=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== and-1.2.2/debian/and.init.d-63- # Obtain the uid and gid and-1.2.2/debian/and.init.d:64: DAEMONUID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $3}'` and-1.2.2/debian/and.init.d:65: DAEMONGID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $4}'` and-1.2.2/debian/and.init.d-66- else ############################################## and-1.2.2/debian/and.init.d-80- [ ! -d /proc/$pid ] && return 1 and-1.2.2/debian/and.init.d:81: cmd=`cat /proc/$pid/cmdline | tr "\000" "\n"|head -n 1 |cut -d : -f 1` and-1.2.2/debian/and.init.d-82- ############################################## and-1.2.2/debian/and.init.d-102- #[ ! -f "$PIDFILE" ] && return 1 and-1.2.2/debian/and.init.d:103: #pid=`cat $PIDFILE` and-1.2.2/debian/and.init.d-104- #running_pid $pid $DAEMON || return 1