2007-02-18 00:10:39 +00:00
|
|
|
##
|
2008-01-06 21:52:59 +00:00
|
|
|
# $Id$
|
2007-02-18 00:10:39 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
##
|
2009-12-26 22:08:49 +00:00
|
|
|
# This file is part of the Metasploit Framework and may be subject to
|
2007-02-18 00:10:39 +00:00
|
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
|
|
# Framework web site for more information on licensing and terms of use.
|
2009-04-13 14:33:26 +00:00
|
|
|
# http://metasploit.com/framework/
|
2007-02-18 00:10:39 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
require 'msf/core'
|
|
|
|
|
|
|
|
|
2008-10-02 05:23:59 +00:00
|
|
|
class Metasploit3 < Msf::Auxiliary
|
2006-08-13 02:06:27 +00:00
|
|
|
|
2008-10-02 05:23:59 +00:00
|
|
|
include Msf::Auxiliary::Report
|
|
|
|
include Msf::Auxiliary::Scanner
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
def initialize
|
|
|
|
super(
|
|
|
|
'Name' => 'UDP Service Sweeper',
|
2007-02-18 00:10:39 +00:00
|
|
|
'Version' => '$Revision$',
|
2006-08-13 02:06:27 +00:00
|
|
|
'Description' => 'Detect common UDP services',
|
|
|
|
'Author' => 'hdm',
|
|
|
|
'License' => MSF_LICENSE
|
|
|
|
)
|
|
|
|
|
|
|
|
register_options(
|
|
|
|
[
|
2010-02-09 16:47:38 +00:00
|
|
|
Opt::CHOST,
|
|
|
|
OptInt.new('BATCHSIZE', [true, 'The number of hosts to probe in each set', 256])
|
2006-08-13 02:06:27 +00:00
|
|
|
], self.class)
|
|
|
|
|
|
|
|
# Intialize the probes array
|
|
|
|
@probes = []
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
# Add the UDP probe method names
|
|
|
|
@probes << 'probe_pkt_dns'
|
|
|
|
@probes << 'probe_pkt_netbios'
|
|
|
|
@probes << 'probe_pkt_portmap'
|
|
|
|
@probes << 'probe_pkt_mssql'
|
2009-12-26 22:08:49 +00:00
|
|
|
@probes << 'probe_pkt_ntp'
|
|
|
|
@probes << 'probe_pkt_snmp1'
|
|
|
|
@probes << 'probe_pkt_snmp2'
|
2006-08-13 02:06:27 +00:00
|
|
|
@probes << 'probe_pkt_sentinel'
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
# Define our batch size
|
|
|
|
def run_batch_size
|
|
|
|
datastore['BATCHSIZE'].to_i
|
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
# Fingerprint a single host
|
|
|
|
def run_batch(batch)
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2008-12-19 07:11:08 +00:00
|
|
|
print_status("Sending #{@probes.length} probes to #{batch[0]}->#{batch[-1]} (#{batch.length} hosts)")
|
2006-08-13 02:06:27 +00:00
|
|
|
|
2009-12-26 22:08:49 +00:00
|
|
|
begin
|
2006-08-13 02:06:27 +00:00
|
|
|
udp_sock = nil
|
|
|
|
idx = 0
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2010-02-09 16:47:38 +00:00
|
|
|
# Create an unbound UDP socket if no CHOST is specified, otherwise
|
|
|
|
# create a UDP socket bound to CHOST (in order to avail of pivoting)
|
|
|
|
udp_sock = Rex::Socket::Udp.create( { 'LocalHost' => datastore['CHOST'] || nil } )
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
# Send each probe to each host
|
|
|
|
@probes.each do |probe|
|
2010-02-09 16:47:38 +00:00
|
|
|
batch.each do |ip|
|
|
|
|
begin
|
|
|
|
data, port = self.send(probe, ip)
|
|
|
|
udp_sock.sendto(data, ip, port, 0)
|
|
|
|
rescue ::Interrupt
|
|
|
|
raise $!
|
|
|
|
rescue ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Rex::ConnectionRefused
|
|
|
|
nil
|
|
|
|
end
|
2010-02-14 19:38:47 +00:00
|
|
|
|
2010-02-09 16:47:38 +00:00
|
|
|
if (idx % 30 == 0)
|
|
|
|
while (r = udp_sock.recvfrom(65535, 0.1) and r[1])
|
|
|
|
parse_reply(r)
|
|
|
|
end
|
2006-08-13 02:06:27 +00:00
|
|
|
end
|
2010-02-14 19:38:47 +00:00
|
|
|
|
2010-02-09 16:47:38 +00:00
|
|
|
idx += 1
|
2006-08-13 02:06:27 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
while (r = udp_sock.recvfrom(65535, 3) and r[1])
|
|
|
|
parse_reply(r)
|
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-12-10 08:21:00 +00:00
|
|
|
rescue ::Interrupt
|
|
|
|
raise $!
|
|
|
|
rescue ::Exception => e
|
2008-12-19 07:11:08 +00:00
|
|
|
print_status("Unknown error: #{e.class} #{e}")
|
2006-08-13 02:06:27 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
# The response parsers
|
|
|
|
#
|
|
|
|
def parse_reply(pkt)
|
2009-03-29 03:24:59 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
@results ||= {}
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
# Ignore "empty" packets
|
|
|
|
return if not pkt[1]
|
2009-03-29 03:24:59 +00:00
|
|
|
|
|
|
|
if(pkt[1] =~ /^::ffff:/)
|
|
|
|
pkt[1] = pkt[1].sub(/^::ffff:/, '')
|
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
# Ignore duplicates
|
2008-12-19 07:11:08 +00:00
|
|
|
hkey = "#{pkt[1]}:#{pkt[2]}"
|
2006-08-13 02:06:27 +00:00
|
|
|
return if @results[hkey]
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
app = 'unknown'
|
|
|
|
inf = ''
|
2009-12-26 22:08:49 +00:00
|
|
|
maddr = nil
|
|
|
|
hname = nil
|
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
case pkt[2]
|
|
|
|
when 53
|
|
|
|
app = 'DNS'
|
2006-08-24 05:37:40 +00:00
|
|
|
ver = nil
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-24 05:37:40 +00:00
|
|
|
if (not ver and pkt[0] =~ /([6789]\.[\w\.\-_\:\(\)\[\]\/\=\+\|\{\}]+)/i)
|
|
|
|
ver = 'BIND ' + $1
|
|
|
|
end
|
|
|
|
|
2010-02-14 19:38:47 +00:00
|
|
|
ver = 'Microsoft DNS' if (not ver and pkt[0][2,4] == "\x81\x04\x00\x01")
|
|
|
|
ver = 'TinyDNS' if (not ver and pkt[0][2,4] == "\x81\x81\x00\x01")
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-24 05:37:40 +00:00
|
|
|
ver = pkt[0].unpack('H*')[0] if not ver
|
|
|
|
inf = ver if ver
|
2006-08-13 02:06:27 +00:00
|
|
|
when 137
|
|
|
|
app = 'NetBIOS'
|
2009-12-26 18:10:13 +00:00
|
|
|
|
|
|
|
data = pkt[0]
|
|
|
|
|
|
|
|
head = data.slice!(0,12)
|
|
|
|
|
|
|
|
xid, flags, quests, answers, auths, adds = head.unpack('n6')
|
|
|
|
return if quests != 0
|
|
|
|
return if answers == 0
|
|
|
|
|
|
|
|
qname = data.slice!(0,34)
|
|
|
|
rtype,rclass,rttl,rlen = data.slice!(0,10).unpack('nnNn')
|
|
|
|
buff = data.slice!(0,rlen)
|
|
|
|
|
|
|
|
names = []
|
|
|
|
|
|
|
|
case rtype
|
|
|
|
when 0x21
|
|
|
|
rcnt = buff.slice!(0,1).unpack("C")[0]
|
|
|
|
1.upto(rcnt) do
|
|
|
|
tname = buff.slice!(0,15).gsub(/\x00.*/, '').strip
|
|
|
|
ttype = buff.slice!(0,1).unpack("C")[0]
|
|
|
|
tflag = buff.slice!(0,2).unpack('n')[0]
|
|
|
|
names << [ tname, ttype, tflag ]
|
|
|
|
end
|
|
|
|
maddr = buff.slice!(0,6).unpack("C*").map{|c| "%.2x" % c }.join(":")
|
|
|
|
|
|
|
|
names.each do |name|
|
|
|
|
inf << name[0]
|
|
|
|
inf << ":<%.2x>" % name[1]
|
|
|
|
if (name[2] & 0x8000 == 0)
|
|
|
|
inf << ":U :"
|
|
|
|
else
|
|
|
|
inf << ":G :"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
inf << maddr
|
2009-12-26 22:08:49 +00:00
|
|
|
|
|
|
|
if(names.length > 0)
|
|
|
|
hname = names[0][0]
|
|
|
|
end
|
2009-12-26 18:10:13 +00:00
|
|
|
end
|
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
when 111
|
|
|
|
app = 'Portmap'
|
2010-02-05 14:53:09 +00:00
|
|
|
buf = pkt[0]
|
|
|
|
inf = ""
|
|
|
|
hed = buf.slice!(0,24)
|
|
|
|
svc = []
|
|
|
|
while(buf.length >= 20)
|
|
|
|
rec = buf.slice!(0,20).unpack("N5")
|
|
|
|
svc << "#{rec[1]} v#{rec[2]} #{rec[3] == 0x06 ? "TCP" : "UDP"}(#{rec[4]})"
|
|
|
|
report_service(
|
|
|
|
:host => pkt[1],
|
|
|
|
:port => rec[4],
|
|
|
|
:proto => (rec[3] == 0x06 ? "tcp" : "udp"),
|
|
|
|
:name => "sunrpc",
|
|
|
|
:info => "#{rec[1]} v#{rec[2]}"
|
|
|
|
)
|
|
|
|
end
|
|
|
|
inf = svc.join(", ")
|
|
|
|
|
2008-06-06 04:29:19 +00:00
|
|
|
when 123
|
|
|
|
app = 'NTP'
|
|
|
|
ver = nil
|
|
|
|
ver = pkt[0].unpack('H*')[0]
|
|
|
|
ver = 'NTP v3' if (ver =~ /^1c06|^1c05/)
|
|
|
|
ver = 'NTP v4' if (ver =~ /^240304/)
|
|
|
|
ver = 'NTP v4 (unsynchronized)' if (ver =~ /^e40/)
|
|
|
|
ver = 'Microsoft NTP' if (ver =~ /^dc00|^dc0f/)
|
|
|
|
inf = ver if ver
|
2006-08-13 02:06:27 +00:00
|
|
|
when 1434
|
2009-12-26 22:08:49 +00:00
|
|
|
app = 'MSSQL'
|
2006-08-13 18:14:38 +00:00
|
|
|
mssql_ping_parse(pkt[0]).each_pair { |k,v|
|
|
|
|
inf += k+'='+v+' '
|
|
|
|
}
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
when 161
|
|
|
|
app = 'SNMP'
|
2006-08-24 05:37:40 +00:00
|
|
|
begin
|
|
|
|
asn = ASNData.new(pkt[0])
|
|
|
|
inf = asn.access("L0.L0.L0.L0.V1.value")
|
|
|
|
if (inf)
|
|
|
|
inf.gsub!(/\r|\n/, ' ')
|
|
|
|
inf.gsub!(/\s+/, ' ')
|
|
|
|
end
|
|
|
|
rescue ::Exception
|
|
|
|
end
|
2006-08-13 02:06:27 +00:00
|
|
|
when 5093
|
|
|
|
app = 'Sentinel'
|
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2009-12-28 00:21:21 +00:00
|
|
|
report_service(
|
2009-12-26 22:08:49 +00:00
|
|
|
:host => pkt[1],
|
2009-12-28 00:21:21 +00:00
|
|
|
:host_mac => (maddr and maddr != '00:00:00:00:00:00') ? maddr : nil,
|
|
|
|
:host_name => (hname) ? hname.downcase : nil,
|
2009-12-26 22:08:49 +00:00
|
|
|
:port => pkt[2],
|
|
|
|
:proto => 'udp',
|
|
|
|
:name => app,
|
|
|
|
:info => inf
|
|
|
|
)
|
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
print_status("Discovered #{app} on #{pkt[1]} (#{inf})")
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
end
|
2006-08-13 18:14:38 +00:00
|
|
|
|
2006-08-24 05:37:40 +00:00
|
|
|
#
|
|
|
|
# Parse a asn1 buffer into a hash tree
|
|
|
|
#
|
|
|
|
|
2008-10-02 05:23:59 +00:00
|
|
|
class ASNData < ::Hash
|
2006-08-24 05:37:40 +00:00
|
|
|
|
|
|
|
def initialize(data)
|
|
|
|
_parse_asn1(data, self)
|
|
|
|
end
|
|
|
|
|
|
|
|
def _parse_asn1(data, tree)
|
|
|
|
x = 0
|
|
|
|
while (data.length > 0)
|
2009-10-03 19:48:15 +00:00
|
|
|
t,l = data[0,2].unpack('CC')
|
2006-08-24 05:37:40 +00:00
|
|
|
i = 2
|
|
|
|
|
|
|
|
if (l > 0x7f)
|
|
|
|
lb = l - 0x80
|
|
|
|
l = (("\x00" * (4-lb)) + data[i, lb]).unpack('N')[0]
|
|
|
|
i += lb
|
|
|
|
end
|
|
|
|
|
|
|
|
buff = data[i, l]
|
|
|
|
|
|
|
|
tree[:v] ||= []
|
|
|
|
tree[:l] ||= []
|
|
|
|
case t
|
|
|
|
when 0x00...0x29
|
|
|
|
tree[:v] << [t, buff]
|
|
|
|
else
|
|
|
|
tree[:l][x] ||= ASNData.new(buff)
|
|
|
|
x += 1
|
|
|
|
end
|
|
|
|
data = data[i + l, data.length - l]
|
2009-12-26 22:08:49 +00:00
|
|
|
end
|
2006-08-24 05:37:40 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def access(desc)
|
|
|
|
path = desc.split('.')
|
|
|
|
node = self
|
|
|
|
path.each_index do |i|
|
|
|
|
case path[i]
|
|
|
|
when /^V(\d+)$/
|
|
|
|
if (node[:v] and node[:v][$1.to_i])
|
|
|
|
node = node[:v][$1.to_i]
|
|
|
|
next
|
|
|
|
else
|
|
|
|
return nil
|
|
|
|
end
|
|
|
|
when /^L(\d+)$/
|
|
|
|
if (node[:l] and node[:l][$1.to_i])
|
|
|
|
node = node[:l][$1.to_i]
|
|
|
|
next
|
|
|
|
else
|
|
|
|
return nil
|
2009-12-26 22:08:49 +00:00
|
|
|
end
|
2006-08-24 05:37:40 +00:00
|
|
|
when 'type'
|
|
|
|
return (node and node[0]) ? node[0] : nil
|
|
|
|
when 'value'
|
|
|
|
return (node and node[1]) ? node[1] : nil
|
|
|
|
else
|
|
|
|
return nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
return node
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2006-08-13 18:14:38 +00:00
|
|
|
#
|
|
|
|
# Parse a 'ping' response and format as a hash
|
|
|
|
#
|
|
|
|
def mssql_ping_parse(data)
|
|
|
|
res = {}
|
|
|
|
var = nil
|
|
|
|
idx = data.index('ServerName')
|
|
|
|
return res if not idx
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 18:14:38 +00:00
|
|
|
data[idx, data.length-idx].split(';').each do |d|
|
|
|
|
if (not var)
|
|
|
|
var = d
|
|
|
|
else
|
|
|
|
if (var.length > 0)
|
|
|
|
res[var] = d
|
|
|
|
var = nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 18:14:38 +00:00
|
|
|
return res
|
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
#
|
|
|
|
# The probe definitions
|
|
|
|
#
|
|
|
|
|
2009-12-26 22:08:49 +00:00
|
|
|
def probe_pkt_dns(ip)
|
2006-08-13 02:06:27 +00:00
|
|
|
data = [rand(0xffff)].pack('n') +
|
|
|
|
"\x01\x00\x00\x01\x00\x00\x00\x00\x00\x00"+
|
2006-08-24 05:37:40 +00:00
|
|
|
"\x07"+ "VERSION"+
|
|
|
|
"\x04"+ "BIND"+
|
2006-08-13 02:06:27 +00:00
|
|
|
"\x00\x00\x10\x00\x03"
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
return [data, 53]
|
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
def probe_pkt_netbios(ip)
|
2009-12-26 22:08:49 +00:00
|
|
|
data =
|
2006-08-13 02:06:27 +00:00
|
|
|
[rand(0xffff)].pack('n')+
|
|
|
|
"\x00\x00\x00\x01\x00\x00\x00\x00"+
|
|
|
|
"\x00\x00\x20\x43\x4b\x41\x41\x41"+
|
|
|
|
"\x41\x41\x41\x41\x41\x41\x41\x41"+
|
|
|
|
"\x41\x41\x41\x41\x41\x41\x41\x41"+
|
|
|
|
"\x41\x41\x41\x41\x41\x41\x41\x41"+
|
2009-12-26 22:08:49 +00:00
|
|
|
"\x41\x41\x41\x00\x00\x21\x00\x01"
|
2006-08-13 02:06:27 +00:00
|
|
|
|
|
|
|
return [data, 137]
|
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
def probe_pkt_portmap(ip)
|
|
|
|
data =
|
|
|
|
[
|
|
|
|
rand(0xffffffff), # XID
|
|
|
|
0, # Type
|
|
|
|
2, # RPC Version
|
|
|
|
100000, # Program ID
|
|
|
|
2, # Program Version
|
|
|
|
4, # Procedure
|
|
|
|
0, 0, # Credentials
|
|
|
|
0, 0, # Verifier
|
|
|
|
].pack('N*')
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
return [data, 111]
|
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|
2006-08-13 02:06:27 +00:00
|
|
|
def probe_pkt_mssql(ip)
|
|
|
|
return ["\x02", 1434]
|
|
|
|
end
|
|
|
|
|
2008-06-06 04:29:19 +00:00
|
|
|
def probe_pkt_ntp(ip)
|
2009-12-26 22:08:49 +00:00
|
|
|
data =
|
2008-06-06 04:29:19 +00:00
|
|
|
"\xe3\x00\x04\xfa\x00\x01\x00\x00\x00\x01\x00\x00\x00" +
|
|
|
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" +
|
|
|
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" +
|
|
|
|
"\x00\xc5\x4f\x23\x4b\x71\xb1\x52\xf3"
|
|
|
|
return [data, 123]
|
|
|
|
end
|
2006-08-13 02:06:27 +00:00
|
|
|
|
2009-12-26 22:08:49 +00:00
|
|
|
|
|
|
|
def probe_pkt_sentinel(ip)
|
|
|
|
return ["\x7a\x00\x00\x00\x00\x00", 5093]
|
|
|
|
end
|
|
|
|
|
|
|
|
def probe_pkt_snmp1(ip)
|
|
|
|
name = 'public'
|
|
|
|
xid = rand(0x100000000)
|
|
|
|
pdu =
|
|
|
|
"\x02\x01\x00" +
|
|
|
|
"\x04" + [name.length].pack('c') + name +
|
|
|
|
"\xa0\x1c" +
|
|
|
|
"\x02\x04" + [xid].pack('N') +
|
|
|
|
"\x02\x01\x00" +
|
|
|
|
"\x02\x01\x00" +
|
|
|
|
"\x30\x0e\x30\x0c\x06\x08\x2b\x06\x01\x02\x01" +
|
|
|
|
"\x01\x01\x00\x05\x00"
|
|
|
|
head = "\x30" + [pdu.length].pack('C')
|
|
|
|
data = head + pdu
|
|
|
|
[data, 161]
|
|
|
|
end
|
|
|
|
|
|
|
|
def probe_pkt_snmp2(ip)
|
|
|
|
name = 'public'
|
|
|
|
xid = rand(0x100000000)
|
|
|
|
pdu =
|
2006-08-13 02:06:27 +00:00
|
|
|
"\x02\x01\x01" +
|
2009-12-26 22:08:49 +00:00
|
|
|
"\x04" + [name.length].pack('c') + name +
|
2006-08-13 02:06:27 +00:00
|
|
|
"\xa1\x19" +
|
2009-12-26 22:08:49 +00:00
|
|
|
"\x02\x04" + [xid].pack('N') +
|
2006-08-13 02:06:27 +00:00
|
|
|
"\x02\x01\x00" +
|
|
|
|
"\x02\x01\x00" +
|
|
|
|
"\x30\x0b\x30\x09\x06\x05\x2b\x06\x01\x02\x01" +
|
|
|
|
"\x05\x00"
|
2009-12-26 22:08:49 +00:00
|
|
|
head = "\x30" + [pdu.length].pack('C')
|
|
|
|
data = head + pdu
|
|
|
|
[data, 161]
|
2006-08-13 02:06:27 +00:00
|
|
|
end
|
2008-11-11 05:12:52 +00:00
|
|
|
end
|
2009-12-26 22:08:49 +00:00
|
|
|
|