ELF>5@a@8 @@@@hh@@ @@@ [kk\llDDPtdKKK<<QtdRtd[kk/lib64/ld-linux-x86-64.so.2GNUGNUYW,Ȝ0/wvy<<em7z -m$aYfI]) t?oRB5 KkR8 DP|2'"libcap.so.2_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTablecap_drop_boundcap_get_boundcap_get_proccap_to_namecap_to_textcap_clear_flagcap_freecap_set_proccap_dupcap_set_flagcap_from_namecap_from_textlibc.so.6setuidchroot__printf_chkexitperrorgetpwuidgetgrgidputsforkputcharkillstrdupstrtokgetgrnam_rgetpwnamcallocstrlenprctl__errno_locationchdirmemcmpsetgroups__fprintf_chkmemcpystrtoulmallocgetgid__ctype_b_locstderrgetgroupsgetuidexecvestrtoullfwritewaitpidsleep__cxa_finalize__sprintf_chkgetgrouplistsetgidstrcmpstrerror__libc_start_mainsysconfGLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.2.5ii sti }ui kp6l06ppoooo2o<o: n(n0n8n@nHnPnXn `n hn pn xn nnnnnnnnnnnnnnnno o!o"o# o$(o%0o&8o'@o(Ho)Po*Xo+`o,ho-po.xo/o0o1o3o4o5o6o7o8o9o;HHOHtH5M%M@%Mh%Mh%Mh%Mh%Mh%Mh%Mh%Mhp%Mh`%Mh P%Mh @%Mh 0%Mh %Mh %zMh%rMh%jMh%bMh%ZMh%RMh%JMh%BMh%:Mh%2Mhp%*Mh`%"MhP%Mh@%Mh0% Mh %Mh%Lh%Lh%Lh %Lh!%Lh"%Lh#%Lh$%Lh%%Lh&%Lh'p%Lh(`%Lh)P%Lh*@%Lh+0%Lh, %Lh-%zLh.%rLh/%jLh0%bLh1%ZLh2%RLh3%JLh4%BLh5%ZLfAWAVAUATUSH|$Ht$HT$ dH %(H$1ɃD$H^HDH$H+}--dr{}--in~}--ca}--kefH--chrootH9E HH= HH=| HH=|HH=HH=| HH=` HH=D HH=( HH= Ht$PH} |$PH DD$PH!H ?DIHIHIH1AHH %HH5HH€L|$PHXLHLet$P1LABE\1H5#HHuL3L+HH9$o1Sf}h=voIH-HLIHt$1AHH $1L0LHHrHLzHT$LHII| IHT$HIKztLH=8*uIVHL3LkIH!HLMtLLLL1f9'ycf}ps}=IH1AHH T#jHHxHHrLL+H0 Hf}ep}=H}11Hʼn18VHIH GH81CHHHHFH81Hh}=IH}HHHa 1AHH "C' HY HHHx L H= LH HwH (H} 11Hʼn1XAH\HEH81H} 11W|$H@ |$^j D|$1Ht$PDA9: DD$PAA9H&uLHHx%HHH H?MIH LH1}uLE1HH6HDH81H=7"H=Q rH} 115HŅD$15DD$PHHH7DH810H=CHHIH D$PdLl$ppHL$PLH(Hc|$PLA|$iA|$8AL$IHDIHjCH81c9H}11HR8^HqIH}11HFvi8"HVIH=EHHB'H=HH= pH=iZH={DH=.H=H=HH==81L-HH"H5HI1 LL%jH1`H51'HL1H5ML'x.tIHuLH5p1M}Ŀ 1ADžHcA@H=TAHtэpHH0 7uL 71HDLL5H5 L%L-H-HDHD@1ALLIEAH5HE1ALLIEAH5HE1A LLIEAH5HE1\H-6HtH(HH51$ljH HtHH51Ll$p11H5;L=LdL5b}A;A|LHtLALLL1HL=V}A9 EHIHD$HHIgIH3HE1H\$8Hx HD$HHD$(HD$PHD$05LD$(HT$LHHt$0lHD$HH@CI1H5HHM9HHDPt11HCH H^H=1%H(HHDH5~1'H} 11@H5L=HIL- 1 @cLHHRt߉IHt&HL1H5MLLH5i1MvH==H=H=Y|H=#fH|$H\$8IcLL5H<DHH81sHD$H57H1HH3H=d1@9HJ<H=N H)AL$HHH== HH$H=H HH HH=TtHH=A}-H= tHD$H8HL$HT$ HHHcD$HH;HQ;H=1H: 8dAL$IHIH=H=PkHH H:H= HH:H=O HnH H f.D1I^HHPTL:H H=:DH=I:HB:H9tH9Ht H=:H5:H)HHH?HHtH9HtfD=9u/UH=9Ht H=9=h9]{f.AWIAVIAUAATL%`5UH-`5SL)HSHt1LLDAHH9uH[]A\A]A^A_HH,unlockedyesno???/bin/bashCapabilities not availableunable to select CAP_SETPCAPallfailed to drop [%s=%u] --inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s] --keep=--chroot=/--secbits=--forkfor=unable to fork()--killit=no forked process to kill Unable to kill child process--uid=Failed to set uid=%u: %s --gid=Failed to set gid=%u: %s --groups=No memory for [%s] operation No memory for gid list Failed to setgroups. --user=User [%s] not known --decode=0x%016llx=%s%s%s%u--supports=--printCurrent: %s Bounding set =Securebits: 0%o/0x%x/%u'b%s secure-noroot: %s (%s) secure-keep-caps: %s (%s) [Keepcaps ABI not supported]uid=%u(%s) gid=%u(%s) %s%u(%s)--==execve /bin/bash failed! --helpBSET modification requires CAP_SETPCAP Unable to drop bounding capability [%s] capability [%s] is unknown to libcap unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changelibcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s] prctl(PR_SET_KEEPCAPS, %u) failed: %s Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x waitpid didn't match child: %u != %u child terminated with odd signal (%d != %d) Too many groups specified (%d) Failed to identify gid for group [%s] Unable to get group list for userUnable to set group list for userFailed to set gid=%u(user=%s): %s Failed to set uid=%u(user=%s): %s cap[%s] not recognized by library cap[%s=%d] not supported by kernel secure-no-suid-fixup: %s (%s) [Securebits ABI not supported] prctl-keep-caps: %s (locking not supported) usage: %s [args ...] --help this message (or try 'man capsh') --print display capability relevant state --decode=xxx decode a hex string to a list of caps --supports=xxx exit 1 if capability xxx unsupported --drop=xxx remove xxx,.. capabilities from bset --caps=xxx set caps as per cap_from_text() --inh=xxx set xxx,.. inheritiable set --secbits= write a new value for securebits --keep= set keep-capabability bit to --uid= set uid to (hint: id ) --gid= set gid to (hint: id ) --groups=g,... set the supplemental groups --user= set uid,gid and groups to that of user --chroot=path chroot(2) to this path --killit= send signal(n) to child --forkfor= fork and make child sleep for sec == re-exec(capsh) with args as for -- -- remaining arguments are for /bin/bash (without -- [%s] will simply exit(0)) ;<XHHzRx +zRx $pFJ w?;*3$"D@4\8BBB B(A0A8GD]BEE E(H0H8G@j8A0A(B BBBp606 6klo0  n0 X  oo oo ol6 F V f v !!&!6!F!V!f!v!!!!!!!!!""&"6"F"V"f"v"""""""""##&#6#F#V#f#v##p/usr/lib/debug/.dwz/x86_64-linux-gnu/libcap2-bin.debugĝRu>e+ǰP572cc89caf302f03aba7f3a6778088d476b579.debugFٞ.shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.data.bss.gnu_debugaltlink.gnu_debuglink  !$4o$> 00FNo z[o  PjX X tB0 0 ~ y p####A66 @@ KK<KK k[l\l\n^p` p`h `K\`4`