

and I set access rights only for root


sudo chmod 600 /etc/ssh/sshd_config

OUTPUT:
[+] File Permissions
------------------------------------
- Starting file permissions check
File: /etc/group [ OK ]
File: /etc/passwd [ OK ]
File: /etc/ssh/sshd_config [ OK ]
File: /etc/hosts.equiv [ OK ]

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 5

You might also like