[+] Check users, groups and authentication



==> Users with UID zero (0)

[*] Searching accounts with UID 0
[+] Found administrator account/s with UID 0 in /etc/passwd (-rw-r--r-- root root)
    Administrator account: root:0

==> Shadow file identification

[*] Searching shadow files

==> Non-unique accounts

[*] Searching non-unique accounts
[-] All accounts found in /etc/passwd (-rw-r--r-- root root) are unique

==> Unique group IDs

[*] Searching non-unique group ID's
[-] All group ID's found in /etc/group (-rw-r--r-- root root) are unique

==> Unique group name

[*] Searching non-unique group names
[-] All group names found in /etc/group (-rw-r--r-- root root) are unique

==> Query user accounts

[*] Reading system users
[*] Linux real users output (ID = 0, or 1000+, but not 65534):
[+] Query system user
    root,0
    sshd,1002
    avahi,1000
    dbus,1001

==> Query NIS and NIS+ authentication support

[*] Check nsswitch.conf
[-] /etc/nsswitch.conf not available

==> Scan and test sudoers files

[-] No sudoers files found in /logs/firmware/unblob_extracted/firmware_extract/56048-12514271.gzip_extract/gzip.uncompressed_extract/5243916-15068666.gzip_extract/gzip.uncompressed_extract

==> Ownership and permissions for sudo configuration files

[-] No sudoers files found - no check possible

==> Search for PAM password strength testing libraries

[*] Searching PAM password testing modules (cracklib, passwdqc, pwquality)
[-] pam_cracklib.so not found
[-] pam_passwdqc.so not found
[-] pam_pwquality.so not found
[-] No PAM modules for password strength testing found

==> Scan PAM configuration file

[-] /etc/pam.conf not available

==> Searching PAM configurations and LDAP support in PAM files

[-] /etc/pam.d not available

==> Searching available PAM files

[-] Nothing found