From 7884127561ec6c47da94162397f660e7cf020df2 Mon Sep 17 00:00:00 2001 From: Translator Date: Sat, 19 Apr 2025 17:11:56 +0000 Subject: [PATCH] Translated ['src/generic-methodologies-and-resources/pentesting-methodol --- .../pentesting-methodology.md | 62 +++++++++--------- src/images/venacus-logo.png | Bin 0 -> 9217 bytes 2 files changed, 31 insertions(+), 31 deletions(-) create mode 100644 src/images/venacus-logo.png diff --git a/src/generic-methodologies-and-resources/pentesting-methodology.md b/src/generic-methodologies-and-resources/pentesting-methodology.md index 0a6294a62..16503aee2 100644 --- a/src/generic-methodologies-and-resources/pentesting-methodology.md +++ b/src/generic-methodologies-and-resources/pentesting-methodology.md @@ -9,29 +9,29 @@ _Hacktricks logos designed by_ [_@ppiernacho_](https://www.instagram.com/ppieranacho/)_._ -### 0- Mashambulizi ya Kimwili +### **0- Mashambulizi ya Kimwili** -Je, una **ufikiaji wa kimwili** kwa mashine unayotaka kushambulia? Unapaswa kusoma baadhi ya [**mbinu kuhusu mashambulizi ya kimwili**](../hardware-physical-access/physical-attacks.md) na nyingine kuhusu [**kutoroka kutoka kwa programu za GUI**](../hardware-physical-access/escaping-from-gui-applications.md). +Je, una **ufikiaji wa kimwili** kwa mashine unayotaka kushambulia? Unapaswa kusoma baadhi ya [**hila kuhusu mashambulizi ya kimwili**](../hardware-physical-access/physical-attacks.md) na nyingine kuhusu [**kutoroka kutoka kwa programu za GUI**](../hardware-physical-access/escaping-from-gui-applications.md). -### 1 - [Kugundua mwenyeji ndani ya mtandao](pentesting-network/index.html#discovering-hosts)/ [Kugundua Mali za kampuni](external-recon-methodology/index.html) +### **1-** [**Kugundua mwenyeji ndani ya mtandao**](pentesting-network/index.html#discovering-hosts)/ [Kugundua Mali za kampuni](external-recon-methodology/index.html) -**Inategemea** kama **mtihani** unaofanya ni **mtihani wa ndani au wa nje**, huenda ukavutiwa na kutafuta **wenyeji ndani ya mtandao wa kampuni** (mtihani wa ndani) au **kutafuta mali za kampuni mtandaoni** (mtihani wa nje). +**Kulingana** na kama **mtihani** unayofanya ni **mtihani wa ndani au wa nje** unaweza kuwa na hamu ya kutafuta **wenyeji ndani ya mtandao wa kampuni** (mtihani wa ndani) au **kutafuta mali za kampuni kwenye mtandao** (mtihani wa nje). > [!NOTE] -> Kumbuka kwamba ikiwa unafanya mtihani wa nje, mara tu unavyoweza kupata ufikiaji wa mtandao wa ndani wa kampuni unapaswa kuanzisha tena mwongo huu. +> Kumbuka kwamba ikiwa unafanya mtihani wa nje, mara tu unavyoweza kupata ufikiaji wa mtandao wa ndani wa kampuni unapaswa kuanzisha tena mwongozo huu. ### **2-** [**Kufurahia mtandao**](pentesting-network/index.html) **(Ndani)** **Sehemu hii inatumika tu ikiwa unafanya mtihani wa ndani.**\ -Kabla ya kushambulia mwenyeji huenda ukapendelea **kuiba baadhi ya akidi** **kutoka mtandao** au **kunusa** baadhi ya **data** ili kujifunza **kwa njia ya kupita/moja kwa moja (MitM)** unachoweza kupata ndani ya mtandao. Unaweza kusoma [**Pentesting Network**](pentesting-network/index.html#sniffing). +Kabla ya kushambulia mwenyeji labda unataka **kuchukua baadhi ya akidi** **kutoka kwenye mtandao** au **kunusa** baadhi ya **data** ili kujifunza **kwa njia ya kupita/moja kwa moja (MitM)** unachoweza kupata ndani ya mtandao. Unaweza kusoma [**Pentesting Network**](pentesting-network/index.html#sniffing). -### 3- [Skana Bandari - Kugundua huduma](pentesting-network/index.html#scanning-hosts) +### **3-** [**Skana Bandari - Kugundua huduma**](pentesting-network/index.html#scanning-hosts) Jambo la kwanza kufanya unapotafuta **udhaifu katika mwenyeji** ni kujua ni **huduma zipi zinaendesha** katika bandari zipi. Hebu tuone [**zana za msingi za kuskan bandari za wenyeji**](pentesting-network/index.html#scanning-hosts). -### **4-** [Kuhakikisha matoleo ya huduma](../generic-hacking/search-exploits.md) +### **4-** [Kutafuta matukio ya toleo la huduma](../generic-hacking/search-exploits.md) -Mara tu unavyojua ni huduma zipi zinaendesha, na labda toleo lao, unapaswa **kutafuta udhaifu uliojulikana**. Huenda ukapata bahati na kuna exploit inayoweza kukupa shell... +Mara tu unavyojua ni huduma zipi zinaendesha, na labda toleo lao, unapaswa **kutafuta udhaifu uliojulikana**. Labda utapata bahati na kuna exploit ya kukupa shell... ### **5-** Huduma za Pentesting @@ -39,10 +39,10 @@ Ikiwa hakuna exploit ya kuvutia kwa huduma yoyote inayofanya kazi, unapaswa kuta **Ndani ya kitabu hiki utapata mwongozo wa pentest huduma za kawaida zaidi** (na nyingine ambazo si za kawaida sana). Tafadhali, tafuta katika orodha ya kushoto sehemu ya _**PENTESTING**_ (huduma zimepangwa kwa bandari zao za kawaida). -**Ninataka kutoa kumbukumbu maalum kwa sehemu ya** [**Pentesting Web**](../network-services-pentesting/pentesting-web/index.html) **(kama ni kubwa zaidi).**\ +**Ninataka kutoa kumbukumbu maalum kwa** [**Pentesting Web**](../network-services-pentesting/pentesting-web/index.html) **sehemu (kama ni kubwa zaidi).**\ Pia, mwongozo mdogo juu ya jinsi ya [**kutafuta udhaifu uliojulikana katika programu**](../generic-hacking/search-exploits.md) unaweza kupatikana hapa. -**Ikiwa huduma yako haipo ndani ya orodha, tafuta Google** kwa mafunzo mengine na **niambie ikiwa unataka niiongeze.** Ikiwa **huwezi kupata chochote** kwenye Google, fanya **pentesting ya kipofu** mwenyewe, unaweza kuanza kwa **kuungana na huduma, kuifanyia fuzzing na kusoma majibu** (ikiwa yapo). +**Ikiwa huduma yako haipo ndani ya orodha, tafuta Google** kwa mafunzo mengine na **niambie ikiwa unataka niiongeze.** Ikiwa huwezi **kupata chochote** kwenye Google, fanya **pentesting ya kipofu** mwenyewe, unaweza kuanza kwa **kuunganisha kwenye huduma, kuifanyia fuzzing na kusoma majibu** (ikiwa yapo). #### 5.1 Zana za Kiotomatiki @@ -50,17 +50,17 @@ Pia kuna zana kadhaa ambazo zinaweza kufanya **tathmini za udhaifu za kiotomatik #### **5.2 Kuangamiza huduma** -Katika baadhi ya hali **Brute-Force** inaweza kuwa na manufaa ili **kushawishi** **huduma**. [**Pata hapa CheatSheet ya huduma tofauti za kuangamiza**](../generic-hacking/brute-force.md)**.** +Katika hali fulani **Brute-Force** inaweza kuwa na manufaa ili **kuathiri** **huduma**. [**Pata hapa CheatSheet ya huduma tofauti za kuangamiza**](../generic-hacking/brute-force.md)**.** ### 6- [Phishing](phishing-methodology/index.html) -Ikiwa katika hatua hii huja pata udhaifu wowote wa kuvutia huenda **ukahitaji kujaribu phishing** ili kuingia ndani ya mtandao. Unaweza kusoma mbinu zangu za phishing [hapa](phishing-methodology/index.html): +Ikiwa katika hatua hii huja pata udhaifu wowote wa kuvutia unapaswa **kujaribu baadhi ya phishing** ili kuingia ndani ya mtandao. Unaweza kusoma mbinu yangu ya phishing [hapa](phishing-methodology/index.html): ### **7-** [**Kupata Shell**](../generic-hacking/reverse-shells/index.html) -Kwa namna fulani unapaswa kuwa umepata **njia yoyote ya kutekeleza msimbo** katika mwathirika. Kisha, [orodha ya zana zinazowezekana ndani ya mfumo ambazo unaweza kutumia kupata shell ya kurudi itakuwa ya manufaa sana](../generic-hacking/reverse-shells/index.html). +Kwa namna fulani unapaswa kuwa umepata **njia yoyote ya kutekeleza msimbo** katika mwathirika. Kisha, [orodha ya zana zinazowezekana ndani ya mfumo ambazo unaweza kutumia kupata shell ya nyuma itakuwa ya manufaa sana](../generic-hacking/reverse-shells/index.html). -Hasa katika Windows unaweza kuhitaji msaada wa **kuepuka antivirusi**: [**Angalia ukurasa huu**](../windows-hardening/av-bypass.md)**.** +Haswa katika Windows unaweza kuhitaji msaada wa **kuepuka antiviruses**: [**Angalia ukurasa huu**](../windows-hardening/av-bypass.md)**.** ### 8- Ndani @@ -70,9 +70,9 @@ Ikiwa una matatizo na shell, unaweza kupata hapa **mkusanyiko mdogo wa amri muhi - [**Windows (CMD)**](../windows-hardening/basic-cmd-for-pentesters.md) - [**Windows (PS)**](../windows-hardening/basic-powershell-for-pentesters/index.html) -### **9 -** [**Uhamishaji**](../generic-hacking/exfiltration.md) +### **9-** [**Uhamishaji**](../generic-hacking/exfiltration.md) -Huenda ukahitaji **kutoa data kutoka kwa mwathirika** au hata **kuingiza kitu** (kama vile skripti za kupandisha mamlaka). **Hapa una** [**post kuhusu zana za kawaida ambazo unaweza kutumia kwa malengo haya**](../generic-hacking/exfiltration.md)**.** +Labda utahitaji **kutoa data kutoka kwa mwathirika** au hata **kuingiza kitu** (kama vile skripti za kupandisha mamlaka). **Hapa una** [**post kuhusu zana za kawaida ambazo unaweza kutumia kwa madhumuni haya**](../generic-hacking/exfiltration.md)**.** ### **10- Kupandisha Mamlaka** @@ -84,34 +84,34 @@ Unapaswa pia kuangalia hizi kurasa kuhusu jinsi **Windows inavyofanya kazi**: - [**Uthibitishaji, Akidi, Mamlaka ya Token na UAC**](../windows-hardening/authentication-credentials-uac-and-efs/index.html) - Jinsi [**NTLM inavyofanya kazi**](../windows-hardening/ntlm/index.html) -- Jinsi ya [**kuiba akidi**](https://github.com/carlospolop/hacktricks/blob/master/generic-methodologies-and-resources/broken-reference/README.md) katika Windows -- Mbinu kadhaa kuhusu [_**Active Directory**_](../windows-hardening/active-directory-methodology/index.html) +- Jinsi ya [**kuchukua akidi**](https://github.com/carlospolop/hacktricks/blob/master/generic-methodologies-and-resources/broken-reference/README.md) katika Windows +- Hila kadhaa kuhusu [_**Active Directory**_](../windows-hardening/active-directory-methodology/index.html) **Usisahau kuangalia zana bora za kuorodhesha njia za Kupandisha Mamlaka za ndani za Windows na Linux:** [**Suite PEAS**](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite) -#### **10.2- Privesc za Kikoa** +#### **10.2- Privesc za Kihifadhi** -Hapa unaweza kupata [**mbinu inayofafanua hatua za kawaida za kuorodhesha, kupandisha mamlaka na kudumu kwenye Active Directory**](../windows-hardening/active-directory-methodology/index.html). Hata kama hii ni sehemu ndogo ya sehemu, mchakato huu unaweza kuwa **nyeti sana** kwenye kazi ya Pentesting/Red Team. +Hapa unaweza kupata [**mbinu inayofafanua hatua za kawaida za kuorodhesha, kupandisha mamlaka na kudumu kwenye Active Directory**](../windows-hardening/active-directory-methodology/index.html). Hata kama hii ni sehemu ndogo ya sehemu, mchakato huu unaweza kuwa **nyeti sana** katika kazi ya Pentesting/Red Team. ### 11 - POST #### **11**.1 - Kuiba -Angalia ikiwa unaweza kupata zaidi **nywila** ndani ya mwenyeji au ikiwa una **ufikiaji kwa mashine nyingine** zikiwa na **mamlaka** ya **mtumiaji** wako.\ -Pata hapa njia tofauti za [**kudondosha nywila katika Windows**](https://github.com/carlospolop/hacktricks/blob/master/generic-methodologies-and-resources/broken-reference/README.md). +Angalia ikiwa unaweza kupata zaidi ya **nywila** ndani ya mwenyeji au ikiwa una **ufikiaji wa mashine nyingine** zikiwa na **mamlaka** ya **mtumiaji** wako.\ +Pata hapa njia tofauti za [**dump nywila katika Windows**](https://github.com/carlospolop/hacktricks/blob/master/generic-methodologies-and-resources/broken-reference/README.md). #### 11.2 - Kudumu -**Tumia aina 2 au 3 tofauti za mitambo ya kudumu ili usihitaji kuhamasisha mfumo tena.**\ -**Hapa unaweza kupata baadhi ya** [**mbinu za kudumu kwenye active directory**](../windows-hardening/active-directory-methodology/index.html#persistence)**.** +**Tumia aina 2 au 3 tofauti za mitambo ya kudumu ili usihitaji kuathiri mfumo tena.**\ +**Hapa unaweza kupata baadhi ya** [**hila za kudumu kwenye active directory**](../windows-hardening/active-directory-methodology/index.html#persistence)**.** -TODO: Kamalisha Post ya kudumu katika Windows & Linux +TODO: Kamalisha kudumu Post katika Windows & Linux ### 12 - Pivoting -Kwa **akidi zilizokusanywa** unaweza kuwa na ufikiaji kwa mashine nyingine, au labda unahitaji **kugundua na kuskan wenyeji wapya** (anza tena Mbinu ya Pentesting) ndani ya mitandao mipya ambapo mwathirika wako ameunganishwa.\ +Kwa **akidi zilizokusanywa** unaweza kuwa na ufikiaji wa mashine nyingine, au labda unahitaji **kugundua na kuskan wenyeji wapya** (anzisha tena Mbinu ya Pentesting) ndani ya mitandao mipya ambapo mwathirika wako ameunganishwa.\ Katika kesi hii, tunneling inaweza kuwa muhimu. Hapa unaweza kupata [**post inayozungumzia tunneling**](../generic-hacking/tunneling-and-port-forwarding.md).\ -Bila shaka unapaswa pia kuangalia post kuhusu [Mbinu ya pentesting ya Active Directory](../windows-hardening/active-directory-methodology/index.html). Huko utapata mbinu nzuri za kuhamasisha, kupandisha mamlaka na kudondosha akidi.\ +Bila shaka unapaswa pia kuangalia post kuhusu [Mbinu ya pentesting ya Active Directory](../windows-hardening/active-directory-methodology/index.html). Huko utapata hila nzuri za kuhamasisha, kupandisha mamlaka na dump akidi.\ Angalia pia ukurasa kuhusu [**NTLM**](../windows-hardening/ntlm/index.html), inaweza kuwa ya manufaa sana kuhamasisha katika mazingira ya Windows. ### ZAIDI @@ -122,11 +122,11 @@ Angalia pia ukurasa kuhusu [**NTLM**](../windows-hardening/ntlm/index.html), ina - [**Kuvunja Msingi wa Linux**](broken-reference/index.html) - [**Kuvunja Msingi wa Windows**](../binary-exploitation/windows-exploiting-basic-guide-oscp-lvl.md) -- [**Zana za kuvunja za Msingi**](../binary-exploitation/basic-stack-binary-exploitation-methodology/tools/index.html) +- [**Zana za kuvunja msingi**](../binary-exploitation/basic-stack-binary-exploitation-methodology/tools/index.html) -#### [**Python ya Msingi**](python/index.html) +#### [**Python Msingi**](python/index.html) -#### **Mbinu za Crypto** +#### **Hila za Crypto** - [**ECB**](../crypto-and-stego/electronic-code-book-ecb.md) - [**CBC-MAC**](../crypto-and-stego/cipher-block-chaining-cbc-mac-priv.md) diff --git a/src/images/venacus-logo.png b/src/images/venacus-logo.png new file mode 100644 index 0000000000000000000000000000000000000000..6afa1ae32224e1f128e12f8d19f3c58683ac3974 GIT binary patch literal 9217 zcmd^lXH?T!xAzI4q97n$st#iTq*xH7J9d$x^p>EE^cF#i5Ry?5rA0*q=?aLTfJkov zfq--jN{2v@UP5RgAtdh~M(3ILu65VCAMUrCFX5EketVz2_c`H-k-??Cd&Kqt0QO$F zeEtRi9MGR^fOG4sxW4vx9B#N1!bY`oFKY(q_9^}uIAdHGI2>pOUMr&>3nk`Jg+^#5oJ9f z49X3LJ=R{+(u2+pCQ3_frs~X%H5Hyv)OUPqs4fS9tzE-6##+z~8?pDK>Eoj72u7*A zt&k%=G``C{5X3ztGd9uty-9S&R4F$@DM(XN{+2RRrJAq-z}TN&?-`B(27__khBck6 z+QxXFD-wOZ_&_#bzfr}~dbX@j`Sy@^vjhDh>T|=98Ebz(kUF-rn9RCiC4u$%-pLAY zG^RbeOao*A;M2<3yb&hUQQ=!{Elq6*q5Sn)cKA4O>KZ9*Xv%*(8_JxNqJ6a>u&BX& z0CT!^P&1`#$B~Vqpcq}crM8Qm9$6YhTutPU_FP9#T&|&8h#}(3%BXz6>XaX=H1G}& ztD{ZC%bhu}-?%CoblyJ|c!QVKA+g*4Hw6!gxhf9K49si(2QNl6?6nWN^@&zh3NZS7 z-lV=o|`u=S;PxBhD=vZVQJ6Ol4pNQbrP`9^I zDg3t3qpk|l^L6;WmR{a0R9-uxX%e5!GZRv|iR`}oWzQ?>bsMgGB5yNa1 z=D=KWvD;Y3TBu~F0l!9_fncB>%3f<;a5%r=Gcq8!e4Nu?4K+~A zj=AFIWyNqUuNvp@Kb7L-06^TgC2>Nn{~J7qzh;V43#^li7*gUAq#V`45^7xAgrmZr zSYsy)Xc*>$4dxrQ-_#`%u0d;NBmR7 zz+ot7QXW_c>#$T9Pu4A&6C;I4J*;yiN<6eNYkICw?Im84@`bZ*q2EGMwf^>Topz_7 z<7;`I-T7l+SN(YY>kJP6FVh%s?H1QslODpymeEBcRL+W`ds32#v4&xvgN!xRn)_%{ z2CCy+OIW%NVK7UeQI~)n8|}{J{BmiX0hDFif^7#iTS3Y1o~jqmv1SRX_R41U#_q)T z|G8(u%FSWFOuQ*%=Dv^SIJ3O?1i*4CXO)147#nZ zFx+jHC?TrjDhu;)C6i$_r3qyLHm3+9FMC=8^fQ^=H7{w#$ggib#0IA?-8-t#j@aKD zTLnHm!u960-I>j$O@P~9mBxR+Sm)WtmS$tXHnHX8r z{X;s_|5M11(t96*kHIieEeLF5*tvl-^URn&&*rw5O8K+j#$K;GOQ^>eNyR@md>m@E zuD5)Ro1-TEDbw*o)}sDBr1b+<@a86x%CVQJgVyAajZ|bKn3I^z=YVNK&bau^95dvsyOVw$hyE`^L%)K?&`$Q=c3&~jA2o^V9Mn|7b#OHv}i|~WiV=% zF>ld#=mAS9w@>;@o*V6GO{VqZxbZdwrH?H&9FI29I;bQ)L?j2h=~%7P5&hT?(s`*4Ar@lB5X#RPkLbM}d*)ApNlsVJsWN zeb5>im=lg(rm>~U?{!OwHIr(Oa;JQ$z0{>Yq_M6;Emg%4`;&NIG3HNNv-J8xsDbqv@= zsPN?apB?C5zcqdq87@INKQK9=!>?M;ST_hNrO=l;UzNDx&Y;g+vPv{BLY*634RBah zP}|V|9_5q1icIVf2ez+qmR2{MFAwq+$V*@M4}e=xVk!E(FT`&Js4Jo5Sq}1<;@V^t zcX8>ki#8(I!e_uwWzBt5wAt}}(z$0IhSmL%Dfi>dDM9L+C-pM%&xYr?_hS@ zX0^*mG7_88P-0F>vq)>PrfINSPsq#dz0EsL-3?$s z`LkGo+b@oIky>3@3W#T3uCAGLZ9_VF*}lgzHV*F; z20%%+0AW6#fXw!vO=*xPHD3=}MyuHhON(xpYxtG;T*YOCtXi28%khbHmwT0jYhj4F zV#E6Y_+M#iyQ)DiLgH1%LcONCeGek%Oz?EGz=ny~M2S z%SUATHreVXYwl{r@aHf+jRHIuODZCOJug1a98Nrj(%Qp*cQ_8G8Gk!7FH_Fk)Q0$E zRs!m1b9ha5HK2ritK_@jF}^<<>+KbiR{ZqT-EJY!MAuu_t#k-C>Ga~X@bJn~!iPPL zoLdm?t6A3 z*lPe%-M!();|!LMZA=q-Ca`hI%wg3q()v&)P^Kpq>(}$rX+iKzcjd^N`U|M)?-SiaDtYfds^p3doo{3V zn6JF|OxsPX(+PHdf2>Bcmckgx9)nW(j&w7Zw_K#emAW(JxyyEvh?}=Yj*!x}rKGLo z$T?0^H?ezUDGPG3{Ms4}Vj@pamfPr#fgj@PF&109eCj)2lxEi&P#JsbSS#$mOnDA9!m^+qYQ5$JkYJkGt_~dY-x3iKUuBBHvcrCjQ`^ zSbA7QRpH70xS@UKw3!4mcEa{jN%3l1{4TuT7{kXKcVsWxVso@qMKMyE%DO(Bt5Li( zViw>WGQT7MI{-j~t0USYL~!*_9JymXNyfHG?%Ikh@*O4l1&NJy-yEaJjTTOb;xSAr>!7@3c z$2{mE-SU}L<|^)h4K7cmx6@WiS0_*IOTX)EDPcZtcE$PP88<@74h#UIEkg{XkYcJv zrJ4;okD$2m{I%@&ZaLKZpt#C&*hpj(lrj46c($l|kQ|!A69NShLoM<@2>5NMysrFM z`o5}c<^5*OOC&19b}b&KYHpeKS~fCz>?=}?nG$f!d5$pSn?QYZvm>DN6V4s^R3md; zrpA3$a$C4eq`8S&XL5MOoRV2-$52DijiONk$qc=9G&iBbT7JOYsrhlNLGpFY zor|&f3O2XPDT3QRVjE$-e6&!QOZiMv-1xLdV=g78TBOIN$SUy!td3>GjeowfB)l^V zi@!`YDE0Oo6~s-f_~;=qdfTdhHwgBn7_I1MboCSd5>otb9jjyQjEa(6HL0FQi25UA z1lE&LZH^*4GmXRYe1egfirks~0?_d`^DEX1)94SFzjU5kC3k%boCeR&1a@JJw@-V5mUOm_jpxZGspw;~%xJ*fZK;z?WE3-kR=C6Nk3(yZ~%02HTRa(}$BiT+mW~ zSt&@ykzGau=>pSXE7OF$xeh0Z7wuVI1!v50Cdhot-T-__9@%Gbx+QW+d#@O|xC4 zSHrg`+*+Ev&E1c$3m3e7j}BiAIOqJw$QQhV+BpD4B2RO5bh6ysEhWXE=wRFOYM<_4 z;(IQQ4STt{8PB}x;)1-Y{z~?Mo5z0_7K*)NGin=WX;XU)b^ri%n!DI^r&_I;tJ=$mXkB^%qC@aqe>-q0z#^p>gsT;k8?j7liqcOWMK5Pi6QkG(@uL zLe9CP8tCE7!&-S+%YU_`9#t7&caszMt~5cXq}g?U?+KjXgZxt-`Yj}a8gj%mhHZo^ z!&~&$YNF(xfz(quoev^WTzaLsA0NgDs0cj;VCqVl4}GZ0IS=AS<*!89ZPfBH3J9i) z(*;8Crj1+9aMpeD(0fwvk{0{KoDqY`JinY;D_@$rzUOMRtb*dPoBG6sZM{5Ht=E~u z7PjcV%N^2#a%MulU-k6Zy^wz-t7K$7b}3qKJ&eA9{*4+VkgB$~!-#=82*M`M)+2=2 zQlIkCMtc!k&TpT0&?Dl^BQ!BDDKf#7^-x8w$QO(uCzwDv*uJ?32+M8v9M+ zTT8qSoliEksl6U@s8zo0ey`eP;6o>yZHk*pkL4>S(8cE~qbQv33_K@2=#0olb!szf z#NW*r!EY59&UKPBDZYoj2Zpa0jZyqdp2+3N{Gulse}eQ-+wa9;zGj3I)wh!Nki_pG z{L(0%%gcVu56Znz_oNFrG3`}&)e=9TGi;S;;P+8^Me^&yG5 zAR;#gBI3|;Jj6_q;xS8n&f>veWNfMDc4i7qj>t2Z$;7TTliDLfyE-~FshPxogs?82BG>lhpDIZ?hL(=u*^kCtHJeO3{bjDj@~wc+dPh=iXiIdYWWQm6i3I{AbYnN)RgYfmE+JI;~kKsH!p*? zh9WP$kQF_hjjJI*&GSRaAJfO~ub3=L{zHHPQ%>MTZmm+%qh6+&6HY@*d+EiddizUi%hx^Ucm)58@f$ z4c~>Bzp@6{^Ad^+Wb1d-{JsZcrNF!$9W6%eXN8VW`u+x7il8>|2VUnw`rYH66BGZk zM>HC|`%daCJ)yPAATpP0nVZ>~1t%fNDw&NR5asVbF9rF~d@uf+;x72+0#%s0EG63) z!g#w@xg>fI4dUWbRA?>{+inm}BE^XyvdO)XDdMoL`1ouB#aHqk%-5Me!L^;+tR7_j zW9I?D{q|q%{|-k0`x#jOS?Ngm7fBG4<7ebn`eYgu)y>V%Ywjne#rFFO1BG3>%SQjA zul&JwU^qVIXeC~UA8hku->S%3!XTihv|v$~Rq!`s(Kv|bRQ?topPnVB^sH1}{X0&$ zuR&BRHsFU+efhp*vKEph}0NsUdPf~nd}D%LtfFw`;OrYP#fmOf&TGat7-)`1Cal&1c zCv>&gHVgx{qRBH!Y3K(LZhm`e;Tkx_gAG)r4aU$^f1Qv6py2>`BPAXhux3wd8QTXU zQOk>DJYm8IQl4WARZa}gE?r_mmzInsy02!RrEK2oPa|&lYJztmVYAZE=V`z-4LjUo`T{xejPxFUKu=kTfbB* zc1&Uxd^sYRTz#BJ2(bOMV#*E_Rtxp>V&Y7#{$RfN57)dMx&zi{e?Fx^ z8mz^kQ=F@JfQ2K>?w$+mry<>zKeu9la-5YTd;Tv@Q1mPF{jx?mZV&jcOPD4J;O(bJ zyf%p+N1ECQW;R%FqTvs}pm=wx%^wj4X)BE-u^&j1nhkx0Tbrp&`g=hRa6=2b*blJagF3a#=%WB$ z4(psg`zhA%z)oYB-2thD&2S^pI&gV1YMo&%>?Q*^ex5u|j1(6Jy2lI2Xrobd?_XB4 zL1)DRq!S+(g|xBQ|2=C3DpgMlpJrJ?TYmWhI&V{tUK>JVjevjc?QQx6&zAZIaIo$M zxphmh?-E;$<2kSm@yBQppe_E3+uV;Gn2ty8hyJy%uK4GP*9e%ME4XP5y;A*6*sd*J z9P`T^(9*%biP&_vT=>&{(BPMr+Zf9IvxgJ>H~H)E1>m!xGv@yx{Id_K*jWSJk`$V1`=HG~Xidd6q%_#exRq^=0Q*bs&k$@Qye+yP`E%21|x2N>k?gK?u+Q+-y zm&$m580r&Bp)2(^$enEt)v`*cuNSSQV^8^JEeiY*YXejrLw(L_u96V#3FLQAb#3{f zV>KZ#_F06*Er8Z>#wz}jIpr}uJ{_9RD1)s~d{7dW^XUZ(Wo$T{rTTBVEm)?e-IBs| zVS~J!R)HQ{s@Z#}pcWoo*uamZw72cLMoNk0_<3Zm-A`dFHb6gTYB^-2ZSdxLnyp$6 zsqAQv$a1VIU?IAkkv6PL!fwW!F@A0J<(UPy7>}7S8#5O z+M&}t8*}e>W$uPL^D^)yPXY|FnQydm)18o?-P~-e+T`85M9%^k}u}G8eYSe$)S0w zY^g&z07SPZqLvjBBDAn;pl zY{v!%ko+FxcQ2@Zlv;d7BjPUj!L>&(ZXCsiiOTjoy+kDkops(V$%#q3HOAS27zm1m z9`n^v+#~OxQ#i8W#e9&@i0h6s-}a5pF&j-iy3Qqs{Nq&3UQK@5j45 zXBvrEmV(uYI?eIx!Grj;bHW2os!FG9wNnVfTmF%5rp^izdQfyWz*-_3xgHIV)23d_ znkEmt`mY^mr7BQ+2PD8FDSQ| zgdl|86)*ro5^`4$3KE*PB8{lo75{{uVp0k{AF literal 0 HcmV?d00001