# Network Services

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdlh_uSMFknftJJvrL%2F-McdlxdvS5pznjOaLYom%2Fimage.png?alt=media\&token=71a17af3-cb27-4405-9de6-a1014c230861)

## SMB: Server Message Block

### Understanding SMB

SMB - Server Message Block Protocol - is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network. Servers make file systems and other resources (printers, named pipes, APIs) available to clients on the network.

The SMB protocol is known as a response-request protocol, meaning that it transmits multiple messages between the client and server to establish a connection. Clients connect to servers using TCP/IP, NetBEUI or IPX/SPX.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdlzBe36ucFWueqpo3%2F-Mcdmb0MHrDqQV6s-0L0%2Fimage.png?alt=media\&token=b19f0d03-9bd8-4656-aa3c-3d69f097db50)

**What runs SMB?**

Microsoft Windows operating systems since Windows 95 have included client and server SMB protocol support. Samba, an open source server that supports the SMB protocol, was released for Unix systems.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdlzBe36ucFWueqpo3%2F-Mcdn0h-Ijs3VmEg50tq%2Fimage.png?alt=media\&token=a4547438-6122-49fd-be50-d5df7608f9f6)

### Enumerating SMB

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdlzBe36ucFWueqpo3%2F-McdnS8HQ1WB-zUiMkjX%2Fimage.png?alt=media\&token=836836fb-5066-4a64-bca7-cbf1f70119cf)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-McdnsaDl06dSOVW5prL%2Fimage.png?alt=media\&token=8b870fed-0f74-403c-bb1a-1901d213c708)

Lets check how many ports are open

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-McdoS6kQWhM9kXMNrgQ%2Fimage.png?alt=media\&token=ced6b308-b954-4d5d-ba25-9186873f2d27)

We have 2 open ports

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-Mcdoq-rK66nwbe_gfEd%2Fimage.png?alt=media\&token=60d73462-7c2e-4a0f-b24f-e38f39bc69e2)

Lets run a detailed scan&#x20;

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-McdoiT80wfR41nbj9gN%2Fimage.png?alt=media\&token=60c6d302-bb7f-4655-b7c8-4aac4ddbd0f1)

SMB is running on ports 139 and 445

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-McdotPcna3x33nMcTJ8%2Fimage.png?alt=media\&token=0fc5f9a6-761d-4129-b6fe-02b654777267)

Lets use enum4linux to enumerate SMB

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-Mcdp0QaXfJtky08LEYQ%2Fimage.png?alt=media\&token=2c7b1a4b-0ca9-47de-b5e6-03c36a125df0)

The name of the Workgroup is WORKGROUP

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-McdpM5cLpOBgk0zRewy%2Fimage.png?alt=media\&token=2691780d-9fb4-4efb-8e9c-b2586e9fe893)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-Mcdpdp-ZHmkKtQ1h0fN%2Fimage.png?alt=media\&token=4061f010-bcd8-4712-aa0f-af88f7c533db)

POLOSMB is the name of the machine and the OS version is 6.1

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-McdqbAI6a2prdgNk1Hn%2Fimage.png?alt=media\&token=dfaca98a-e454-4070-aa21-ab90ef4ba141)

This share is interesting

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-McdqfNzW6jvNmMzpSwi%2Fimage.png?alt=media\&token=42c6ba6b-1987-4a16-9f46-c9ff2481ca46)

### Exploiting SMB

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mcdnh_lmH0sVYJNYcU4%2F-McdrxWrc7fyjeZO7gS9%2Fimage.png?alt=media\&token=370e009e-d81a-41b5-bc96-cc232aea22ef)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdsylHNSeZghjx88tZ%2F-Mcdt1CWUmBqHykkPsCH%2Fimage.png?alt=media\&token=a8fdf47a-8a19-4abc-9b5a-fd0ca10e4ead)

Lets use smbclient to connect to the share.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdsylHNSeZghjx88tZ%2F-McdtFiN5wMz4KtME82y%2Fimage.png?alt=media\&token=7ae6b671-be92-47f8-a815-b1ae3300476c)

We are logged in.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdsylHNSeZghjx88tZ%2F-McdtLfBDiiXWXEBHJNF%2Fimage.png?alt=media\&token=c5c7438d-1ef1-48a8-9e1c-1ffe19b881c6)

Lets transfer the Information.txt file onto our machine and read it.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdsylHNSeZghjx88tZ%2F-McdtmRNo93lcZ7j1_Ib%2Fimage.png?alt=media\&token=9305e2eb-3408-48d2-b126-6b9541fbd682)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdsylHNSeZghjx88tZ%2F-Mcdtr07C-gHMZFhJQxD%2Fimage.png?alt=media\&token=7deebb4f-b7bd-400d-a88a-14de3dc0307f)

We can assume that this folder belongs to "John Cactus".

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdsylHNSeZghjx88tZ%2F-Mcdu2yRX3vbiKEAX2rW%2Fimage.png?alt=media\&token=9ed38de8-047d-42c1-8cb8-d582685de916)

Reading the file, we can see that ssh has been enabled for employees to work from home, so we can also check out the .ssh folder on the smb share as it has ssh file that we can use to login to the machine using ssh.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdsylHNSeZghjx88tZ%2F-McduLpYX97IF5bL5jcb%2Fimage.png?alt=media\&token=24a15e53-d1b3-4c25-a154-d33b7768938c)

Lets change directories into the .ssh folder and list the files.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McduUoSAGv1SGDWbEJ0%2F-McduiOwLQzpf0mjC_ZQ%2Fimage.png?alt=media\&token=67176075-5aa2-4924-b90d-7067ddb99939)

To most useful file to us is the id\_rsa file as we can use that to login through ssh.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McduUoSAGv1SGDWbEJ0%2F-McdutunGiaQqw8RsjNh%2Fimage.png?alt=media\&token=a04c1456-3c1b-4a30-8fcb-8ad01dc4e90d)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McduUoSAGv1SGDWbEJ0%2F-McduvsY5rU8g0YyoWf_%2Fimage.png?alt=media\&token=81219d9a-bb58-4dfb-a87d-7218784d65e0)

Lets do this.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McduUoSAGv1SGDWbEJ0%2F-McduzbLHg7Em8B2gyDo%2Fimage.png?alt=media\&token=ee9ed311-4f6b-4407-8c0e-84dd201cb268)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdvheaUoaEWxm8ES4w%2F-Mcdx6zmerWmeOfmdPSr%2Fimage.png?alt=media\&token=8f4215b2-f0d0-4b68-9dfc-8ebf0ce9fc0c)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdvheaUoaEWxm8ES4w%2F-McdxD6sj2vrD3dsWwgQ%2Fimage.png?alt=media\&token=e95296fc-7a31-4251-82d1-dd6d20b02de5)

The username is cactus, lets login and read the file

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdvheaUoaEWxm8ES4w%2F-McdxLE0bLSL82PhBBez%2Fimage.png?alt=media\&token=3068fdc5-093e-425d-8948-4c4dc5d1eec8)

## Telnet

### Understanding Telnet

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McdxSvBjTpZZhm7UIXm%2F-Mce06hu-fZH7jTXnF6W%2Fimage.png?alt=media\&token=93a848f3-485d-43bf-b93f-23b8d27c1c66)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce08LWrZvD3qMUF0cL%2F-Mce0MyC2PlZcKdK7qcU%2Fimage.png?alt=media\&token=ff0d139c-1712-434c-96d7-89e0b71ac49d)

### Enumeration Telnet

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce08LWrZvD3qMUF0cL%2F-Mce0qaRHlqGWyAwPWBU%2Fimage.png?alt=media\&token=02b55c18-3678-4877-b848-bfadab9a3bd6)

Lets start enumerating by running a nmap scan to see what port are open on the machine

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce4kINqFjaX6OSFNfH%2F-Mce4xbjQCInLP5I3Q0N%2Fimage.png?alt=media\&token=cdd22f9e-9dde-47db-ab84-9e075c06ea22)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce4kINqFjaX6OSFNfH%2F-Mce5CwqEsW744GFhhuh%2Fimage.png?alt=media\&token=b007d270-ccf2-4070-a629-d9ca8a33bf2d)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-MceaTHWGFCSuKByOyXd%2Fimage.png?alt=media\&token=ad99228a-5351-4a8c-8cd2-e0aedb1bda5a)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-MceYlVir2onwTWZbntH%2Fimage.png?alt=media\&token=a64b459b-1d0b-4b74-a534-015c1bcf6b35)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-MceaXGdpFItacdOwtQQ%2Fimage.png?alt=media\&token=28fdc59b-484d-4a0b-b9c5-ad30b7738b36)

### Exploiting Telnet

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-MceZanre6OJajk4zoWu%2Fimage.png?alt=media\&token=03961243-775b-4a77-afbf-fe11dc8f86bc)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-MceZdWXvAdbDf6PWAfa%2Fimage.png?alt=media\&token=33e7cfbd-39d8-437c-9dac-c1b1e3064e12)

Lets login through telnet

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-MceZuAb9NATy-q6VmUG%2Fimage.png?alt=media\&token=0f415cec-90a1-4c22-87bc-628021b38e62)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-Mce_U8CoytlC_9ua21e%2Fimage.png?alt=media\&token=8cbc6aa5-89f4-4fdd-8382-8a990e8d61c2)

Lets create the payload and start a listener

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-Mce_eNSXzUxd3AD1uUV%2Fimage.png?alt=media\&token=58306cb2-1234-46f5-aec7-b32a6ebcad0f)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-Mce_hrYbLC1QpPvl6ub%2Fimage.png?alt=media\&token=03c1e8f9-0d5a-43e2-88e0-234cb17303f8)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-Mce_Ziv0OHfGSGRZhxY%2Fimage.png?alt=media\&token=c347aa8c-bb28-4db4-aca0-bc329eba1ce7)

Lets run the exploit

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-Mcea-tPZH0xQBhpuU_8%2Fimage.png?alt=media\&token=26112a07-6a1a-4d0e-89ae-b05d1e6bd6f1)

We should get a reverse shell

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-Mcea4JOSIZeqyjTeitk%2Fimage.png?alt=media\&token=a1e5f5fd-cc2d-4047-bef7-03277295ff9d)

Lets read the flag

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceXwq-Vfm-bJSRpqPS%2F-MceaAcdESymETrZ-4D8%2Fimage.png?alt=media\&token=6582a253-7433-4835-bf23-8cda4087c180)

## FTP: File Transfer Protocol

### Understanding FTP

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce08LWrZvD3qMUF0cL%2F-Mce2XZSjWt_1NMWxzIO%2Fimage.png?alt=media\&token=bdec3f23-2505-45d4-a982-4e55f5224ec2)

### Enumerating FTP

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce4kINqFjaX6OSFNfH%2F-MceUsnMDuJd8kM3hCUL%2Fimage.png?alt=media\&token=811b0f6a-8254-4183-a6cc-14c3615a6b72)

Lets start scanning

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce4kINqFjaX6OSFNfH%2F-MceVuRiZaoMROs6e12r%2Fimage.png?alt=media\&token=19efdeff-4cb0-4566-bd95-a9c40be47b76)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceWgCeFs3ncL8QZqAj%2F-MceWnpJyiDfNjriR4Gg%2Fimage.png?alt=media\&token=059af2f1-0cac-4fe4-9409-bba73f2a3438)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce4kINqFjaX6OSFNfH%2F-MceVyBJRZ4MUKQyPwNH%2Fimage.png?alt=media\&token=d9d5080c-3708-4d4e-9b04-cb9f1259ef63)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceWgCeFs3ncL8QZqAj%2F-MceWjYG42FRrqFzb2Ti%2Fimage.png?alt=media\&token=7745f233-c078-462f-8d6a-79c1d55c0a51)

Lets login through FTP&#x20;

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce4kINqFjaX6OSFNfH%2F-MceW5b2AU4qJicckAvm%2Fimage.png?alt=media\&token=30beee2d-51d4-4bbf-8ce0-94c75af0f86f)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceWPlGfDRPg3dSnXvc%2F-MceWbdKeWLLv7b-_Z3p%2Fimage.png?alt=media\&token=b73b9403-e24c-41ed-a46c-5fd1e7bb7349)

Lets get this file on our machine and read it

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-Mce4kINqFjaX6OSFNfH%2F-MceWJLvh2rn9m10iMhO%2Fimage.png?alt=media\&token=e249b4a8-fcd9-4cdb-8a19-b70dd26d0737)

We can see that Mike is a possible username

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceWPlGfDRPg3dSnXvc%2F-MceWXxaZAKGxhsYR9Iz%2Fimage.png?alt=media\&token=633db263-4ef0-4bdc-a7c0-4c14ed40c3b7)

### Exploiting FTP

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceWgCeFs3ncL8QZqAj%2F-MceWzwYgZuWFxKhflza%2Fimage.png?alt=media\&token=72244423-b582-46a2-95b7-d467036c3bad)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceWgCeFs3ncL8QZqAj%2F-MceX2VH7gqV0IhU60XL%2Fimage.png?alt=media\&token=38b74722-7cab-4ef9-8572-2c092c6cefac)

Lets crack the password using hydra

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceWgCeFs3ncL8QZqAj%2F-MceXPlyDpZLN3rgj9yt%2Fimage.png?alt=media\&token=406ca83f-9d9b-4ee8-bb47-d354ad632d19)

Now lets login and get the ftp.txt file on our machine and read it

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MceWgCeFs3ncL8QZqAj%2F-MceXjgD46aPOSeWlMWV%2Fimage.png?alt=media\&token=13af8312-b064-40d9-865c-26b27871f729)
