-----------------------------------------------------------------
[*] Emulating binary name: htdbm
[*] Emulator used: qemu-mipsel-static
[*] Using root directory: /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract (1/2)
[*] Using CPU config:
[*] Emulating binary: /usr/bin/htdbm
[*] Change permissions +x to /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/./usr/bin/htdbm.
[*] Emulating binary ./usr/bin/htdbm with parameter NONE
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter -v
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter -V
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter -h
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter -help
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter --help
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter --version
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter version
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
-----------------------------------------------------------------
-----------------------------------------------------------------
[*] Emulating binary name: htdbm
[*] Emulator used: qemu-mipsel-static
[*] Using root directory: /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr (2/2)
[*] Using CPU config: 24KEc
[*] Emulating binary: /bin/htdbm
[*] Emulating binary ./bin/htdbm with parameter NONE and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.
Usage: htdbm [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
-b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
-n[imBdpst] [-C cost] username
-nb[mBdpst] [-C cost] username password
-v[imBdps] [-C cost] [-TDBTYPE] database username
-vb[mBdps] [-C cost] [-TDBTYPE] database username password
-x [-TDBTYPE] database username
-l [-TDBTYPE] database
Options:
-c Create a new database.
-n Don't update database; display results on stdout.
-b Use the password from the command line rather than prompting for it.
-i Read password from stdin without verification (for script usage).
-m Force MD5 encryption of the password (default).
-B Force BCRYPT encryption of the password (very secure).
-C Set the computing time used for the bcrypt algorithm
(higher is more secure but slower, default: 5, valid: 4 to 31).
-d Force CRYPT encryption of the password (8 chars max, insecure).
-s Force SHA encryption of the password (insecure).
-p Do not encrypt the password (plaintext, insecure).
-T DBM Type (SDBM|GDBM|DB|default).
-l Display usernames from database on stdout.
-v Verify the username/password.
-x Remove the username record from database.
-t The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter -v and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.
Usage: htdbm [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
-b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
-n[imBdpst] [-C cost] username
-nb[mBdpst] [-C cost] username password
-v[imBdps] [-C cost] [-TDBTYPE] database username
-vb[mBdps] [-C cost] [-TDBTYPE] database username password
-x [-TDBTYPE] database username
-l [-TDBTYPE] database
Options:
-c Create a new database.
-n Don't update database; display results on stdout.
-b Use the password from the command line rather than prompting for it.
-i Read password from stdin without verification (for script usage).
-m Force MD5 encryption of the password (default).
-B Force BCRYPT encryption of the password (very secure).
-C Set the computing time used for the bcrypt algorithm
(higher is more secure but slower, default: 5, valid: 4 to 31).
-d Force CRYPT encryption of the password (8 chars max, insecure).
-s Force SHA encryption of the password (insecure).
-p Do not encrypt the password (plaintext, insecure).
-T DBM Type (SDBM|GDBM|DB|default).
-l Display usernames from database on stdout.
-v Verify the username/password.
-x Remove the username record from database.
-t The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter -V and cpu configuration 24KEc
htdbm: illegal option -- V
htdbm -- program for manipulating DBM password databases.
Usage: htdbm [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
-b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
-n[imBdpst] [-C cost] username
-nb[mBdpst] [-C cost] username password
-v[imBdps] [-C cost] [-TDBTYPE] database username
-vb[mBdps] [-C cost] [-TDBTYPE] database username password
-x [-TDBTYPE] database username
-l [-TDBTYPE] database
Options:
-c Create a new database.
-n Don't update database; display results on stdout.
-b Use the password from the command line rather than prompting for it.
-i Read password from stdin without verification (for script usage).
-m Force MD5 encryption of the password (default).
-B Force BCRYPT encryption of the password (very secure).
-C Set the computing time used for the bcrypt algorithm
(higher is more secure but slower, default: 5, valid: 4 to 31).
-d Force CRYPT encryption of the password (8 chars max, insecure).
-s Force SHA encryption of the password (insecure).
-p Do not encrypt the password (plaintext, insecure).
-T DBM Type (SDBM|GDBM|DB|default).
-l Display usernames from database on stdout.
-v Verify the username/password.
-x Remove the username record from database.
-t The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter -h and cpu configuration 24KEc
htdbm: illegal option -- h
htdbm -- program for manipulating DBM password databases.
Usage: htdbm [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
-b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
-n[imBdpst] [-C cost] username
-nb[mBdpst] [-C cost] username password
-v[imBdps] [-C cost] [-TDBTYPE] database username
-vb[mBdps] [-C cost] [-TDBTYPE] database username password
-x [-TDBTYPE] database username
-l [-TDBTYPE] database
Options:
-c Create a new database.
-n Don't update database; display results on stdout.
-b Use the password from the command line rather than prompting for it.
-i Read password from stdin without verification (for script usage).
-m Force MD5 encryption of the password (default).
-B Force BCRYPT encryption of the password (very secure).
-C Set the computing time used for the bcrypt algorithm
(higher is more secure but slower, default: 5, valid: 4 to 31).
-d Force CRYPT encryption of the password (8 chars max, insecure).
-s Force SHA encryption of the password (insecure).
-p Do not encrypt the password (plaintext, insecure).
-T DBM Type (SDBM|GDBM|DB|default).
-l Display usernames from database on stdout.
-v Verify the username/password.
-x Remove the username record from database.
-t The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter -help and cpu configuration 24KEc
htdbm: illegal option -- h
htdbm -- program for manipulating DBM password databases.
Usage: htdbm [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
-b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
-n[imBdpst] [-C cost] username
-nb[mBdpst] [-C cost] username password
-v[imBdps] [-C cost] [-TDBTYPE] database username
-vb[mBdps] [-C cost] [-TDBTYPE] database username password
-x [-TDBTYPE] database username
-l [-TDBTYPE] database
Options:
-c Create a new database.
-n Don't update database; display results on stdout.
-b Use the password from the command line rather than prompting for it.
-i Read password from stdin without verification (for script usage).
-m Force MD5 encryption of the password (default).
-B Force BCRYPT encryption of the password (very secure).
-C Set the computing time used for the bcrypt algorithm
(higher is more secure but slower, default: 5, valid: 4 to 31).
-d Force CRYPT encryption of the password (8 chars max, insecure).
-s Force SHA encryption of the password (insecure).
-p Do not encrypt the password (plaintext, insecure).
-T DBM Type (SDBM|GDBM|DB|default).
-l Display usernames from database on stdout.
-v Verify the username/password.
-x Remove the username record from database.
-t The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter --help and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.
Usage: htdbm [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
-b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
-n[imBdpst] [-C cost] username
-nb[mBdpst] [-C cost] username password
-v[imBdps] [-C cost] [-TDBTYPE] database username
-vb[mBdps] [-C cost] [-TDBTYPE] database username password
-x [-TDBTYPE] database username
-l [-TDBTYPE] database
Options:
-c Create a new database.
-n Don't update database; display results on stdout.
-b Use the password from the command line rather than prompting for it.
-i Read password from stdin without verification (for script usage).
-m Force MD5 encryption of the password (default).
-B Force BCRYPT encryption of the password (very secure).
-C Set the computing time used for the bcrypt algorithm
(higher is more secure but slower, default: 5, valid: 4 to 31).
-d Force CRYPT encryption of the password (8 chars max, insecure).
-s Force SHA encryption of the password (insecure).
-p Do not encrypt the password (plaintext, insecure).
-T DBM Type (SDBM|GDBM|DB|default).
-l Display usernames from database on stdout.
-v Verify the username/password.
-x Remove the username record from database.
-t The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter --version and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.
Usage: htdbm [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
-b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
-n[imBdpst] [-C cost] username
-nb[mBdpst] [-C cost] username password
-v[imBdps] [-C cost] [-TDBTYPE] database username
-vb[mBdps] [-C cost] [-TDBTYPE] database username password
-x [-TDBTYPE] database username
-l [-TDBTYPE] database
Options:
-c Create a new database.
-n Don't update database; display results on stdout.
-b Use the password from the command line rather than prompting for it.
-i Read password from stdin without verification (for script usage).
-m Force MD5 encryption of the password (default).
-B Force BCRYPT encryption of the password (very secure).
-C Set the computing time used for the bcrypt algorithm
(higher is more secure but slower, default: 5, valid: 4 to 31).
-d Force CRYPT encryption of the password (8 chars max, insecure).
-s Force SHA encryption of the password (insecure).
-p Do not encrypt the password (plaintext, insecure).
-T DBM Type (SDBM|GDBM|DB|default).
-l Display usernames from database on stdout.
-v Verify the username/password.
-x Remove the username record from database.
-t The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter version and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.
Usage: htdbm [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
-b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
-n[imBdpst] [-C cost] username
-nb[mBdpst] [-C cost] username password
-v[imBdps] [-C cost] [-TDBTYPE] database username
-vb[mBdps] [-C cost] [-TDBTYPE] database username password
-x [-TDBTYPE] database username
-l [-TDBTYPE] database
Options:
-c Create a new database.
-n Don't update database; display results on stdout.
-b Use the password from the command line rather than prompting for it.
-i Read password from stdin without verification (for script usage).
-m Force MD5 encryption of the password (default).
-B Force BCRYPT encryption of the password (very secure).
-C Set the computing time used for the bcrypt algorithm
(higher is more secure but slower, default: 5, valid: 4 to 31).
-d Force CRYPT encryption of the password (8 chars max, insecure).
-s Force SHA encryption of the password (insecure).
-p Do not encrypt the password (plaintext, insecure).
-T DBM Type (SDBM|GDBM|DB|default).
-l Display usernames from database on stdout.
-v Verify the username/password.
-x Remove the username record from database.
-t The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
-----------------------------------------------------------------