ELF>PA@q@8 @@@@ ''PPPhhhkh{h{ xkx{x{88800hhhDDStd88800Ptdbbb\\QtdRtdhkh{h{/lib64/ld-linux-x86-64.so.2 GNUGNUMqqLcA& GNUL@LNڡ]emO$gk  Zx4F[*=S-J a,hy&&8O`?B~, d14T "{_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTablecap_from_namecap_to_namecap_setuidcap_get_secbitscap_get_ambientcap_reset_ambientcap_drop_boundcap_set_proccap_max_bitscap_iab_from_textcap_set_modecap_mode_namecap_freecap_get_boundcap_clear_flagcap_get_proccap_setgroupscap_from_textcap_set_flagcap_to_textcap_get_modecap_iab_set_proccap_set_ambientcap_dupcap_get_flagcap_iab_get_proccap_iab_to_textcap_set_secbitschroot__printf_chkexitstrncmpperrorgetpwuidgetgrgidputsfork__stack_chk_failputcharkillstrdupstrtokgetgrnam_rgetpwnamcallocstrlenprctl__errno_locationchdir__fprintf_chkmemcpystrtoulmallocgetgid__ctype_b_locstderrgetgroupsgetuidexecvestrtoullfwritegeteuidwaitpidsleep__cxa_finalize__sprintf_chkgetgrouplistsetgidstrcmpstrerror__libc_start_mainsysconflibcap.so.2libc.so.6GLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.4GLIBC_2.2.5cii mti wii ui h{0Bp{ANL#@MJ}}}}}}}} } } } } }}~~~~ ~(~0~8~@~H~P~X~`~h~p~x~ ~!~"~$~%~&~'~(~)~*~+~,~-~.~/~0~12345 6(70889@:H;P<X=`>h?pAxBCDEFGHIKHH_HtH5Z]%[]hhhhhhhhqhah Qh Ah 1h !h hhhhhhhhhhqhahQhAh1h!hhhh h!h"h#h$h%h&h'qh(ah)Qh*Ah+1h,!h-h.h/h0h1h2h3h4h5h6h7qh8ah9Qh:Ah;1h<!h=h>h?h@hAhBhChDhE%-[D%%[D%5[D%XD%XD%XD%XD%XD%XD%XD%XD%XD%}XD%uXD%mXD%eXD%]XD%UXD%MXD%EXD%=XD%5XD%-XD%%XD%XD%XD% XD%XD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%}WD%uWD%mWD%eWD%]WD%UWD%MWD%EWD%=WD%5WD%-WD%%WD%WD%WD% WD%WD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VD%VDAWAVAUATUSH|$H4$HT$dH%(H$1xn8cHtH5,P1HcD$H$D$ LtH&HD$LzfM'H5&L H5&LH5&L H5&L H5&LH5&L~H5&LH5&LH5&L LH=&; LH=&wLH=& LH=&$ LH=& LH=& LH=& LH=&w LH=&[ LH=&?- LH=&# LH=1' LH=2' LH=+' LH= '8LH='!LH=' LH='nID$HD$IHt$PH|$H]H5Y#L1tA@H|$P~~H|$HcyYyHl$HH|$PHIM9Q1f.Ht$PI|$ a|$P~IHZ)H H?RH81~fD1{H RH=#HY?LHH HH\$DXf.HLBH|$P33|$DH|$HA+E1H5!6IHuLd$HH|$P?L7Hf.I|$ ~I|$ 1m6`HPH="H>$IHHLHHt$1AHH 21L0LIUMEIHZHT$ HLII| HD$(>HT$ HI ztHH=!HT$(LLHLHHLLHtHKHH;HHH1AHH z1tIHx5IH|HH)L L~IH f.LL/HHIuʿLH5#1$H1!IHHrHH 1AHH g0HcH*IHx nL)H= LbIH&H HIHxIHIHLp'8SLH5iH1I LHILLH5M%IMH LH1;:H5HL%L1^HHHuο !1I|$1HÉ1p8KH81}H="gH=h"QH=+RH="*H=H=m"xI|$11H&82HIHgJH8111I|$ H|$ H|$ l$ Ht$P1҉A9DD$PD9D$ LI|$11HAQ+8mDHI5I|$ 11H8/H&IAH"L$ Hr"H=H(IH=kHw]Ht$PI|$ |$PGIDD$PH#H I|$ 1E1)H5H-*HH1 HAA@HDHHtDHT$ /HT$ HIsHH51L HIH ILHHvD$PdLl$ppHL$PLLw8Hct$P{L {8[KMIHGH!H81EQHHD$ IHZ)HHD$0HHI1Hx HD$HHD$85LD$8HL$ LLHt$P,HD$HH@DH1H5^\$(IHtVH9\$0~&IUHDPt11LDHFپHH81L;Hc|$(Hu7H"H>FH=LHsHFH=:HcIIHLHxDH5`15H-H=qH=`[LH4H$H5_ H1HI7H=s1@H:EH=RHoH=rYIHHDH=.H: H= LH=JLH=LH=  LH=r5 LH=VLH=:I|$HHHDHAA<$-H$H8hH$LIHcD$HHT$I?HL$HE1HCHH:H5HI1LIHAH5CH=H5BH=HH;H5HI1rLHfCAĸ@LLHtHэpHHH0 3uHL-_HEILLAH51@L%:H (IDL@HH5HE1@LH ID@H5HE1@ LH ID@HEH51a1zx-@ŀLH ID@@H5dHE1)A:Hlj)L THtLH EHtHMDAH5\1LARH HtHDH5@11ۿLl$pL%H5 1|LdHEBA|HT$ HT$ LHtLALH51H%L9 ADH5H1IHVHH=[H|$wI|$ 116H9AHI|$ 11H9WAH[Ht$PI|$|$PV IH|H]Ht$HI|$t$HHL$PHHu |$P{IHHHt$HI|$5x@lt$HHL$PHHsu |$P(IHjHIHH=/H=pH=2}1I^HHPTLH H=Z>H=>H>H9tH&>Ht H=Y>H5R>H)HH?HHHtH >HtfD=%>u+UH==Ht H==d=]wUHSHHHHt8HHEHHtP1AH uH[]H=l #H=q H4="H=cHifAWAVAUIATAUSH(dH%(HD$1Ht$H|$H5 L1tD@H|$>LDH|$ <yHl$H|$SHKHD$dH+%(H([]A\A]A^A_LIHHLl$MfLL H|$|$D?H|$cu_1H5B IHuHl$H|$HHD$dH+%(H(L[]A\A]A^A_@H=$H= EH j HHf HHEH ;IH81uHCH:LHH81CEDL$MH H HEH:H H81@Hq:H= HfDAVH1AUL5 L-ATIH5 US1,DHL1H5 MlHAԅx8tHHuLH5Z 1M,f.u[H== ]A\A]A^[ ]A\A]A^^f.@AWL=4AVIAUIATAUH-4SL)H?Ht1LLDAHH9uH[]A\A]A^A_ff.HHCapabilities not availableunable to select CAP_SETPCAPclearraiseallfailed to allocate names failed to %s ambient [%s=%u] ,%s set =%s%u%s%s /bin/bashunlockedyesno???--drop=failed to drop [%s=%u] --dropped=--has-ambientambient set not supported --addamb=--delamb=--noambfailed to reset ambient set --inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s] --modesSupported modes:UNKNOWN %s--mode=failed to set mode [%s]: %s --inmode=--keep=--chroot=/--secbits=--forkfor=already forked unable to fork()--killit=no forked process to kill Unable to kill child process--uid=Failed to set uid=%u: %s --cap-uid=Failed to cap_setuid(%u): %s --gid=Failed to set gid=%u: %s --groups=No memory for [%s] operation No memory for gid list Failed to setgroups. --user=User [%s] not known --decode=0x%016llx=--supports=--printCurrent: %s BoundingAmbientCurrent IAB: %s secure-noroot: %s (%s) secure-keep-caps: %s (%s) uid=%u(%s) euid=%u(%s) gid=%u(%s) %s%u(%s)Guessed mode: %s (%d) --==execve '%s' failed! --shell=--has-p=cap[%s] not permitted --has-i=cap[%s] not inheritable --has-a=--is-uid=uid: got=%d, want=%d --is-gid=gid: got=%d, want=%d --iab=iab: '%s' malformed unable to set IAP vectors--helpunsupported mode: %s modification requires CAP_SETPCAP unable to raise CAP_SETPCAP for AMBIENT changesunable to lower CAP_SETPCAP post AMBIENT changeUnable to %s ambient capability [%s] capability [%s] is unknown to libcap WARNING: libcap needs an update (cap=%d should have a name). unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changeUnable to drop bounding capability [%s] cap[%s] not recognized by library cap[%s] raised in bounding vector libcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s] mismatched mode got=%s want=%s prctl(PR_SET_KEEPCAPS, %u) failed: %s Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x waitpid didn't match child: %u != %u child terminated with odd signal (%d != %d) Too many groups specified (%d) Failed to identify gid for group [%s] Unable to get group list for userUnable to set group list for userFailed to set uid=%u(user=%s): %s cap[%s=%d] not supported by kernel Securebits: 0%lo/0x%lx/%u'b%s secure-no-suid-fixup: %s (%s) secure-no-ambient-raise: %s (%s) cap[%s] not in ambient vector usage: %s [args ...] --help this message (or try 'man capsh') --print display capability relevant state --decode=xxx decode a hex string to a list of caps --supports=xxx exit 1 if capability xxx unsupported --has-p=xxx exit 1 if capability xxx not permitted --has-i=xxx exit 1 if capability xxx not inheritable --drop=xxx remove xxx,.. capabilities from bset --dropped=xxx exit 1 unless bounding cap xxx dropped --has-ambient exit 1 unless ambient vector supported --has-a=xxx exit 1 if capability xxx not ambient --addamb=xxx add xxx,... capabilities to ambient set --delamb=xxx remove xxx,... capabilities from ambient --noamb reset (drop) all ambient capabilities --caps=xxx set caps as per cap_from_text() --inh=xxx set xxx,.. inheritable set --secbits= write a new value for securebits --iab=... use cap_iab_from_text() to set iab --keep= set keep-capability bit to --uid= set uid to (hint: id ) --cap-uid= libcap cap_setuid() to change uid --is-uid= exit 1 if uid != --gid= set gid to (hint: id ) --is-gid= exit 1 if gid != --groups=g,... set the supplemental groups --user= set uid,gid and groups to that of user --chroot=path chroot(2) to this path --modes list libcap named capability modes --mode= set capability mode to --inmode= exit 1 if current mode is not --killit= send signal(n) to child --forkfor= fork and make child sleep for sec --shell=/xx/yy use /xx/yy instead of /bin/bash for -- == re-exec(capsh) with args as for -- -- remaining arguments are for /bin/bash (without -- [%s] will simply exit(0)) ;\ @x0x@zRx /D$4xpFJ w?:*3$"\0t`(@ADG B AAA `BBB E(D0A8D` 8A0A(B BBBI  8D0A(B BBBE H BLP K(A0{ (H BBBM A(F BBB0hD-FBB B(A0A8GDeFIE E(D0H8G@n8A0A(B BBB0BAWc Gh{p{oH   x} ooooox{0 @ P ` p !! !0!@!P!`!p!!!!!!!!!"" "0"@"P"`"p"""""""""## #0#@#P#`#p#########$$ $0$@$P$`$p$$/usr/lib/debug/.dwz/x86_64-linux-gnu/libcap2-bin.debugMb )AfΒV 71bfa20feb71c3ecee4ca96341a39b95260de7.debug_d,J.shstrtab.interp.note.gnu.property.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.data.bss.gnu_debugaltlink.gnu_debuglink 880&hh$9 Go0Q hYH H aono`}B  p$$0$$` ) )GG PPbb\pbpbh{hkp{pkx{xkx}xmp ph pK\p4p"