=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== nagzilla-2.0/debian/nagzilla.nagzillad.init-88- # Obtain the uid and gid nagzilla-2.0/debian/nagzilla.nagzillad.init:89: DAEMONUID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $3}'` nagzilla-2.0/debian/nagzilla.nagzillad.init:90: DAEMONGID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $4}'` nagzilla-2.0/debian/nagzilla.nagzillad.init-91- else ############################################## nagzilla-2.0/debian/nagzilla.nagzillad.init-105- [ ! -d /proc/$pid ] && return 1 nagzilla-2.0/debian/nagzilla.nagzillad.init:106: cmd=`cat /proc/$pid/cmdline | tr "\000" "\n"|head -n 1 |cut -d : -f 1` nagzilla-2.0/debian/nagzilla.nagzillad.init-107- # Is this the expected server ############################################## nagzilla-2.0/debian/nagzilla.nagzillad.init-117- [ ! -f "$PIDFILE" ] && return 1 nagzilla-2.0/debian/nagzilla.nagzillad.init:118: pid=`cat $PIDFILE` nagzilla-2.0/debian/nagzilla.nagzillad.init-119- running_pid $pid $DAEMON || return 1