[+] Check users, groups and authentication
==> Users with UID zero (0)
[*] Searching accounts with UID 0
[+] Found administrator account/s with UID 0 in /etc/passwd (-rw-r--r-- root root)
Administrator account: root:0
==> Shadow file identification
[*] Searching shadow files
==> Non-unique accounts
[*] Searching non-unique accounts
[-] All accounts found in /etc/passwd (-rw-r--r-- root root) are unique
==> Unique group IDs
[*] Searching non-unique group ID's
[-] All group ID's found in /etc/group (-rw-r--r-- root root) are unique
==> Unique group name
[*] Searching non-unique group names
[-] All group names found in /etc/group (-rw-r--r-- root root) are unique
==> Query user accounts
[*] Reading system users
[*] Linux real users output (ID = 0, or 1000+, but not 65534):
[+] Query system user
root,0
sshd,1002
avahi,1000
dbus,1001
==> Query NIS and NIS+ authentication support
[*] Check nsswitch.conf
[-] /etc/nsswitch.conf not available
==> Scan and test sudoers files
[-] No sudoers files found in /logs/firmware/unblob_extracted/firmware_extract/56048-12514271.gzip_extract/gzip.uncompressed_extract/5243916-15068666.gzip_extract/gzip.uncompressed_extract
==> Ownership and permissions for sudo configuration files
[-] No sudoers files found - no check possible
==> Search for PAM password strength testing libraries
[*] Searching PAM password testing modules (cracklib, passwdqc, pwquality)
[-] pam_cracklib.so not found
[-] pam_passwdqc.so not found
[-] pam_pwquality.so not found
[-] No PAM modules for password strength testing found
==> Scan PAM configuration file
[-] /etc/pam.conf not available
==> Searching PAM configurations and LDAP support in PAM files
[-] /etc/pam.d not available
==> Searching available PAM files
[-] Nothing found