Penetration testing commands for Configuration Audit

Configuration auditing is the process of reviewing system and software settings to detect misconfigurations that could lead to security vulnerabilities. This area provides tools for auditing against standards and best practices.

NameDescriptionPrice
CIS CAT LiteAsses systems against CIS BenchmarksFree
CIS CAT ProAsses systems against CIS BenchmarksPaid
Iniscanphp.ini scanner for security best practicesFree
Local PHP Security CheckerCLI tool that checks if your PHP application depends on PHP packages with known security vulnerabilitiesFree
LynisSecurity auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.Free
Master librarianAudit Unix/*BSD/Linux system libraries to find public security vulnerabilitiesFree
Nipper StudioTool that parse router, switch, firewall configuration to discover vulnerabilitiesPaid
Nipper-ngTool that parse router, switch, firewall configuration to discover vulnerabilitiesFree
pccPHP Secure Configuration Checker; parse php.ini to find security misconfigurationFree
PingCastleAssess the Active Directory security level with a methodology based on risk assessmentPaid
YASATTYet Another Stupid Audit Tool; check general Linux system and common softwares configurationFree