├── .idea
├── .name
├── encodings.xml
├── vcs.xml
├── modules.xml
├── ComptiaPorts.iml
├── misc.xml
└── workspace.xml
├── ports.py
└── programs.py
/.idea/.name:
--------------------------------------------------------------------------------
1 | ComptiaPorts
--------------------------------------------------------------------------------
/.idea/encodings.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
--------------------------------------------------------------------------------
/.idea/vcs.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
--------------------------------------------------------------------------------
/.idea/modules.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
--------------------------------------------------------------------------------
/.idea/ComptiaPorts.iml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
--------------------------------------------------------------------------------
/.idea/misc.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ports.py:
--------------------------------------------------------------------------------
1 | import random
2 | __author__ = 'mantvydas'
3 |
4 | PORTS = [
5 | ("FTP data", 20),
6 | ("FTP control", 21),
7 | ("SFTP", 22),
8 | ("SCP", 22),
9 | ("SSH", 22),
10 | ("Telnet", 23),
11 | ("SMTP", 25),
12 | ("WINS", 42),
13 | # ("TACACs+", 49),
14 | ("DNS name queries", "u53"),
15 | ("DNS zone transfers", "53"),
16 | # ("TFTP", "u69"),
17 | ("HTTP", 80),
18 | ("Kerberos", "u88"),
19 | ("POP3", 110),
20 | ("Portmapper", 111),
21 | ("NTP (network time protocol)", 123),
22 | ("RPC-DCOM", 135),
23 | ("SNMP (Simple network management protocol)", "u161"),
24 | ("SNMP trap (Simple network management protocol)", "u162"),
25 | ("NetBios", "137-139"),
26 | ("IMAP4", 143),
27 | ("LDAP", 389),
28 | ("HTTPS", 443),
29 | ("CIFS", 445),
30 | ("SMTP (SSL/TLS)", 465),
31 | ("IPSec", "u500"),
32 | ("Syslog", 514),
33 | ("LDAP (SSL/TLS)", 636),
34 | ("IMAP (SSL/TLS)", 993),
35 | ("POP (SSL/TLS)", 995),
36 | ("Socks5", 1080),
37 | ("Nessus Server", 1241),
38 | ("L2TP", "u1701"),
39 | ("MS SQL", 1433),
40 | ("Citrix management", 1494, 2598),
41 | ("Oracle listener", 1521),
42 | ("PP2P", 1723),
43 | ("Global catalog service", 3268),
44 | ("RDP", 3389),
45 | ("IRC", "6662-6667"),
46 |
47 | # trojan ports
48 | ("TCP Wrappers", "421"),
49 | ("Doom", "666"),
50 | ("Snipernet", "667"),
51 | ("Tini", "7777"),
52 | ("WinHole", "1080, 1081"),
53 | ("RAT", "1095, 1097, 1098"),
54 | ("SpySender", "1807"),
55 | ("Deep Throat", "2140, 3150"),
56 | ("NetBus", "12345, 12346"),
57 | ("Whack A Mole", "12362, 12363"),
58 | ("Back Orifice", "31377, 31338"),
59 |
60 | ]
61 |
62 |
63 | def askForNextPort(randomIndex):
64 | print(str(PORTS[randomIndex][0]) + " port?")
65 |
66 |
67 | def captureAnswer():
68 | return input()
69 |
70 |
71 | def getActualPort(randomIndex):
72 | return str(PORTS[randomIndex][1])
73 |
74 |
75 | while True:
76 | randomIndex = random.randint(0, PORTS.__len__() - 1)
77 | askForNextPort(randomIndex)
78 | answer = captureAnswer()
79 | portActual = getActualPort(randomIndex)
80 |
81 | if answer == portActual:
82 | print("Correct!")
83 | else:
84 | print("Incorrect! " + portActual)
85 | print()
86 |
--------------------------------------------------------------------------------
/programs.py:
--------------------------------------------------------------------------------
1 | import random
2 | __author__ = 'mantvydas'
3 |
4 | class Colours:
5 | HEADER = '\033[95m'
6 | OKBLUE = '\033[94m'
7 | OKGREEN = '\033[92m'
8 | WARNING = '\033[93m'
9 | FAIL = '\033[91m'
10 | ENDC = '\033[0m'
11 | BOLD = '\033[1m'
12 | UNDERLINE = '\033[4m'
13 |
14 | PROGRAMS = [
15 | # scanning
16 | ("Angry IP Scanner", "[scanning] similar to nmap"),
17 | ("SNScan", "[scanning] Scans network for devices with SNMP"),
18 | ("zenmap", "[scanning] nmap with UI"),
19 | ("NetScan Tools", "[scanning] multipurpose"),
20 | ("hping", "[scanning] packet crafter. Custom scans."),
21 | ("NBTScan", "[scanning, enumeration] NetBios scans"),
22 | ("Zanti", "[scanning] mobile security assesment"),
23 | ("p0f", "[fingerprinting] passive OS fingerprinting"),
24 |
25 | # enumeration
26 | ("DumpSec", "[enumeration] reveal users, groups, printers, etc"),
27 | ("SuperScan", "[enumeration] Windows Enumeration"),
28 | ("Netcat", "multipurpose, can do enumeration"),
29 | ("cryptcat", "netcat with encryption. Good for evading IDS"),
30 | ("showmount", "linux enum, show mounts"),
31 | ("finger", "linux enum, user info"),
32 | ("rpcinfo/rpcclient", "linux enum"),
33 | ("OpUtils 5", "SNMP enumeration"),
34 | ("IP Network Browser", "SNMP enumeration"),
35 |
36 | # passwords
37 | ("L0pthCrack", "[cracking] windows password cracking, auditing"),
38 | ("Ophcrack", "[cracking] windows password cracking, auditing"),
39 | ("Hydra", "[cracking] brute-forcing"),
40 | ("Medusa", "[cracking] brute-forcing"),
41 | ("Rainbow Crack", "[cracking] generates rainbow tables to be used in password cracking"),
42 | ("TRK (Trinity Rescue Kit)", "Passwor resets on local computer"),
43 | ("Brutus", "Old school brute force"),
44 | ("Cain & Abel", "Sniffing, password cracking, MAC spoofing"),
45 | ("ScoopLM", "password cracker, windows authentication traffic sniffer"),
46 | ("KerbCrack", "looks for kerberos traffic for password cracking"),
47 | ("Legion", "password cracking"),
48 |
49 | # sniffers
50 | ("Kismet (Wireless)", "Wireless sniffing and detection tool"),
51 | ("Ntop", "sniffer for unix"),
52 | ("Network Miner", "sniffer, forensically accepted"),
53 | ("EtherApe", "sniffer"),
54 | ("OmniPeek", "sniffer"),
55 | ("Etherflood", "MAC flooding"),
56 | ("Macof", "MAC flooding"),
57 | ("SMAC", "MAC spoofing"),
58 | ("Arpspoof", "Arp spoofing"),
59 | ("WINARPAttacker", "Arp spoofing"),
60 | ("Ufasoft", "Arp spoofing"),
61 | ("Dsniff", "Arp spoofing, sniffing"),
62 | ("ADMutate", "create scripts hard for IDS to understand"),
63 | ("NIDSBench", "fragmentation to bypass IDS"),
64 | ("PaketETH", "Packet generator"),
65 | ("Ferret & Hamster", "Sniffing, sidejacking attack, stealing cookies with sessions"),
66 |
67 | # wifi
68 | ("inSSIDer", "[wireless] network detection and location"),
69 | ("Reaver", "[wireless] WPS brute-force"),
70 | ("NetStumbler", "[wireless] Network detection and location, rogue device detection"),
71 | ("WaveStumbler", "[wireless] Network detection and location"),
72 | ("Bluesnarfer", "[wireless] A Bluetooth bluesnarfing Utility"),
73 | ("aircrack-ng", "[wireless] monitoring, replay, deauth attacks, fake APs, testing, cracking"),
74 | ("AirMagnet", "[wireless] wifi traffic analysis"),
75 | ("WifiPilot", "[wireless] wifi traffic sniffing/analysis"),
76 | ("CommView", "[wireless] wifi traffic analysis"),
77 | ("Bluepot", "[bluetooth] bluetooth honeypot"),
78 | ("Bluesniff", "[bluetooth] discovery"),
79 | ("BlueScanner", "[bluetooth] discovery"),
80 | ("Bt (bluetooth) Browser", "[bluetooth] discovery"),
81 | ("Bt Crawler", "[bluetooth] discovery"),
82 | ("Super Bluetooth", "[bluetooth] pentesting"),
83 | ("BlueBugger, BlueDiver", "[bluetooth] pentesting"),
84 | ("JiWire", "[wireless] traffic analysis"),
85 | ("OpenSignal", "[wireless] traffic analysis"),
86 | ("ChopChop", "WEP cracking"),
87 | ("SkyHook", "[wireless] traffic analysis"),
88 | ("Wigle", "[wireless] network detection, location"),
89 | ("WinDump", "[wireless] network sniffing, analysis"),
90 | ("Silica", "[wireless] network sniffing, vulnerabilities"),
91 | ("AirCheck", "[wireless] network sniffing, vulnerabilities"),
92 |
93 | # tunnelling
94 | ("AckCMD", "Ack tunnelling. Command prompt over ACK."),
95 | ("Loki", "ICMP tunneling. Exploiting covert channels"),
96 | ("007Shell", "tunneling, packet crafting"),
97 | ("NCovert", "tunneling, packet crafting"),
98 |
99 | # android
100 | ("DroidSQLi", "[mobile] Android automated sqli tool"),
101 | ("sqlmapchik", "[mobile] sqlmap GUI for mobile"),
102 | ("SQLite Editor", "[mobile] test sqli in web apps"),
103 | ("HTTP Injector", "[mobile] send modified http requests"),
104 | ("HTTP Tool", "send modified http requests"),
105 | ("Psiphon", "[mobile] VPN for tunnelling traffic"),
106 | ("Wifite", "[mobile] automated wireless cracking"),
107 | ("SuperOneClick", "root android"),
108 | ("Superboot", "root android"),
109 | ("AirMon", "[mobile] monitoring, sensing wifi"),
110 | ("WifiKill", "[mobile] scan network and terminate wireless hosts it discovers"),
111 | ("Kismet [android port]", "wifi scanning, detection, sniffing"),
112 | ("KisMAC", "wifi scanning, detection, sniffing, password cracking. Works on MAC."),
113 | ("dSploit Scripts", "[mobile] pentesting suite - map networks, fingerprint hosts, crack logons, sniffing, mitm, etc. Combined with zANTI"),
114 | ("zANTI", "[mobile] network diagnostics and pentests at the push of a button"),
115 | ("Hackode", "[mobile] pentesting suite on mobile"),
116 | ("AppScanner", "[mobile] application vulnerability scanner"),
117 | ("LanDroid", "[mobile] network info collection"),
118 | ("Network Handbook", "[mobile] network troubleshooting"),
119 | ("Fing", "[mobile] network security evaluation, host detection"),
120 | ("Mobile NM", "[mobile] nmap mobile port"),
121 | ("Shares Finder", "[mobile] a real app"),
122 | ("Packet Generator", "[mobile] a real app"),
123 | ("Packet Capture", "[mobile] a real app"),
124 | ("PacketShark", "[mobile] packet sniffing"),
125 | ("Network Discovery", "[mobile] a real app"),
126 | ("PacketShark", "[mobile] a real app"),
127 |
128 | # session hijacking
129 | ("DroidSheep", "[mobile] session hijack. root required"),
130 | ("FaceNiff", "[mobile] session sniffing/hijack"),
131 | ("SSLstrip", "[mobile] session sniffing/hijack"),
132 | ("Hunt", "session sniffing/hijack"),
133 | ("Firesheep", "session hijacking. Cookies inspection"),
134 | ("T-Sight", "session hijacking"),
135 | ("Paros", "session hijacking, more known as a proxy"),
136 | ("Juggernaut", "session hijacking"),
137 |
138 |
139 | ("AnDOSid", "[mobile] real app"),
140 | ("Easy Packet Blaster", "[mobile] DOS, real app"),
141 | ("WPScan", "[mobile] WP vulnerability scanner"),
142 | ("CCTV Scanner", "[mobile] locate CCTV cameras"),
143 | ("NetCut", "[mobile] test security of firewalls"),
144 | ("UPNP Scanner", "[mobile] find plug'n'play devices on the network"),
145 |
146 | # hardware
147 | ("MiniPwner", "[hardware] sniffing wired/wireless, AP, wifi attacks"),
148 | ("USB RubberyDuck", "[hardware] runs script on the system when plugged (game over)"),
149 | ("Wifi pineapple", "[hardware] wifi honeypot, reconnaissance, MITM, tracking, logging, reporting"),
150 | ("LAN Turtle", "[hardware] sniffing, remote accessing"),
151 | ("AirPCAP", "[hardware] USB dongle for deep wifi packet sniffing/analysis"),
152 | ("UberTooth One", "[hardware] bluetooh detection and analysis"),
153 | ("PwnPad & PwnPhone", "[hardware] tablet/phone for pentesting"),
154 | ("KeyGrabber", "[hardware] usb keylogger"),
155 |
156 | # logs
157 | ("LogParserLizard", "Log analyser"),
158 | ("ALog reader", "Android Log analyser"),
159 | ("Syslog", "Logs for mobile also"),
160 |
161 | # SQLi
162 | ("SQLPing", "Finds databases on the newtork. Can crack passwords"),
163 | ("SQLReconn", "Finds databases on the newtork"),
164 | ("SQL Brute", "sql injection automation"),
165 | ("Pangolin", "sql injection automation"),
166 | ("Havij", "sql injection automation"),
167 | ("Absinthe", "sql injection automation"),
168 | ("Bobcat", "sql injection automation"),
169 | ("SQLninja", "sql injection automation"),
170 |
171 |
172 | # other
173 | ("Orbot", "Proxy from TOR project"),
174 | ("Orweb", "Browser working with Orbot"),
175 | ("EliteWrap", "A trojan wrapper/packer"),
176 | ("Saran Wrap", "A trojan packer for BackOrifice"),
177 | ("Stealth Tool", "Allows hiding trojans"),
178 | ("Firekiller 2000", "A trojan packer"),
179 | ("Restorator", "A trojan packer"),
180 | ("Teflon Oil Patch", "A trojan packer"),
181 | ("Trojan Man", "A trojan packer"),
182 | ("Intellius", "People search utility"),
183 | ("ZabaSearch", "People search utility"),
184 | ("LexisNexis", "[reconn] competitive data search"),
185 | ("Spokeo", "[reconn] people search utility"),
186 | ("Wink", "[reconn] people search utility"),
187 | ("JXplorer", "LDAP searching"),
188 | ("PDQDeploy", "Deploy stuff, plant backdoors"),
189 | ("PhoneSweep from Niksun", "Wardialing"),
190 | ("THC-SCAN", "Wardialing"),
191 | ("ToneLoc", "Wardialing"),
192 | ("TeleSweep", "Wardialing"),
193 | ("WarVox", "Wardialing"),
194 | ("SFind", "NTFS Stream finder"),
195 | ("LNS", "NTFS Stream finder"),
196 | ("Tripwire", "File chande detector, NTFS Stream finder"),
197 | ("FakeGINA", "Keylogger"),
198 | ("Spector Pro", "Keylogger"),
199 | ("Ghost Keylogger", "Real app, keylogger"),
200 | ("IKS Software Keylogger", "Real app, keylogger"),
201 | ("WhoReadMe", "Tracks emails, provides OS info"),
202 | ("CANVAS", "Similar to metasploit"),
203 | ("Coret Impact", "Similar to metasploit, pentest automation"),
204 | ("PDQ deploy / dameware / remote exec", "Remote code execution, deployment"),
205 | ("WinZapper", "covering tracks"),
206 | ("Evidence Eliminator", "covering tracks"),
207 | ("elsave", "covering tracks"),
208 |
209 | # system monitoring
210 | ("SysAnalyzer", "Registry / system monitoring"),
211 | ("Tiny Watcher", "Registry / system monitoring"),
212 | ("Active Registry Monitor", "Registry / system monitoring"),
213 | ("Smart Utility", "Processes / system monitoring"),
214 | ("Service Manager Plus", "Processes / system monitoring"),
215 | ("SIGVERIF", "Verify critical files are signed / not altered"),
216 | ("Tripwire", "Integrity verifier"),
217 |
218 | # site rippers
219 | ("BlackWidow", "Site ripper"),
220 | ("HTTrack", "Site ripper"),
221 | ("WebRipper", "Site ripper"),
222 | ("Teleport Pro", "Site ripper"),
223 | ("GNU Wget", "Site ripper"),
224 | ("Backstreet Browser", "Site ripper"),
225 |
226 | # Trojan Creation Tools
227 | ("Let me rule", "[trojan creation]"),
228 | ("RECUB", "[trojan creation]"),
229 | ("Phatbot", "[trojan creation]"),
230 | ("Amitis", "[trojan creation]"),
231 | ("Zombam.B", "[trojan creation]"),
232 | ("Beast", "[trojan creation]"),
233 | ("Hard-disk killer", "[trojan creation]"),
234 |
235 | # cloud
236 | ("SOASTA Cloud Test", "[cloud] functional and performance testing"),
237 | ("Load Storm", "[cloud] web/mobile load testing"),
238 | ("BlazeMeter", "[cloud] load testing"),
239 | ("Nexpose", "[cloud] vulnerability scanning"),
240 | ("AppThwack", "[cloud] simulator for testing android, ios, web apps on actual devices"),
241 |
242 | # bots & ddos
243 | ("BotPlug", "[DOS] Botnet creation"),
244 | ("R-U-Dead-Yet", "[DOS] similar to LOIC"),
245 | ("Shark", "[DOS] Botnet creation"),
246 | ("PoisonIvy", "[DOS] Botnet creation"),
247 | ("LOIC", "[DDOS] Botnet creation. Anonymous group uses it."),
248 | ("Trinoo", "UDP DDOS, can target multiple IPs"),
249 | ("TNF2k (Tribe Network Flood)", "[DDOS] icmp/syn/udp/smurf attacks"),
250 | ("Stacheldraht", "[DDOS] icmp/syn/udp/smurf attacks"),
251 | ("Jolt2", "[DOS] , IP fragmentation attack"),
252 | ("DoSHTTP", "[DOS] Real app. Can target URL"),
253 | ("UDPFlood", "[DOS] Real app"),
254 | ("Targa", "[DOS] Many attacks in one: land, nuke, teardrop, etc"),
255 | ]
256 |
257 |
258 | def askNext(randomIndex):
259 | print(Colours.OKGREEN + "\n\n" + str(PROGRAMS[randomIndex][0]) + Colours.ENDC)
260 |
261 |
262 | def captureAnswer():
263 | return input()
264 |
265 |
266 | def getRealAnswer(randomIndex):
267 | print(str(PROGRAMS[randomIndex][1]) + "\n\n\n----------------------------------------------------")
268 |
269 |
270 | while True:
271 | randomIndex = random.randint(0, PROGRAMS.__len__() - 1)
272 | askNext(randomIndex)
273 | answer = captureAnswer()
274 | getRealAnswer(randomIndex)
275 |
--------------------------------------------------------------------------------
/.idea/workspace.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 |
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 |
73 |
74 |
75 |
76 |
77 |
78 |
79 |
80 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 |
94 |
95 |
96 |
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 |
106 |
107 |
108 |
109 |
110 |
111 |
112 |
113 |
114 |
115 |
116 |
117 |
118 |
119 |
120 |
121 |
122 |
123 |
124 |
125 |
126 |
127 |
128 |
129 |
130 |
131 |
132 |
133 |
134 |
135 |
136 |
137 |
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
152 |
153 |
154 |
155 |
156 |
157 |
158 |
159 |
160 |
161 |
162 |
163 |
164 |
165 |
166 |
167 |
168 |
169 |
170 |
171 |
172 |
173 |
174 |
175 |
176 |
177 |
178 |
179 |
180 |
181 |
182 |
183 |
184 |
185 |
186 |
187 |
188 |
189 |
190 |
191 |
192 |
193 |
194 |
195 |
196 |
197 |
198 |
199 |
200 |
201 |
202 |
203 |
204 |
205 |
206 |
207 |
208 |
209 |
210 |
211 |
212 |
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
226 |
227 |
228 |
229 |
230 |
231 |
232 |
233 |
234 |
235 |
236 |
237 |
238 |
239 |
240 |
241 |
242 |
243 |
244 |
245 |
246 |
247 |
248 |
249 |
250 |
251 |
252 |
253 |
254 |
255 |
256 |
257 |
258 |
259 |
260 |
261 |
262 |
263 |
264 |
265 |
266 | 1446995414434
267 |
268 | 1446995414434
269 |
270 |
271 | 1447026577920
272 |
273 |
274 | 1447026577920
275 |
276 |
277 | 1447027268758
278 |
279 |
280 | 1447027268758
281 |
282 |
283 | 1447027327899
284 |
285 |
286 | 1447027327899
287 |
288 |
289 | 1447027367123
290 |
291 |
292 | 1447027367123
293 |
294 |
295 | 1459703369908
296 |
297 |
298 | 1459703369908
299 |
300 |
301 | 1459703505186
302 |
303 |
304 | 1459703505186
305 |
306 |
307 | 1461011351599
308 |
309 |
310 | 1461011351599
311 |
312 |
313 |
314 |
315 |
316 |
317 |
318 |
319 |
320 |
321 |
322 |
323 |
324 |
325 |
326 |
327 |
328 |
329 |
330 |
331 |
332 |
333 |
334 |
335 |
336 |
337 |
338 |
339 |
340 |
341 |
342 |
343 |
344 |
345 |
346 |
347 |
348 |
349 |
350 |
351 |
352 |
353 |
354 |
355 |
356 |
357 |
358 |
359 |
360 |
361 |
362 |
363 |
364 |
365 |
366 |
367 |
368 |
369 |
370 |
371 |
372 |
373 |
374 |
375 |
376 |
377 |
378 |
379 |
380 |
381 |
382 |
383 |
384 |
385 |
386 |
387 |
388 |
389 |
390 |
391 |
392 |
393 |
394 |
395 |
396 |
397 |
398 |
399 |
400 |
401 |
402 |
403 |
404 |
405 |
406 |
407 |
408 |
409 |
410 |
411 |
412 |
413 |
414 |
415 |
416 |
417 |
418 |
419 |
420 |
421 |
422 |
423 |
424 |
425 |
426 |
427 |
428 |
429 |
430 |
431 |
432 |
433 |
434 |
435 |
436 |
437 |
438 |
439 |
440 |
441 |
442 |
443 |
444 |
445 |
446 |
447 |
448 |
449 |
450 |
451 |
452 |
453 |
454 |
455 |
456 |
457 |
458 |
459 |
460 |
461 |
462 |
463 |
464 |
465 |
466 |
467 |
468 |
469 |
470 |
471 |
472 |
473 |
474 |
475 |
476 |
477 |
478 |
479 |
480 |
481 |
482 |
483 |
484 |
485 |
486 |
487 |
488 |
489 |
490 |
491 |
492 |
493 |
494 |
495 |
496 |
497 |
498 |
499 |
500 |
501 |
502 |
503 |
--------------------------------------------------------------------------------