[+] Check users, groups and authentication



==> Users with UID zero (0)

[*] Searching accounts with UID 0
[+] Found administrator account/s with UID 0 in /etc/passwd (-rw-r--r-- root root)
    Administrator account: root:0

==> Shadow file identification

[*] Searching shadow files
[+] Found shadow file /etc/shadow (-rw-r--r-- root root) with possible hash root:$1$ZMDCdK26$t9H/47MjUhJU5xYl46PVM.:17366:0:99999:7::: of hashtype: MD5
[+] Found shadow file /etc/shadow (-rw-r--r-- root root) with possible hash sdcard:$1$JbElAA7t$JzppsspcGk.BRuKFyFj2A0:17360:0:99999:7::: of hashtype: MD5

==> Non-unique accounts

[*] Searching non-unique accounts
[-] All accounts found in /etc/passwd (-rw-r--r-- root root) are unique

==> Unique group IDs

[*] Searching non-unique group ID's
[-] All group ID's found in /etc/group (-rw-r--r-- root root) are unique

==> Unique group name

[*] Searching non-unique group names
[-] All group names found in /etc/group (-rw-r--r-- root root) are unique

==> Query user accounts

[*] Reading system users
[*] Linux real users output (ID = 0, or 1000+, but not 65534):
[+] Query system user
    root,0
    sdcard,1001

==> Query NIS and NIS+ authentication support

[*] Check nsswitch.conf
[+] /etc/nsswitch.conf (-rw-r--r-- root root) exist
[-] NIS/NIS+ authentication not enabled

==> Scan and test sudoers files

    /etc/sudoers (-rw-r--r-- root root)
[*] Testing sudoers file with sudo-parse.pl:
[+] E: %sudo:ALL matches .*ALL.*
[+] E: root:ALL matches .*ALL.*
[+] E: http:ALL matches .*ALL.*

==> Ownership and permissions for sudo configuration files

[*] Checking drop-in directory (/etc/sudoers.d (drwxrwxr-x root root))
[*] /etc/sudoers.d (drwxrwxr-x root root): Found permissions: drwxrwxr-x and owner UID GID: 0:0
[+] /etc/sudoers.d (drwxrwxr-x root root) permissions possibly unsafe
[-] /etc/sudoers.d (drwxrwxr-x root root) ownership OK
[*] /etc/sudoers (-rw-r--r-- root root): Found permissions: -rw-r--r-- and owner UID GID: 0:0
[+] /etc/sudoers (-rw-r--r-- root root) permissions possibly unsafe
[-] /etc/sudoers (-rw-r--r-- root root) ownership OK

==> Search for PAM password strength testing libraries

[*] Searching PAM password testing modules (cracklib, passwdqc, pwquality)
[-] pam_cracklib.so not found
[-] pam_passwdqc.so not found
[-] pam_pwquality.so not found
[-] No PAM modules for password strength testing found

==> Scan PAM configuration file

[-] /etc/pam.conf not available

==> Searching PAM configurations and LDAP support in PAM files

[-] /etc/pam.d not available

==> Searching available PAM files

[-] Nothing found