403Webshell
Server IP : 61.19.30.66  /  Your IP : 216.73.216.15
Web Server : Apache/2.2.22 (Ubuntu)
System : Linux klw 3.11.0-15-generic #25~precise1-Ubuntu SMP Thu Jan 30 17:39:31 UTC 2014 x86_64
User : www-data ( 33)
PHP Version : 5.3.10-1ubuntu3.48
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /usr/bin/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/bin/ecryptfs-manager
ELF>\@@2@8	@@@@@@88@8@@@|'|' ..`.` @.@.`@.`TT@T@DDPtd8$8$@8$@||QtdRtd..`.`/lib64/ld-linux-x86-64.so.2GNUGNUDd[C3iOPr  @ "&BE|fUaqX9'Owj/UHB ;5j`! }0`1`50`0`p@1`@libecryptfs.so.0__gmon_start___Jv_RegisterClassesecryptfs_process_decision_graphecryptfs_get_versionecryptfs_process_key_gen_decision_graph_fini_initecryptfs_add_passphrase_key_to_keyringecryptfs_validate_keyringecryptfs_free_key_mod_listlibc.so.6__printf_chkputs__stack_chk_failputcharmkdirstdinstrtolfgetsmemset__errno_locationtcsetattr__syslog_chkmlock__fprintf_chkmemcpymallocstderrfwritestrchrtcgetattr_IO_getcstrcmp__asprintf_chk__libc_start_mainfree_edata__bss_start_endGLIBC_2.3.4GLIBC_2.14GLIBC_2.8GLIBC_2.4GLIBC_2.2.5ti	ii
ii
'ui	1/`0`"1`%0`0`0`0` 0`(0`00`80`@0`	H0`
P0`X0``0`
h0`p0`x0`0`0`0`0`0`0`0`0`0`0`0`0`0`HH5Z# %\# @%Z# h%R# h%J# h%B# h%:# h%2# h%*# h%"# hp%# h`%# h	P%
# h
@%# h0%" h %" h
%" h%" h%" h%" h%" h%" h%" h%" h%" h%" hp%" h`%" hP%" h@%" h0%z" h AUATUSHdH%(H$1AaH$HDŽ$HH3A8H
" V!@A7A1HAHDŽ$HH$dH3%(D
H[]A\A]v@H$[HD$h@ HH$$H$Ao!@H
VHmA?!@1HHHDŽ$f.H$HAu$H$H$HArEf.1HHH$$HHD$h@&oHA?!@!@@@p@@@ @@ @` @ @DŽ$E@@p@@@ @~@ @t` @j @`DŽ$#!@F#!@6HH$bH$@1p¾@1A@E0@¾ @1HA1I^HHPTI@@H@Hp@HHM HtHÐUHSH=X uK0.`HR H(.`HHH9s$fDHH- (.`H H9r H[]fff.H=  UHtHt]8.`]ÐSH1HPHdH%(HD$H1uUH$H11HHD$d$HCHD$HCHD$HCHD$ HC HD$(HC(HD$0HC0D$8C8uHT$HdH3%(uHP[:f.HH=
 

DHAWAVAUATUHSHhdH%(HD$X1T$Hx!@H@L$HEAA1ADHIIWAtgHUEHu<
E9uLH4$EHIH4$LHH}L1ZH}LuHUHcA
HuT$IcD1tNAtiHT$XdH3%(uxHh[]A\A]A^A_f1@H|$@
6HT$11똸뗄tH}HEx[ff.Hl$Ld$Lt$H\$ILl$HxAdH%(HD$H1M1tlAEI<
t9|E11Etg9zHcADHT$HdH3%(H\$PHl$XLd$`Ll$hLt$pHxHcÃAA
1Eu
H11HcAD,DHx-jETA$Rfffff.S}!@HdH%(HD$18"@HX"@1"@1"@1!@1|@!@1gB$:
t%t +
tu!@7DH
H!%tHDHJHDH1H)
PwHT$dH3%(uH[fH\$Ld$IHl$@H`HH@HW!@1v1Ҿ@L'uJA<$!@1E1Ҿ@HuHHLuq!@1H߹HHH$Hl$Ld$HD#@#@1"@8#@눹#@"@1cf.AVIAUIATUSHdH%(HD$1II]XH#H{P<`#@!HK1"@H[PHuݺ#@1H HCH
pH
H!%tDHJHDHL)1Ҁ<$
t
1H9|N
H!@HEH@
uI]XH"uI]Xt@H[PuI1HT$dH3%(uH[]A\A]A^ÿ!"@f.AWAVIAUIATIUSHqkCH|$MD$1ML#@x[H|$IH|$*tD8Au8H|$H{@k/<HHuE1'D8H= #@1(HD[]A\A]A^A_fDATH1#@UHSHHH|$H|$rt9D AH|$H|$1Hٺ$@H|$"tD AH|$LEH|$1Hٺ!$@uxAH|$tD Au(H|$E1cHD[]A\kD H= #@1HD[]A\@H=y $@1HD[]A\ÐHl$Ld$H-S L%L Ll$Lt$L|$H\$H8L)AIHI{Ht1@LLDAHH9uH\$Hl$Ld$Ll$ Lt$(L|$0H8ÐUHSHH Ht.`DHHHuH[]ÐHHError attempting to validate keyring integrity; rc = [%d]

That key was already in the keyring.

Added key to keyring with signature [%s].


Unable to get the version number of the kernelmodule. Please make sure that you have the eCryptfskernel module loaded, you have sysfs mounted, andthe sysfs mount point is in /etc/mtab. This isnecessary so that the mount helper knows which kernel options are supported.
Make sure that your system is set up to auto-load
your filesystem kernel module on mount.
Enabling passphrase-mode only for now.
Error processing key generation decision graph; rc = [%d]

Unable to free key modulesReturning to main menuUnknown option, aborting
"3DUfw%s: 
eCryptfs key management menu	%d. Exit

Make selection: Invalid selection
	Mount-wide passphrase: 	Confirm passphrase: 	Using the default salt value	%i. %s

Error reading input-------------------------------	%d. Add passphrase key to keyring
	%d. Add public key to keyring
	%d. Generate new public/private keypair
%s: Failed to allocate memory
Invalid passphrase. Aborting mount.%s: Failed to read passphrase
Passphrase mismatch. Aborting mount
The following PKI modules are available:
Select desired key module [%d]: read_passphrase_salt%s/.ecryptfs/pki/%s/%sError: %m
%s/.ecryptfs/%s/.ecryptfs/pki/Error: %m%s/.ecryptfs/pki/%s/;|X8(@XP(hx(zRx$FJw?;*3$"<DpBBA A(G
(A ABBI$AI`
AAx D[LBBB B(A0I8D&
8A0A(B BBBJ$2LV
H$<>AI -
AA$d FMN 
FDHBEE A(A0D@
0A(A BBBADBBE E(D0A8DP8D0A(B BBBL4PdBKI G0
 DABHd
 DABE\ DAB$pQ_@Xp@
@o@@@
=/`	@p	@H	o	@oo@@.`@@@@@@
@
@&
@6
@F
@V
@f
@v
@
@
@
@
@
@
@
@
@@@&@6@F@V@f@ecryptfs-managerx(.shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.ctors.dtors.jcr.dynamic.got.got.plt.data.bss.gnu_debuglink8@8T@T !t@t$4o@@>@F@=No@N[o	@	`jp	@p	Ht	@	~p@py@p@p@@8$@8$|$@$.`.(.`(.8.`8.@.`@./`//`/0`00`0 01

Youez - 2016 - github.com/yon3zu
LinuXploit