ELF>(@@pF@8 @@@@@@88@8@@@l6l6 ==`=`P >>`>`TT@T@DDPtd(5(5@(5@44QtdRtd==`=`/lib64/ld-linux-x86-64.so.2GNU GNU|q|Y^ԽBjR̫.= @ =?ABE|qX` VDM4l\) hf"UH,=m~8 t/%L c4[:A`HB`A`{ @ut)@libcap.so.2_ITM_deregisterTMCloneTable__gmon_start___Jv_RegisterClasses_ITM_registerTMCloneTablecap_drop_bound_fini_initcap_get_boundcap_get_proccap_to_namecap_to_textcap_clear_flagcap_freecap_set_proccap_dupcap_set_flagcap_from_namecap_from_textlibc.so.6setuidchroot__printf_chkexit__strdupperrorgetpwuidgetgrgidputsforkputcharkillstrtokgetgrnam_rgetpwnamcallocstrlenprctl__errno_locationchdirmemcmpsetgroups__fprintf_chkmemcpystrtoulmallocgetgid__ctype_b_locstderrgetgroupsgetuidexecvestrtoullfwritewaitpidsleep__sprintf_chkgetgrouplistsetgidstrcmpstrerror__libc_start_mainsysconf_edata__bss_start_endGLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.2.5 ii ti ui ?`?`;@` @`(@`0@`8@`@@`H@`P@` X@` `@` h@` p@` x@`@`@`@`@`@`@`@`@`@`@`@`@`@`@`@`@`A`A` A`!A`" A`#(A`$0A`%8A`&@A`'HA`(PA`)XA`*`A`+hA`-pA`.xA`/A`0A`1A`2A`3A`5A`6A`7A`8A`9A`:A`<HH- HtH5- %- @%- h%- h%- h%- h%- h%- h%- h%- hp%- h`%- h P%- h @%z- h 0%r- h %j- h %b- h%Z- h%R- h%J- h%B- h%:- h%2- h%*- h%"- h%- hp%- h`% - hP%- h@%, h0%, h %, h%, h%, h%, h %, h!%, h"%, h#%, h$%, h%%, h&%, h'p%, h(`%, h)P%, h*@%z, h+0%r, h, %j, h-%b, h.%Z, h/%R, h0%J, h1%B, h2%:, h3%2, h4%*, h5%", h6%, h7pAWAVAUATUSH(dH%(H$1|$Ht$HT$8HD$AD$HLpH$HD$(H$HD$0HD$`HD$I.H=pH#3H=HH=H>H=HH= HH= HH= H{H= H_)H=HCH=H'H= H p H=HA H= HH= H H=Hs1HHVH5HHſ1mHH-uH1H51A}t4HI H5@HH1H-L`fDHICHHI H p1AHG I>au lILt$HLt$S@LH Lt$`1L{h1H5BmHHuLt$LxLp<HISH- LHHt$H o1AHF1LdLHH IHBHT$HHD$ HII| IHIHT$ ztHt$ H=wIUHLLHI HdLHtHHGL L/AID9|$r1UHHH A1AHIHxHH! HH l 1yH}11yH1x!8HIHI$ H81XHHHHH H ,1AH@ HF HIHx kHsH=H߉NIHH H} 11mH1lHuA؉HI# H81XH1LL$ H K IHL1bHIHxHH HHvH}11ljX"8IHk 2HHHn" H'H81H8nH} 1116D$HHHH! H814 H=H= xH} 11|$HH|$HDl$HHt$1DA9DD$`AA9HDD$`H7 HH5! H81nDH= .H}11Hwj8CIH zH} 1H-B 1IH5F HIĿ1 @`LHHOt߉HIcH5 HH1H- L"뢿 1*HcV" @H= " tHH1HuL 1HH-c H5 L%S LL-R HʉHLB HH/ IDH5{ IEտ1HH IDH5*IEտ1 HHIDH5> IEտ1HHH5@ Hى¿1WljHcHH5 ڿ1(H5 1Ht$(d~`HL$0H\$(L% H,L%;HLtL H5 1LHH9u¿ EHIHHD$;HIHH$ILt$@1D|$LMMHx HD$XHD$ 4LD$ HT$LHt$LHD$XH@H1H50HIqI9IUHDPt11L+HHHHD$`dHL$HpHT$(Hc|$`Ht$(*|{ZK{s=8KH IIH H81Hw H= 'H|H=(fH=H= ?H=')H= H|$Lt$@D|$L/HcHHpH= cH= MH50Hٿ1H- H` H H81fHt$H} H/|$`WIDD$`H H H5Hٿ1H-}XEIHLH H= iH=8 SH=J =H='H HQH=> 1=HHH50 HD1}-HD$H55 H1HSI6H=\1@IHH H=GHAL$HH#H=,H= 8EЃ-9=:}=0}&<-H=tHD$H8_IHcD$LHL$HT$8HI>jH H=EHIHH H=H8KIIHH=g pH=)ZHH!H H=tH;!IHwH 1I^HHPTIp)@H)@H@%@A`UH-A`HHw]øHt]A`A`UH-A`HHHH?HHu]úHt]HƿA`=) uUH~] @H=0 tHtU>`H]{sAWAAVIAUIATL% UH- SL)1HHHtLLDAHH9uH[]A\A]A^A_Ðf.HH,unlockedyesno???/bin/bash--drop=Capabilities not availableunable to select CAP_SETPCAPfailed to drop [%s=%u] --inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s] --keep=--chroot=/--secbits=--forkfor=unable to fork()--killit=no forked process to kill Unable to kill child process--uid=Failed to set uid=%u: %s --gid=Failed to set gid=%u: %s --groups=No memory for [%s] operation No memory for gid list Failed to setgroups. --user=User [%s] not known --decode=0x%016llx=%s%s%s%u--supports=--printCurrent: %s Bounding set =Securebits: 0%o/0x%x/%u'b%s secure-noroot: %s (%s) secure-keep-caps: %s (%s) [Keepcaps ABI not supported]uid=%u(%s) gid=%u(%s) %s%u(%s)execve /bin/bash failed! --helpBSET modification requires CAP_SETPCAP Unable to drop bounding capability [%s] capability [%s] is unknown to libcap unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changelibcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s] prctl(PR_SET_KEEPCAPS, %u) failed: %s Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x waitpid didn't match child: %u != %u child terminated with odd signal (%d != %d) Too many groups specified (%d) Failed to identify gid for group [%s] Unable to get group list for userUnable to set group list for userFailed to set gid=%u(user=%s): %s Failed to set uid=%u(user=%s): %s cap[%s] not recognized by library cap[%s=%d] not supported by kernel secure-no-suid-fixup: %s (%s) [Securebits ABI not supported] prctl-keep-caps: %s (locking not supported) usage: %s [args ...] --help this message (or try 'man capsh') --print display capability relevant state --decode=xxx decode a hex string to a list of caps --supports=xxx exit 1 if capability xxx unsupported --drop=xxx remove xxx,.. capabilities from bset --caps=xxx set caps as per cap_from_text() --inh=xxx set xxx,.. inheritiable set --secbits= write a new value for securebits --keep= set keep-capabability bit to --uid= set uid to (hint: id ) --gid= set gid to (hint: id ) --groups=g,... set the supplemental groups --user= set uid,gid and groups to that of user --chroot=path chroot(2) to this path --killit= send signal(n) to child --forkfor= fork and make child sleep for sec == re-exec(capsh) with args as for -- -- remaing arguments are for /bin/bash (without -- [%s] will simply exit(0)) ;4PH(zRx *zRx $FJ w?;*3$"4DRBBB B(A0A8GD|eBEE E(H0H8M@l8A0A(B BBB(@(@  @ t)@=`>`o@ @@  @`@ @ @0 oP @oo @>`F@V@f@v@@@@@@@@@@@&@6@F@V@f@v@@@@@@@@@@@&@6@F@V@f@v@@@@@@@@@@@&@6@F@V@f@v@@@@@capsh.debug A7zXZִF!t//]?Eh=ڊ̓NrAI %GvtـAw7-M4я+DD˞a _ P )˴%m/|4P^,|]DŬn._Y~SL:x ƭa}a+Eή T\JtƎwMk䇔ن[6V#z`κO\#ɮ=iI0YnEA=*$NJ5 F;47`yk0ԫT1#vays4e@KSO֏ݘ@/ j8xN4u3:QOOL!c>:Dْ#,v6;dATXz[n?R n5jΝ֝451~R~k'qIXȵ i]#nFJv0$n75=f]1,hEwD@aRz/?()$ή|MA5{ *5 +NN决<▗l٥3Ѻ'*A;f=m+ {5Ia)i[~!/UgYZ.shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.jcr.dynamic.got.got.plt.data.bss.gnu_debuglink.gnu_debugdata 8@8T@T !t@t$4o@8> @0F @ No @ [oP @P Pj @ 0tB @ @ ~@y0@0@t)@t) )@) (5@(54`5@`5 =`=>`>>`>>`>?`?@`@A`AA`Ah AAp\E