⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.204
Server IP:
13.127.59.50
Server:
Linux ip-172-31-46-210 5.15.0-1033-aws #37~20.04.1-Ubuntu SMP Fri Mar 17 11:39:30 UTC 2023 x86_64
Server Software:
Apache/2.4.41 (Ubuntu)
PHP Version:
7.4.3-4ubuntu2.29
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
snap
/
core
/
current
/
usr
/
bin
/
View File Name :
sc-logresolve
#!/bin/sh # Author: Jamie Strandboge <jamie@ubuntu.com> # Copyright (C) 2015 Canonical Ltd. # # This script is distributed under the terms and conditions of the GNU General # Public License, Version 3 or later. See http://www.gnu.org/copyleft/gpl.html # for details. set -e cat <<EOM This script has been replaced by snappy-debug. Please use: $ sudo snappy install snappy-debug $ sudo snappy-debug.security scanlog Alternatively, you can use 'scmp_sys_resolver' to resolve syscall numbers. Eg: $ scmp_sys_resolver 108 getegid You must use scmp_sys_resolver on the same architecture as the device where the seccomp denial was logged. EOM logfile="/var/log/syslog" usage() { cat <<EOM Usage: `basename $0` <logfile> If <logfile> is unspecified, use '$logfile'. If <logfile> is '-', use <stdin>. EOM }