ELF>@1@8 @ XX-==-==@@$$Std@@PtdX#X#X#44QtdRtd-==0GNUGNUKVUYX.oo @  Ug| Z, F" __gmon_start___ITM_deregisterTMCloneTable_ITM_registerTMCloneTable__cxa_finalizeputs__printf_chkxtables_option_parsestrlenlibxt_osf_initxtables_register_matchlibxtables.so.12libc.so.6GLIBC_2.3.4GLIBC_2.2.5ti ui == =5#P=;#=?#@@ @C#0@T#X@x@0@p@@ == ????????? HH/HtHH=/%/f.DH=0H0H9tHN/Ht H=i0H5b0H)HH?HHHtHE/HtfD=%0u3UH="/Ht H=.//c/]f.ff.@gH=%.ff.@FDHHHEHN 1H5%v.ff.SHFDu*HS H51B.CDuCu[DH5c1.fSHH5a1[%.SLH571-CD@USHHHo-HC@ tt@tH[]DM$H[]D{$tM$Hm-E H[]M$H[]HHOS fingerprint match options: [!] --genre string Match a OS genre by passive fingerprinting. --ttl level Use some TTL check extensions to determine OS: 0 true ip and fingerprint TTL comparison. Works for LAN. 1 check if ip TTL is less than fingerprint one. Works for global addresses. 2 do not compare TTL at all. This allows NMAP detection, but can produce false results. --log level Log determined genres into dmesg even if they do not match desired one: 0 log all matched or unknown signatures. 1 log only first one. 2 log all known matched signatures.! OS fingerprint match %s%s ! --genre %s --ttl %u --log %ugenrettlloglibxtables.so.12osf;4PdxzRx `0l2 DEm F j N HhsEAG c AAF H AAF Z AAD HAA5# ;#,?#(  t==o@8 h( oo8ooo =@C#T#000p =GCC: (GNU) 12.1.0.shstrtab.note.gnu.property.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.comment @$1o$; 88C@@KoXo880ghh(qw  S}tt 2 XX#X#4##=-=- = - =-?/`@0 @0000