ELF>=@z@8 @@@@hh`\`\ 8k8k 8k P PkPk Pk  DDStd PtdYYYddQtdRtd8k8k 8k /lib64/ld-linux-x86-64.so.2GNUGNUGNU|Ӷ>~ݸqA4Q@ QSBE|qX[:}w  p)@Rg6aiQ`) wB%tJ= 62NslUN8 pGX"`$({p p p libcap.so.2_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTablecap_from_namecap_to_namecap_setuidcap_get_secbitscap_get_ambientcap_reset_ambientcap_drop_boundcap_set_proccap_max_bitscap_iab_from_textcap_set_modecap_mode_namecap_freecap_get_boundcap_clear_flagcap_get_proccap_setgroupscap_from_textcap_set_flagcap_to_textcap_get_modecap_iab_set_proccap_set_ambientcap_dupcap_get_flagcap_iab_get_proccap_iab_to_textcap_set_secbitslibc.so.6chroot__printf_chkexitstrncmpperrorgetpwuidgetgrgidputsfork__stack_chk_failputcharkillstrdupstrtokgetgrnam_rgetpwnamcallocstrlenprctl__errno_locationchdir__fprintf_chkmemcpystrtoulmallocgetgid__ctype_b_locgetenvstderrgetgroupsgetuidexecvestrtoullfwritegeteuidwaitpidsleep__cxa_finalize__sprintf_chkaccessgetgrouplistsetgidstrcmpstrerror__libc_start_mainsysconf_edata__bss_start_endGLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.4GLIBC_2.2.5ii ti ii ui 8k p>@k 0>Hk Hk o  o o o o &o Do Jo Ohm pm xm m m m m m m  m  m  m  m m m m m m m n n n n  n (n 0n 8n @n Hn Pn  Xn !`n "hn #pn $xn %n 'n (n )n *n +n ,n -n .n /n 0n 1n 2n 3n 4n 5n 6o 7o 8o 9o : o ;(o <0o =8o >@o ?Ho @Po AXo B`o Cho Epo Fxo Go Ho Io Jo Ko Lo Mo No PHHW HtH5U %U hhhhhhhhqhah Qh Ah 1h !h hhhhhhhhhhqhahQhAh1h!hhhh h!h"h#h$h%h&h'qh(ah)Qh*Ah+1h,!h-h.h/h0h1h2h3h4h5h6h7qh8ah9Qh:Ah;1h<!h=h>h?h@hAhBhChDhEhFhGqhHahIQhJA%MP D%EP D%=P D%5P D%-P D%%P D%P D%P D% P D%P D%O D%O D%O D%O D%O D%O D%O D%O D%O D%O D%O D%O D%O D%O D%O D%O D%}O D%uO D%mO D%eO D%]O D%UO D%MO D%EO D%=O D%5O D%-O D%%O D%O D%O D% O D%O D%N D%N D%N D%N D%N D%N D%N D%N D%N D%N D%N D%N D%N D%N D%N D%N D%}N D%uN D%mN D%eN D%]N D%UN D%MN D%EN D%=N D%5N D%-N D%%N D%N D%N D% N D%N D%M DAWAVAUATUSH(|$Ht$HT$dH%(H$1xmH8cHH`|$D$HT$D$L51LzLdH^1HD$ DILH H5i1HuH5V1H H5a1H H5M1HH591HuH5@1HH5P1HHH=V1HH=_12 HH=h1HH=V1 HH=W1C HH=G1j HH=N1z HH=v1^ HH=1B7 HH=1& HH=1  HH=2 HH=J2P HH=K2 HH=D2 HH=92#HH=3 ]HH=2FHH=29HCHD$ HHt$`H|$X-H5-H1tA@H|$`n0H|$XS+SyH\$XH|$`HIM9a1f.Ht$`H{ B|$`~IHc H HI H811{HzI H=|-HY?HH$HsH<$Hl$TVHHH|$`#|$TH|$XAE1H5+6HHuH\$XH|$`?H7H<$fH{ DH{ 1j]H\H H=,H;!H5P19HHHHCIHt$1AHH 11HHHH$.HI7H1HH~Ht$(H|$0H<$HHHHHHH| HD$8Ht$(HH~tHt$0H=+ZHT$8H4$HH]HeHHH<$H(MtLLcHHKqHH1AHH Z0iIHxHHHHHq~H>HL-+ f.HHELH€u̿HH5/1HTIHxHHSIHG*LL$0L$HHH *1;iH{H5*HÉ1O8HIH6E H81/ZLE1VH=aS8,HH5)H1DH YHHHHHH5.H5D)nL-?)H-@)fDHH1FLHuͿ kH=jH=!TIH Hd(HHHHHs1AHH c-v H HIHx H߉tdHIHH |$p H{ H5(>HÅ8D$UH=#(H߉j넉IHHHHB H81H.H{ H5'HtA؉HHgB H81`DD$THH&&H=B H816 HHJ^H=J%aH{ H5'|$H|$>dDl$1Ht$`DA94DD$`D9D$H=%cH{H5q'HS8HY'IH=&%H=LwH=^aH=KH=5IHA H{ H5&HR8H&IHH{H5&ljt^8H&I H=(Ht$`H{ |$`IDD$`HH HHHHD$`dpHL$`HL$LHct$`}Ly}78MIؾIHf? HH81]3E HHD$(7H$Hl HHD$8HHI1Hx HD$XHD$@HD$`HD$H=LD$@HL$(LH$Ht$HHD$XH@H1H5!l$0IHtUH9l$8~%"IUHDPt11LHS> H]H81CH<$`Hc|$0Hu7HGH> H=$HH= H=$HIH[$LHH=jH{ 11hH5$H-u HI1HH% @LHHt߉H$H$HrHH$1H5! L$LpHH\$H51HHH[H=U&HHH=B&AHjAL$H/H=@"H=#H{HHtWHBH=*#YH{ H5" HW9A؉H"XIH"HH{ H5L" H9A؉HB"Ht$`H{N|$`[UIHYHHt$XH{t$XHL$`HHu |$`:IHs!H;H=#>H=(H8 H=HH51H8;=H|$ IHT$HcD$LHHT$I?/H@8 IHg H81/I?W1HH+H5=HH1HjHbH57 H=H57 H=|wHHHSHHHH5 1qHHH7 7 Ÿ@IHHtэpHH0 3uHE1E1111'1gHHIى1H5HHQHRHHH-D@1AH ^HEHA_HEH5Q1AH THZHEAH5HE1`A H HEH AHEH51/1(x1AŀH HHEA@H5^HE1>ljI}ljL HtLH MtIMAH51ljH fHtHH5x1kH511H$NH޿dHL$$IAH=A usage: %s [args ...] --has-a=xxx exit 1 if capability xxx not ambient --has-ambient exit 1 unless ambient vector supported --addamb=xxx add xxx,... capabilities to ambient set --cap-uid= use libcap cap_setuid() to change uid --caps=xxx set caps as per cap_from_text() --chroot=path chroot(2) to this path --decode=xxx decode a hex string to a list of caps --delamb=xxx remove xxx,... capabilities from ambient --forkfor= fork and make child sleep for sec --gid= set gid to (hint: id ) --groups=g,... set the supplemental groups --has-p=xxx exit 1 if capability xxx not permitted --has-i=xxx exit 1 if capability xxx not inheritable --has-no-new-privs exit 1 if privs not limited --help, -h this message (or try 'man capsh') --iab=... use cap_iab_from_text() to set iab --inh=xxx set xxx,.. inheritable set --inmode= exit 1 if current mode is not --is-uid= exit 1 if uid != --is-gid= exit 1 if gid != --keep= set keep-capability bit to --killit= send signal(n) to child --license display license info --modes list libcap named capability modes --mode= set capability mode to --no-new-privs set sticky process privilege limiter --noamb reset (drop) all ambient capabilities --print display capability relevant state --secbits= write a new value for securebits --shell=/xx/yy use /xx/yy instead of /bin/bash for -- --supports=xxx exit 1 if capability xxx unsupported --uid= set uid to (hint: id ) --user= set uid,gid and groups to that of user == re-exec(capsh) with args as for -- -- remaining arguments are for /bin/bash (without -- [%s] will simply exit(0)) unable to find executable '%s' in PATH ,%s set =%s%u%s%s Capabilities not availableunable to select CAP_SETPCAPclearraiseallfailed to allocate names failed to %s ambient [%s=%u] /bin/bashunlockedyesno???--drop=failed to drop [%s=%u] --dropped=--has-ambientambient set not supported --addamb=--delamb=--noambfailed to reset ambient set --inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s] --modesSupported modes:UNKNOWN %s--mode=failed to set mode [%s]: %s --inmode=--keep=invalid --keep value--chroot=/--secbits=invalid --secbits value--forkfor=already forked invalid --forkfor valueunable to fork()--killit=invalid --killit signo valueno forked process to kill Unable to kill child process--uid=invalid --uid valueFailed to set uid=%u: %s --cap-uid=invalid --cap-uid valueFailed to cap_setuid(%u): %s --gid=invalid --gid valueFailed to set gid=%u: %s --groups=No memory for [%s] operation No memory for gid list Failed to setgroups. --user=User [%s] not known --decode=0x%016llx=--supports=--printCurrent: %s BoundingAmbientfailed to get IAB for processfailed to obtain text for IABCurrent IAB: %s secure-noroot: %s (%s) secure-keep-caps: %s (%s) uid=%u(%s) euid=%u(%s) gid=%u(%s) %s%u(%s)Guessed mode: %s (%d) --==%s/%sexecve '%s' failed! --shell=--has-p=cap[%s] not permitted --has-i=cap[%s] not inheritable --has-a=--is-uid=invalid --is-uid valueuid: got=%d, want=%d --is-gid=invalid --is-gid valuegid: got=%d, want=%d --iab=iab: '%s' malformed unable to set IAP vectors--no-new-privsunable to set no-new-privs--has-no-new-privsno-new-privs not set --license--help-hunsupported mode: %s PATH;d P@lP@`zRx H/D$4FJ w?:*3$"\t;AM A HBLP K(A0{ (H BBBM A(F BBB(ADG B AAA XBBB D(D0DP 0A(A BBBK  0D(A BBBE (dADG0I AAI HFBB B(A0A8G;DdPDeFEE E(H0H8G@n8A0A(B BBB$p>0>Hk  ( (D8k @k o0@ `  Pm   oooo oPk `p 0@P`p 0@P`p 0@P`p 0@P`pGA$3a1(= GA$3p1113!CGA*GA$annobin gcc 8.5.0 20210514GA$plugin name: annobinGA$running gcc 8.5.0 20210514GA*GA*GA! GA*FORTIFYGA+GLIBCXX_ASSERTIONS GA*GOW*GA*cf_protectionGA+omit_frame_pointerGA+stack_clashGA!stack_realignGA$3a1=5D GA$3p1113C%DGA*GA$annobin gcc 8.5.0 20210514GA$plugin name: annobinGA$running gcc 8.5.0 20210514GA*GA*GA! GA*FORTIFYGA+GLIBCXX_ASSERTIONS GA*GOW*GA*cf_protectionGA+omit_frame_pointerGA+stack_clashGA!stack_realign GA*FORTIFY>C GA*FORTIFYCDGA+GLIBCXX_ASSERTIONSGA+GLIBCXX_ASSERTIONS>Ccapsh-2.48-6.el8_9.x86_64.debugF7zXZִF!t/g]?Eh=ڊ2NzX v4'K;)rY tJ$t~ v&ʸwUKxJ3X&/NI [}j#L$f,"S05zVҮnΐY'=ɭzQ?Ѐ託a7q-Nb"̷utQ~tܰE}60v ſ>kqNl n#C:SsL j<3( eۖ76{+۲_ \Ɉ[؝XeRg4JRIP)LJ'M3T-8ZdiPƆ2zgPrKågm}X#|!%3ʣ5D]uR̸0ҀɛrXu72g58YEĽk-1#|-k:?5zYCeju(5gc;^ j&\u6oQb;;pVX wX8^ŶDް|´P я#D׆oXۃv BEt w#oWT4K]^r~(\ _пՎ%FbՖ.ʨv%|e 'qM"ohM}p_Ć zêzRtojȖ`i ?QRuIbczj}Q~QKuY<{ôLȗ+~‘'vҮgK QߢZ) FL.+Nt=SxFXjmU q賗µ:sFPe_Zdb1[-cƟmN@j[bvm%:Ycb?Ί,K{ތF/"^ ԯ[: ܌]Nǫ_o$ՠ