ELF>(@@ C@8 @@@@@@88@8@@@L6L6 ==`=`p >>`>`TT@T@DDPtd55@5@44QtdRtd==`=`/lib64/ld-linux-x86-64.so.2GNUGNUb))t>A⌹)CQ= @ =?ABE|qX` VDM4l\) hf"UH,=m~8 t/%L c4[:A`hB`A`{ @ud)@libcap.so.2_ITM_deregisterTMCloneTable__gmon_start___Jv_RegisterClasses_ITM_registerTMCloneTablecap_drop_bound_fini_initcap_get_boundcap_get_proccap_to_namecap_to_textcap_clear_flagcap_freecap_set_proccap_dupcap_set_flagcap_from_namecap_from_textlibc.so.6setuidchroot__printf_chkexit__strdupperrorgetpwuidgetgrgidputsforkputcharkillstrtokgetgrnam_rgetpwnamcallocstrlenprctl__errno_locationchdirmemcmpsetgroups__fprintf_chkmemcpystrtoulmallocgetgid__ctype_b_locstderrgetgroupsgetuidexecvestrtoullfwritewaitpidsleep__sprintf_chkgetgrouplistsetgidstrcmpstrerror__libc_start_mainsysconf_edata__bss_start_endGLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.2.5 ii ti ui ?`?`;@` @`(@`0@`8@`@@`H@`P@` X@` `@` h@` p@` x@`@`@`@`@`@`@`@`@`@`@`@`@`@`@`@`@`A`A` A`!A`" A`#(A`$0A`%8A`&@A`'HA`(PA`)XA`*`A`+hA`-pA`.xA`/A`0A`1A`2A`3A`5A`6A`7A`8A`9A`:A`<HH- HtH5- %- @%- h%- h%- h%- h%- h%- h%- h%- hp%- h`%- h P%- h @%z- h 0%r- h %j- h %b- h%Z- h%R- h%J- h%B- h%:- h%2- h%*- h%"- h%- hp%- h`% - hP%- h@%, h0%, h %, h%, h%, h%, h %, h!%, h"%, h#%, h$%, h%%, h&%, h'p%, h(`%, h)P%, h*@%z, h+0%r, h, %j, h-%b, h.%Z, h/%R, h0%J, h1%B, h2%:, h3%2, h4%*, h5%", h6%, h7pAWAVAUATUSH|$ Ht$HT$@HD$AD$HHXHD$`HD$HD$dHD$8HD$XHD$0L#H=mL<4H=L H=L?H=LH= LH= LH= LH= Lx0H=L\ H=L@H= L${ H=LC H= LH= L H=L 1HHoH5HIĿ1LL%rH1H51ZtfKHI H5;HL1L%LwDHIJHHI H h1AH_ H;au lIHH\$ Ld$S@LH%Lt$`1Lo1H5>HHuH\$ LL<HIZH. LHHt$H g1AH^1L|LIM HHBHT$ HHD$(LII| I7HIHT$  ztHt$(H=IVLLLHI L|LHtH7H_L' LGAHD9|$ q1mHHH 91AH0HHx HI& HH l 1)$yI|$11H1 8HIH`$ H81oHH HHI H #1AHB LH LHHx HH=HAEKH HH I|$ 11H1HiAH]# H81lH1"LL$(H C MHL1^HHHxHI LLrI|$11ljS58IHb .HHH" HH81HKI|$ 11C5D$HHHH " H81FH=H=I|$ 11|$HH|$HDt$HHt$1D-D9DD$`AA9 HDD$`H, HHF! H81UH= ?I|$11Hz8SIH sI|$ 1L%5 1XH59 HIſ1 @aLHHPt߉HI]H5 HL1L% L1뢿 19Hc" @H=9" tHH1HuL 1HL%W H5 L-G LL5F HʉHDB@LH" IDH5n @IEֿ1@LHIDH5@IEֿ1@ LHIDH5- @IEֿ1HH(H5. H¿1a ljHXHH5 12H5 1Ht$d~\HL$8Hl$L- L$ fL-}HLtLMH5 1LHL9u EHIHHD$ ;HIHH$HH\$(E1LD|$LHx 6LD$0HT$ LHt$LHD$XH@BDI1H5HHIrL9IHDPt11LDBDILHHD$XdHL$0LpHT$Hc|$XHt$A}qT}1rT8-MH IMH H81H H='HH=#}H=H= VH="@H= *H|$ H\$(D|$LFIcH+H+oH=w zH= dH5+L1L%Hw H DH81|Ht$I|$ ]6|$`lH DD$`H H H5L1L%vmKH HLHw H= ~H=- hH=? RH=<H H-\H=3 1RHHH5% HD1A|$-HD$H5( H1HfH3H=S1@H HH H=>HAL$HH"H=#2H=AA$Ѓ-6=9A|$=-A|$!<-H=tHD$H8mHHcD$ HHL$HT$@HH;xH H=7HH HH H=H8MIMHH=U~H=hLHH* H=fHI/H HeH 1I^HHPTI`)@H(@H@3fA`UH-A`HHw]øHt]A`A`UH-A`HHHH?HHu]úHt]HƿA`=Y uUH~]F @H=@ tHtU>`H]{sAWAAVIAUIATL% UH- SL)1HHHtLLDAHH9uH[]A\A]A^A_ff.HH,unlockedyesno???/bin/bash--drop=Capabilities not availableunable to select CAP_SETPCAPfailed to drop [%s=%u] --inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s] --keep=--chroot=/--secbits=--forkfor=unable to fork()--killit=no forked process to kill Unable to kill child process--uid=Failed to set uid=%u: %s --gid=Failed to set gid=%u: %s --groups=No memory for [%s] operation No memory for gid list Failed to setgroups. --user=User [%s] not known --decode=0x%016llx=%s%s%s%u--supports=--printCurrent: %s Bounding set =Securebits: 0%o/0x%x/%u'b%s secure-noroot: %s (%s) secure-keep-caps: %s (%s) [Keepcaps ABI not supported]uid=%u(%s) gid=%u(%s) %s%u(%s)execve /bin/bash failed! --helpBSET modification requires CAP_SETPCAP Unable to drop bounding capability [%s] capability [%s] is unknown to libcap unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changelibcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s] prctl(PR_SET_KEEPCAPS, %u) failed: %s Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x waitpid didn't match child: %u != %u child terminated with odd signal (%d != %d) Too many groups specified (%d) Failed to identify gid for group [%s] Unable to get group list for userUnable to set group list for userFailed to set gid=%u(user=%s): %s Failed to set uid=%u(user=%s): %s cap[%s] not recognized by library cap[%s=%d] not supported by kernel secure-no-suid-fixup: %s (%s) [Securebits ABI not supported] prctl-keep-caps: %s (locking not supported) usage: %s [args ...] --help this message (or try 'man capsh') --print display capability relevant state --decode=xxx decode a hex string to a list of caps --supports=xxx exit 1 if capability xxx unsupported --drop=xxx remove xxx,.. capabilities from bset --caps=xxx set caps as per cap_from_text() --inh=xxx set xxx,.. inheritiable set --secbits= write a new value for securebits --keep= set keep-capabability bit to --uid= set uid to (hint: id ) --gid= set gid to (hint: id ) --groups=g,... set the supplemental groups --user= set uid,gid and groups to that of user --chroot=path chroot(2) to this path --killit= send signal(n) to child --forkfor= fork and make child sleep for sec == re-exec(capsh) with args as for -- -- remaing arguments are for /bin/bash (without -- [%s] will simply exit(0)) ;4(PX(zRx *zRx $FJ w?;*3$"4DDBBB B(A0A8GD|eBEE E(H0H8M@l8A0A(B BBB((@(@  @ d)@=`>`o@ @@  @`@ @ @0 oP @oo @>`F@V@f@v@@@@@@@@@@@&@6@F@V@f@v@@@@@@@@@@@&@6@F@V@f@v@@@@@@@@@@@&@6@F@V@f@v@@@@@1329297fd1743eb79a418ce28cb9ed294351db.debugS,.shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.jcr.dynamic.got.got.plt.data.bss.gnu_debuglink 8@8T@T !t@t$4o@8> @0F @ No @ [oP @P Pj @ 0t @ @ ~@y0@0@d)@d) p)@p) 5@54@5@@5 =`=>`>>`>>`>?`?@`@A`AB`Ah A4B