-=[ Mr. Bumblebee ]=-
_Indonesia_

Path : /sbin/
File Upload :
Current File : //sbin/capsh

ELF>(@@ C@8	@@@@@@88@8@@@l6l6 ==`=` >>`>`TT@T@DDPtd(5(5@(5@44QtdRtd==`=`/lib64/ld-linux-x86-64.so.2GNU GNURcn^@0= @	=?ABE|qX`
 VDM4l\) hf"UH,=m~8 t/%L c4[:A`B`A`{@u)@libcap.so.2_ITM_deregisterTMCloneTable__gmon_start___Jv_RegisterClasses_ITM_registerTMCloneTablecap_drop_bound_fini_initcap_get_boundcap_get_proccap_to_namecap_to_textcap_clear_flagcap_freecap_set_proccap_dupcap_set_flagcap_from_namecap_from_textlibc.so.6setuidchroot__printf_chkexit__strdupperrorgetpwuidgetgrgidputsforkputcharkillstrtokgetgrnam_rgetpwnamcallocstrlenprctl__errno_locationchdirmemcmpsetgroups__fprintf_chkmemcpystrtoulmallocgetgid__ctype_b_locstderrgetgroupsgetuidexecvestrtoullfwritewaitpidsleep__sprintf_chkgetgrouplistsetgidstrcmpstrerror__libc_start_mainsysconf_edata__bss_start_endGLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.2.5
ii
ti	ui	?`?`;@` @`(@`0@`8@`@@`H@`P@`	X@`
`@`h@`p@`
x@`@`@`@`@`@`@`@`@`@`@`@`@`@`@`@`@`A`A` A`!A`" A`#(A`$0A`%8A`&@A`'HA`(PA`)XA`*`A`+hA`-pA`.xA`/A`0A`1A`2A`3A`5A`6A`7A`8A`9A`:A`<HH- HtH5- %- @%- h%- h%- h%- h%- h%- h%- h%- hp%- h`%- h	P%- h
@%z- h0%r- h %j- h
%b- h%Z- h%R- h%J- h%B- h%:- h%2- h%*- h%"- h%- hp%- h`%
- hP%- h@%, h0%, h %, h%, h%, h%, h %, h!%, h"%, h#%, h$%, h%%, h&%, h'p%, h(`%, h)P%, h*@%z, h+0%r, h, %j, h-%b, h.%Z, h/%R, h0%J, h1%B, h2%:, h3%2, h4%*, h5%", h6%, h7pAWAVAUATUSH(dH%(H$1Ƀ|$ Ht$HT$@D$ HL$L|$`D$$HYHHHD$H$HD$8HD$XHD$0H+H=kH2H=HH=H1H=HH=	HH=
HH=
HrH=	HV,H=H:	H=HH=	Hy
H=H>H=	HH=HH=Hj1HHMH5HIĿ1dLL%pH1H518~t+HIH5;HL1L%LWDHIEHHI
H
h1AH?
H;au
lUHWfDLH
Lt$`1LAzEp1H5DkHHuL{Ls?fDHI]H7
LHHt$H
o1AHF1LdLIM	HHBHT$HHD$(LII|
IHIHT$	ztHt$(H=wIVLLLHI	LdLHtHHGL	L/HH;\$1YHHH
E1AHHHxHI$HHL	Lp	l1
tyH}11aH1`	8HIH1$ H81j@kHHHwHIP	H
1AHB	LH	LHHx	SH[H=
wHAlE4HHqH	rH}
11SH1RH[AH/# H81h>H1LL$(H
5
MHL1HHHHxHIHH
H}11ljL8IHc
>HHHb" HH81H,bH}
11%;D$$}HHH! H81(H=H=lH}	11|$$H
|$$Dt$$1LDD9DD$`AA9HDD$`H1HH+! H81d:H=
$H}11Hm`89IHH}	1L-<
1?H5@HIĿ1@hLHHWt߉HI]H5HL1L-	L뢿
1 Hc" @L
@" 
fDtHHHH҃1HA	uI1HLL5Y	H5L%I	HL-E	DA@LH(	IEH5x@IDտ1@LHIEH5!@IDտ1@ LHIEH57@IDտ1HH(H58H¿1KljH[HH51H5	1	Ht$8d~fHL$8L-
L$HIf}xHLtLMH5
L1HL-L9u
vEHHD$(HHD$HImHH^HH\$HE1LHx	6LD$0HL$(LHT$LHD$XH@BDI1H5+HIL9IHDPt11L'BDHHHID$`dHT$8LpHHc|$`Ht$8&nA|$T9A|$k58AL$HIIH H81Hm H='HrH="\H=H=	5H=	H=	H=	H=	wH|$H\$HIcHyH?H5/L1L%H[ H
DH81`H}LD|$`SHDD$`HHH5L1L-}TKHHLH~
H=	eH=	OH=	9H=0	#H
H-YH=:19HHH5,HE1|}-u}H=HD$H5$H1HBH3H=O1@AL$$HeH=XGH~ H= HHT H=HsYHHT,E-=$}=}HD$H8CHHcD$ HHL$HT$@HH;NH H=-HH=H8AL$IIHH=qzH=3dHH7HHH$H H=oH21I^HHPTI)@H)@H@/f.@A`UH-A`HHvHt]A`f]fffff.A`UHA`HHHH?HHtHt]A`]fD=9 uUHn]& @>`H?uHtUH]zf.AWAAVIAUIATL% UH- SL)1HHHtLLDAHH9uH[]A\A]A^A_ff.HH,unlockedyesno???/bin/bash--drop=Capabilities not availableunable to select CAP_SETPCAPfailed to drop [%s=%u]
--inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s]
--keep=--chroot=/--secbits=--forkfor=unable to fork()--killit=no forked process to kill
Unable to kill child process--uid=Failed to set uid=%u: %s
--gid=Failed to set gid=%u: %s
--groups=No memory for [%s] operation
No memory for gid list
Failed to setgroups.
--user=User [%s] not known
--decode=0x%016llx=%s%s%s%u--supports=--printCurrent: %s
Bounding set =Securebits: 0%o/0x%x/%u'b%s
 secure-noroot: %s (%s)
 secure-keep-caps: %s (%s)
[Keepcaps ABI not supported]uid=%u(%s)
gid=%u(%s)
%s%u(%s)execve /bin/bash failed!
--helpBSET modification requires CAP_SETPCAP
Unable to drop bounding capability [%s]
capability [%s] is unknown to libcap
unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changelibcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s]
prctl(PR_SET_KEEPCAPS, %u) failed: %s
Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x
waitpid didn't match child: %u != %u
child terminated with odd signal (%d != %d)
Too many groups specified (%d)
Failed to identify gid for group [%s]
Unable to get group list for userUnable to set group list for userFailed to set gid=%u(user=%s): %s
Failed to set uid=%u(user=%s): %s
cap[%s] not recognized by library
cap[%s=%d] not supported by kernel
 secure-no-suid-fixup: %s (%s)
[Securebits ABI not supported] prctl-keep-caps: %s (locking not supported)
usage: %s [args ...]
  --help         this message (or try 'man capsh')
  --print        display capability relevant state
  --decode=xxx   decode a hex string to a list of caps
  --supports=xxx exit 1 if capability xxx unsupported
  --drop=xxx     remove xxx,.. capabilities from bset
  --caps=xxx     set caps as per cap_from_text()
  --inh=xxx      set xxx,.. inheritiable set
  --secbits=<n>  write a new value for securebits
  --keep=<n>     set keep-capabability bit to <n>
  --uid=<n>      set uid to <n> (hint: id <username>)
  --gid=<n>      set gid to <n> (hint: id <username>)
  --groups=g,... set the supplemental groups
  --user=<name>  set uid,gid and groups to that of user
  --chroot=path  chroot(2) to this path
  --killit=<n>   send signal(n) to child
  --forkfor=<n>  fork and make child sleep for <n> sec
  ==             re-exec(capsh) with args as for --
  --             remaing arguments are for /bin/bash
                 (without -- [%s] will simply exit(0))
;4PX(zRx*zRx$FJw?;*3$"4DHBBB B(A0A8GD|eBEE E(H0H8M@l8A0A(B BBB((@(@
@
)@=`>`o@	@@
@`@@@0	oP@oo@>`F@V@f@v@@@@@@@@@@@&@6@F@V@f@v@@@@@@@@@@@&@6@F@V@f@v@@@@@@@@@@@&@6@F@V@f@v@@@@@52630b9bae9d08d6f11580849d6e165eb64030.debugf.shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.jcr.dynamic.got.got.plt.data.bss.gnu_debuglink8@8T@T !t@t$4o@8>@0F	@	No@[oP@PPj@0tB@@~@y0@0@)@)	)@)(5@(54`5@`5=`=>`>>`>>`>?`?@`@A`AB`A@A4B

Copyright © 2017 || Recoded By Mr.Bumblebee