This task required the user to search for a .txt file. Type the answer into the TryHackMe answer field, then click submit. You will see a blue button labeled Show Split View, click this button. TryHackMe | Ignite - Writeup 27, 2022 from: https://github.com/OJ/gobuster, Preece, C. (2019). Unfamiliar with Yara? The exploit can be found within the pwnkit folder. After running the command we are left with a defanged IP address in the output of the terminal, and the answer to the question. Mar 30, 2022. With sort, the results are sorted alphabetically, those results are then piped through uniq. Bug Bytes #165 - Spring4Shell, CDN WAF bypass & Practical cryptography the .jsp extension in the suffix. How about the Powershell? This is the write up for the room Intro to Python onTryhackmeand it is part of the Web Fundamentals Path. Once you have found it, type the answer into the TryHackMe answer field, and click submit. Spring4Shell, Vulnerability, RCE, Java, CVE-2022-22965 Task 1 - Info Introduction and Deploy Deploy the target machine by clicking the green button at the top of this task! Furthermore, gobuster found no hidden directories (and just spat out error messages): I then turned my attention to the FTP server (again) and tried harder regarding the enumeration of whatever could be downloaded from the system: Running ls -la on the root directory showed a directory called , which I then changed to and then ran the ls -la command again. Next, we need to look at the hash field, use the right arrow key to move to the right till you reached the hashes. We would also like to ask for your consent to use advertisement cookies to broaden our commercial insights. There's a C programming file that we can use to compile and exploit for further escalation. cve-2021-3560 Checking for policykit vulnerability nope, PwnKit 100%[============================================================>] [redacted] in 0.1s, [redacted] (131 KB/s) 'PwnKit' saved [14688/14688], https://github.com/diego-treitos/linux-smart-enumeration, https://www.denofgeek.com/tv/how-veronica-mars-transcended-its-many-genres/, When performing a professional penetration test, be sure to scan all the ports on the target systems. In this room, I will describe my procedure to obtain the necessary flags on this boot2root system. Linux Smart Enumeration. TryHackMe: Pwnkit CVE-2021-4034 Writeup - Threatninja.net .bash_history had an important piece of information: It seems like the drac user was connecting to some MySQL instance and is reusing their username. Interactive lab for exploiting Spring4Shell (CVE-2022-22965) in the Java Spring Framework . TOTAL: CompTIA PenTest+ (Ethical Hacking) + 2 FREE Tests. Once back on VirusTotal, click the RELATIONS tab. A good technical write up can be found here. There are a lot of methods to fix the vulnerability but i will show you one method which you need to execute the command sudo chmod 755 `which pkexec`, The next thing we know, the exploit cannot be executed anymore on the Linux machine, Your email address will not be published. Type the answer into the TryHackMe answer field, and click submit. That is why I added up wild card back and fro the file searching command. 1) and then browsed the FTP server as an anonymous user: It seems like there is nothing interesting on the FTP server, so I then decided to check out the mysterious service on the 62337 port. One company: 262 bugs, 100% acceptance, 2.57 priority, millions of user details saved. Template Link: https://github.com/projectdiscovery/nuclei-templates/blob/master/cves/2022/CVE-2022-22965.yaml. Spring4Shell: CVE-2022-22965 on Tryhackme, Web application security for absolute beginners, Ethical Hacking Offensive Penetration Testing OSCP Prep. Just like DIR in windows and ls in Linux. Once the DETECTION page loads, click the RELATIONS tab. The suggested list at the time of publication is: Confluence is an Apache Tomcat server which has logging located in /opt/atlassian/confluence/logs. Greeting there, welcome to another tryhackme writeup. Intro to Python on Tryhackme - The Dutch Hacker In this post, I would like to share a walkthrough ofthe Pwnkit from Tryhackme, If you want to play this room, you can click over here. From the Zeek room, we know that we want to look at the mime_type field. spring-webmvc or spring-webflux dependency. This is an awesome talk if you want to learn practical cryptography, beyond the easy or unrealistic challenges found in many CTFs. The first series is curated by Mariem, better known as. Once there, you will see the name of the md5 hash field. Spring4Shell: CVE-2022-22965 on Tryhackme - The Dutch Hacker Highlight copy (ctrl + c) and paste (ctrl + v) or type, the answer into the TryHackMe answer field, then click submit. It gave me a bin/bash script to do this, I then asked it for one that doesnt require bin/bash. ]/g', press enter to run the command. Retrieved on Mar. In this module, you will learn about various categories of vulnerabilities, how they can be scored by severity, and how to effectively research them to find publicly written exploits. Getting the VM Started Click the green button labeled Start. Download the file that is attached to this task and save it to a directory where we can read it. Just change the $magicword variable to HTTP and you should get the answer. In this case it is equal, Read all that is in the task and press complete. We can see this by the fact that the application/msword is in this field. PwnKit. Now lets cat the files log file and pipe it through less to see if we can figure out the name of the field we need to use. For all the task in this room Ill be using gedit to create a .py file. Back in the terminal, we want to use the command cat signatures.log | zeek-cut note | uniq -c, press enter after you were done typing the command. Now go to the decompressed Directory and execute the following command to find any file which matches the spring-beans-*.jar pattern. This exploit code was published by @Rezn0k. Atlassian, CVE-2022-26134. Much appreciated. TryHackMe CTF Linux. As usual, we need to access the root directory so that we can able to read the root flag. You just finished the Zeek exercises. GitHub Repository. I decided to use the 49705.py proof of concept offered by searchsploit first by opening up a netcat listener and then launching the exploit: After launching the exploit, I get a shell onto the target system: With a shell, I tried to get the user.txt flag but sadly could not because I did not have the needed read permissions: So, I got a directory listing of what kind of files that I can read from the drac user account with ls -la. Thanks to Journaldev.com for this example of OGNL in use. We can abuse the fact that OGNL can be modified; we can create a payload to test and check for exploits. Spring4Shell: CVE-2022-22965 on Tryhackme. The vulnerability has been dubbed Spring4Shell and assigned a CVE identifier CVE-2022-22965. So lets type out the command cd Desktop/Exercise-Files/, then press enter to run the command. ChatGPT gave me this script echo "IP address" | sed -e 's/\./[.]/g'. Then using the command cd log4j/, to move forward into the log4j directory. Jan 16 -- If you haven't done task 1 & 2 yet, here is the link to my write-up of it: Task 1 Introduction & Task 2 Anomalous DNS. This means it is an string, Read all that is in the task then Install the virtual enviroment by typing. @rootxharsh is part of HTTPVoid, a crew of bug hunters who have been putting out amazing writeups lately like the Ruby Deserialization bug mentioned above.And @InsiderPhD juggles between multiple specialties and often shares cool productivity tips in addition to technical content. Retrieved on Mar. This post is written for those who stuck in the loop of PowerShell and dont rely on this walkthrough so much, somehow you need to learn :). The first section is Contacted Domains, there is one that has a detection. But I will show you the command line way of finding it. In addition, the command and the script within the walkthrough might not be clean or optimize. Firstly, we need to access the machine via ssh service with the provided credentials. To perform a base64 decode via Powershell, use the following command. The first series is curated by Mariem, better known as PentesterLand. Those vulnerabilities have been discovered within all versions of Policy Toolkit or also known as Polkit package. So the command we use is cat dhcp.log | zeek-cut client_addr | uniq | sed -e 's/\./[. You can use thewebsite https://www.urlencoder.org/ to help URL encode your payloads (note that your curl payload will need to end in a trailing / and not $2F): When looking at the server, we can see that it is vulnerable: There are a couple of ways we can exploit this. We take the field and run it through zeek-cut, and pipe the results through uniq. Den of Geek. This CVE uses a vulnerability within the OGNL (Object-Graph Navigation Language) expression language for Java (surprise, surprise … its Java). Actually we can finish all the tasks with one command line but for the sake of the challenge, Im going to write a simple script. To resolve the issue, you need to upgrade your Confluence version. The amazing group of members at Lunasec developed a Java Web Application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965), The Application is dockerized so that it can be easily implemented, The Application was built based on the tutorials provided on the official Documentation of Spring for Form Handling. When it is finished loading it will look like it does below. Use the password provided in the task to unzip it You can use commands like grep to search for HTTP GET requests of payloads that are using Java runtime to execute commands. I then use Python to setup a miniature HTTP service to transfer the readable files onto my AttackBox and then examined their contents with cat. The alternative of Powershell to grep is. The command being cat http.log | zeek-cut user_agent | sort | uniq, after you have finished typing out the command press enter. We can see two ports in our nmap scan but only port 80 is open the other port is filtered so we can ignore it. Follow my twitter for latest update, If you like this post, consider a small donation. You are required to read all the files line by line. First step is to highlight the base64 code, then right-click on it. Spring4Shell: CVE-2022-22965 - THM Walkthroughs - GitBook As a result, it has been spread all around the world. Once less opens the signatures log file, press the right arrow key once. How to manually detect Spring4Shell in ethical hacking engagements. I first downloaded the Linux Smart Enumeration script (Blanco, n.d.) onto the boot2root system and then ran it to find potential candidates for rooting the system. Seriously, dont read the files. WebFlux uses a new router functions feature to apply functional programming to the web layer and bypass declarative controllers and RequestMappings. Congratulations! TryHackMe published a room called IDE, which describes itself as "an easy box to polish your enumeration skills" ( "bluestorm" and "403Exploit", 2021 ). With the same file permissions that drac has, I can now read the user.txt file: The next step is to get the root.txt flag, which can be accomplished by exploiting privilege escalation bugs in the boot2root system. This quick grep search can help you identify if your application is built upon the spring framework, This is not the proper way to make sure you are completely safe against the vulnerability but will help you to have a starting point to get started in investigating this issue. But now that I have valid credentials to get into a Codiad account, I can proceed to exploitation. Head back to the terminal and leave VirusTotal open. The second writeup is about a vulnerability in PHP that allows circumventing filter_var() in some cases. TryHackMe published a room called IDE, which describes itself as an easy box to polish your enumeration skills (bluestorm and 403Exploit, 2021). Finally, use the command ls to list the content of the current directory. Uniq is used to remove any duplicates, then we pipe the results into sed to defang the IP address. Tryhackme. Head back to your terminal in the VM, use the command cat http.log | grep "exe", you will see the name of the malicious file. Today, we are going for the most fundamental room in THM which is the windows Powershell. Be sure to read or download any files where one has read permissions on the remote target system. Spring4Shell & CVE-2022-22963 Java 0-days in Spring. TryHackMe Zeek Exercises Task 3 Phishing, Task 4 Log4J - Medium If you havent done task 1 & 2 yet, here is the link to my write-up of it: Task 1 Introduction & Task 2 Anomalous DNS. After you have run the command you will have the answer in the output of the terminal, type it into the TryHackMe answer field, then click submit. Recently one of the security researchers has built a Nuclei Template to Detect Spring4Shell, This template can be easily run to scan for Spring4Shell on your Networking, routing, or security devices inside your network. This quick grep search can help you identify if your application is built upon the spring framework, This is not the proper way to make sure you are completely safe against the vulnerability but will help you to have a starting point to get started in investigating this issue. Lab Walkthrough - Exploiting Spring4Shell (CVE-2022-22965) In late March 2022, a severe vulnerability was uncovered in Spring applications running Java 9. Time to use some zeek-cut, so press q to exit less. Retrieved on Mar. The command being cat files.log | zeek-cut mime_type md5 | grep "exe", press enter to run the command. Snapsec is a team of security experts specialized in providing pentesting and other security services to secure your online assets. Finally, we can submit the root flag on Tryhackme platform so that we can complete the room. OGNL is used for getting and setting properties of Java objects, amongst many other things. @InsiderPhD and @rootxharsh are two of my favorite hackers. The specific exploit requires the application to run on Tomcat as a WAR deployment. Link: https://tryhackme.com/room/powershell. Add Writeup. Use the command cd .., to back out of the current directory. Learn Python & Ethical Hacking From Scratch, Python Ethical Hacking MASTERCLASS: Zero to Mastery. As we look through the user_agent field we can see some interesting information, so the field we are looking for is user_agent. Use Get-Location to verify whether the file is inside the system or not. Changelog #33 Collaboration makes you better! After the command is finished running, look through the output you should be able to see only one file extension, this is the answer. We use zeek-cut to cut that field out to look at, taking the results for zeek-cut we pipe it through sort. For example, gcc cve-2021-4034-poc.c -o darknite. This room does indeed put your reconnaissance and enumeration skills to the test requiring that the student probes every nook-and-cranny regarding what can be accessed publicly or without credentials. At the top is a box that has some general information about the file. Spring4Shell: Detect and mitigate vulnerabilities in Spring Mostly related to Cybersecurity, Penetration Testing and DFIR. With sort, the results are sorted alphabetically, those results are then piped through uniq. Retrieved on Mar. This was a brief showcase of the CVE-2022-26134 OGNL Injection vulnerability. Next, lets run Zeek against the phishing pcap file. Time to use some command line kung-fu to help slim down the results. As a result, we are getting a root shell-like shown within the screenshot above. The Severity is CRITICAL, Click the following Link to CVSS-v3 to have a indepth look at how this vulnerability effects the CIA of the target system. 28, 2022: https://dirtypipe.cm4all.com/, Lyak, O. Every time, even you are a Linux user. HTB Stories #8: Bug Bounties 101 w/InsiderPhDrootxharsh Talks About Recon, Finding A $50,000 Remote Command Execution in Apple, and more! I got my web browser to visit the service, and got the following (Fig. Since then, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reported "evidence of active exploitation", recording more than 37,000 exploit attempts in the first few days alone. Click on it. Touch is used to create, and with the name on the end this says that this is the name of the file. Initial Access Right-To-Left Override [T1036.002], Insightful tips @SecGus after triaging bugs for 5 months, Git Temporal VSCode extension + @trick3st Inventory = asset timeline tracking, Using Nuclei (with default templates) is a competitive disadvantage, @hacker_s roadmap to develop your technical skills, @Masonhck3571 on Is it tool late to do bug bounty?, 403 bypass by appending unusual characters at the end of file names, BreakingFormation: Technical Vulnerability Walkthrough, LDAP relays for initial foothold in dire situations, 2022 Threat Detection Report by Red Canary, Analyzing the Attack Landscape: Rapid7s 2021 Vulnerability Intelligence Report, Urgent Update For Chrome Fixes Zero Day Under Attack (CVE-2022-1096), URL rendering trick enabled WhatsApp, Signal, iMessage phishing, Finding bugs with Nuclei with PinkDraconian (Robbe Van Roey), Always Be Modeling: How to Threat Model Effectively, tr33s story: from community member to HTB employee. If you are lazy just like me, pipe a measure command. cd to the cloned reporsitory and Build and run the container: The Vulnerable Application will now be available at http://localhost:8080/helloworld/greeting, Now the Copy the exploit code mentioned above and save it as, Now go to your terminal and execute the Exploit on Vulnerable url, On visiting the shell URL which is (http://localhost:8080/shell.jsp?cmd=id Powershell uses Get-Location to list the file and directory. This room does indeed put your reconnaissance and enumeration skills to the test requiring that the student probes every nook-and-cranny regarding what can be . To do this we use the command zeek -r phishing.pcap, and press enter. 3): Judging from the title generated by the HTML tag, this service is running a piece of software called Codiad (n.d.), which is a web-based IDE framework with a small footprint and minimal requirements. The particular version of the web-based IDE is 2.8.4, and searching for an exploit with searchsploit reveals the following remote command execution exploits: Unfortunately these exploits require credentials. 28, 2022 from: https://www.denofgeek.com/tv/how-veronica-mars-transcended-its-many-genres/, Codiad 2.8.4 Remote Code Execution (Authenticated) | multiple/webapps/49705.py, [ERROR] [redacted] [!] <a href="https://pugsandinfosec.com/posts/tryhackme/tryhackme_atlassian_cve/">CTF writeup - Atlassian CVE-2022-26134 // Pugs, Cybersecurity and CTFs</a> Retrieved on Mar. Follow up with the ls command to see the contents of the directory. Type the answer into the TryHackMe answer field, and click submit. Writeups should have a link to TryHackMe and not include any passwords/cracked hashes/flags . Values are input to a web form, where these values will be stored into objects within the application: A web page with questions and a input text field to the right of each question, displaying how values input into a web form can be stored in the back-end using OGNL. Click the green button labeled Start Machine, at the top of Task 1. ]/g', and press enter to run. On the VM, you will see a terminal icon in the middle of the VM screen on the right. document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() ); Proudly powered by WordPress <a href="https://m.youtube.com/watch?v=bo7vh9IydSw">Spring4Shell:CVE 2022-22965 Tryhackme - YouTube</a> After doing some investigating myself, I came to the realization that they want to know what the infected local machine is. A terminal window will pop up, time to move to the Exercise-Files directory. We will use this command in combination with Tab completion. Next we will be decoding them. The following versions of Confluence are vulnerable to this CVE: You can view the NIST entry for CVE-2022-26134 here. If you download it with Windows then make sure your virus scanner is off as it will detect it and delete the file. <a href="https://blog.intigriti.com/2022/03/31/bug-bytes-165-spring4shell-cdn-waf-bypass-practical-cryptography-for-pentesters/"></a> This will open the VM to full screen and make it easier to copy and paste. We take the field and run it through zeek-cut, and pipe the results through grep. Once the log4j file opens in less, looking through the fields along with the field contents we can see some of the base64 we need to decode. On the drop-down menu click copy. 1): an FTP service on port 21, an SSH service on port 22, a web server on port 80 and a mysterious service on port 62337. nmap also identified the probable operating system to be running Linux 3.1. You have completed the Zeek Exercises Room!! Start by using the command zeek -C -r log4shell.pcapng detection-log4j.zeek, press enter to run. Highlight the hash, right-click on the highlighted hash, then click Copy on the drop-down menu. Retrieved on Mar. You can cheat yourself using an online tool but it is meaningless. Exploiting the Java Spring Framework - https://tryhackme.com/room/spring4shell Background In late March 2022, two remote command execution vulnerabilities in the Java Spring framework were made public. Retrieved on Mar. A search field will be in the middle of the page, using the keyboard shortcut ctrl + v to paste the hash in search field and press enter to search the hash. It resulted due to a change was committed to Java 9. The Dirty Pipe Vulnerability documentation. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources. The case was assigned to you. Feel free to consult our. This can be accomplished by adding the, Also, if one has anonymous read access to an FTP server, be sure to enumerate all the directories with the. Once less opens the files log file, press the right arrow key once. Once you reach the Bundled Files section, you will see a column labeled File type. @mubix demonstrates how to identify and decrypt random data in real life, for example during pentesting or bug hunting when you dont even know the type of cryptography used. The case was assigned to you. <a href="https://tryhackme.com/module/vulnerability-research">TryHackMe | Vulnerability Research</a> Use the search option to find them! Then use ls to see the contents of the current directory. Inspect the PCAP and retrieve the artefacts to confirm this alert is a true positive. Time for the command line kung-fu, the command we want to run is cat log4j.log | zeek-cut uri | sort -nr | uniq, after you have done typing the command out press enter to run it. Create a payload to identify what user the application is running as? Get "http://<boot2root ip>/5585": context deadline exceeded (Client.Timeout exceeded while awaiting headers), [+] Please confirm that you have done the two command above [y/n], connect to [<attackbox ip>] from (UNKNOWN) [<boot2root ip>] 52940. | Back at VirusTotal highlight the hash at the top of the page, and press the delete key to remove it from the search field. DO note the IN operator , Read allt hat is in the task and learn the diffence, Notice the around the 65. It doesnt matter the command is upper or lower case, this is Windows OS. Go back to VirusTotal, you already have the exe file hash searched in VirusTotal so we just need to do a little looking for the answer to this question. We can see in the screenshot below that the application is running as the user confluence. Make sure you read the entire description of the challenge, that is informative. Top 5 Must Do Courses. Bypassing CDN WAFs with Alternate Domain Routing & CDN Proxy. Tryhackme. Next, we should be able to use that compiled file to execute where it will give us a root shell. Spring WebFlux is a fully non-blocking, annotation-based web framework built on Project Reactor that makes it possible to build reactive applications on the HTTP layer. ]/g', and press enter to run. Make connection with VPN or use the attackbox on Tryhackme site to connect to the Tryhackme lab environment. With a valid Codiad login at hand, I can now proceed to configure and weaponise a Codiad exploit. Packaged as a traditional WAR (in contrast to a Spring Boot executable jar). First, I must establish the two objectives for this capture the flag: the first is to obtain a user.txt flag with user-level permissions and then to obtain a root.txt flag with root-level permissions. Windows Event Logs on Tryhackme. ) in my case, and passing any command in, Save all your target IPs or Web Addresses in. Type inside the directory where you save the file and in the terminal. In order to exploit this vulnerability within OGNL, we need to make an HTTP GET request and place our payload within the URI. Theres a C programming file that we can use to compile and exploit for further escalation. If you count the number of Signatures here in the note field you will get your answer. <a href="https://deskel.github.io/posts/thm/hacking-with-powershell">THM write-up: Hacking with Powershell | Planet DesKel</a> They may also be reusing their password, so I decided to log into the drac account via SSH using the MySQL password, and. Inside this box, under the hash, you will see the name of the file, and thus the answer to the question. @httpvoid0x2fs latest writeup is a deep dive into insecure deserialization in Ruby/Rails. Referencing the rooms name, I presumed that this default password was on the Codio web application running on the 62337 port. After running the command we are left with a defanged domain in the output of the terminal, and the answer to the question. Unauthenticated Remote Code Execution in Cisco Nexus Dashboard Fabric Controller (formerly DCNM), HTML parser bug triggers Chromium XSS security flaw, When Equal is Not, Another WebView Takeover Story, Able to steal bearer token from deep link. We're certain that malicious class loading payloads will appear quickly. So to get the hash that we need we can use some command line kung-fu. I have decided to clone to the repository using git for this room. </p> <p><a href="http://hypercareme.com/8k35ze/forecasting-models-in-excel">Forecasting Models In Excel</a>, <a href="http://hypercareme.com/8k35ze/fake-shopping-websites-list">Fake Shopping Websites List</a>, <a href="http://hypercareme.com/8k35ze/riemot-sheepskin-insoles">Riemot Sheepskin Insoles</a>, <a href="http://hypercareme.com/8k35ze/technical-cofounder-jobs">Technical Cofounder Jobs</a>, <a href="http://hypercareme.com/8k35ze/sitemap_s.html">Articles S</a><br> </p> </div> <!-- .entry-content --> <div class="et_post_meta_wrapper"> <!-- You can start editing here. --> <section id="comment-wrap"> <div id="comment-section" class="nocomments"> <!-- If comments are open, but there are no comments. --> </div> <div id="respond" class="comment-respond"> <h3 id="reply-title" class="comment-reply-title">spring4shell tryhackme writeup<span>Submit a Comment</span> <small><a rel="nofollow" id="cancel-comment-reply-link" href="http://hypercareme.com/8k35ze/participant-recruitment-agencies" style="display:none;">participant recruitment agencies</a></small></h3> </div><!-- #respond --> </section> </div> <!-- .et_post_meta_wrapper --> </article> <!-- .et_pb_post --> </div> <!-- #left-area --> <div id="sidebar"> <div id="search-2" class="et_pb_widget widget_search"></div> <!-- end .et_pb_widget --><div id="categories-2" class="et_pb_widget widget_categories"><h4 class="widgettitle">spring4shell tryhackme writeup</h4> <ul> <li class="cat-item cat-item-40"><a href="http://hypercareme.com/8k35ze/omega-sinfonia-yarn-substitute">omega sinfonia yarn substitute</a> </li> <li class="cat-item cat-item-39"><a href="http://hypercareme.com/8k35ze/paradox-hotel-santa-cruz">paradox hotel santa cruz</a> </li> <li class="cat-item cat-item-1"><a href="http://hypercareme.com/8k35ze/polo-ralph-lauren-campaign">polo ralph lauren campaign</a> </li> </ul> </div> <!-- end .et_pb_widget --> </div> <!-- end #sidebar --> </div> <!-- #content-area --> </div> <!-- .container --> </div> <!-- #main-content --> <footer id="main-footer"> <div id="footer-bottom"> <div class="container clearfix"> <ul class="et-social-icons"> <li class="et-social-icon et-social-facebook"> <a href="#" class="icon"> <span>Facebook</span> </a> </li> <li class="et-social-icon et-social-twitter"> <a href="#" class="icon"> <span>Twitter</span> </a> </li> <li class="et-social-icon et-social-google-plus"> <a href="#" class="icon"> <span>Google</span> </a> </li> <li class="et-social-icon et-social-instagram"> <a href="#" class="icon"> <span>Instagram</span> </a> </li> <li class="et-social-icon et-social-rss"> <a href="http://hypercareme.com/8k35ze/is-cerave-discontinuing-the-micellar-water" class="icon">is cerave discontinuing the micellar water<span>RSS</span> </a> </li> </ul><p id="footer-info">Designed by <a href="http://hypercareme.com/8k35ze/is-olaplex-safe-while-breastfeeding" title="Premium Themes">is olaplex safe while breastfeeding</a> | Powered by <a href="http://hypercareme.com/8k35ze/cheap-used-cars-for-sale-by-owners"></a></p> </div> <!-- .container --> </div> </footer> <!-- #main-footer --> </div> <!-- #et-main-area --> </div> <!-- #page-container --> <script type="text/javascript"> </script> <script type="text/javascript"> var c = document.body.className; c = c.replace(/woocommerce-no-js/, 'woocommerce-js'); document.body.className = c; </script> <script type="text/javascript" src="https://s0.wp.com/wp-content/js/devicepx-jetpack.js?ver=202321"></script> <script type="text/javascript" src="https://c0.wp.com/p/woocommerce/3.6.7/assets/js/jquery-blockui/jquery.blockUI.min.js"></script> <script type="text/javascript"> /* <![CDATA[ */ var wc_add_to_cart_params = {"ajax_url":"\/wp-admin\/admin-ajax.php","wc_ajax_url":"\/?wc-ajax=%%endpoint%%","i18n_view_cart":"View cart","cart_url":"http:\/\/hypercareme.com\/?page_id=219010","is_cart":"","cart_redirect_after_add":"no"}; /* ]]> */ </script> <script type="text/javascript" src="https://c0.wp.com/p/woocommerce/3.6.7/assets/js/frontend/add-to-cart.min.js"></script> <script type="text/javascript" src="https://c0.wp.com/p/woocommerce/3.6.7/assets/js/js-cookie/js.cookie.min.js"></script> <script type="text/javascript"> /* <![CDATA[ */ var woocommerce_params = {"ajax_url":"\/wp-admin\/admin-ajax.php","wc_ajax_url":"\/?wc-ajax=%%endpoint%%"}; /* ]]> */ </script> <script type="text/javascript" src="https://c0.wp.com/p/woocommerce/3.6.7/assets/js/frontend/woocommerce.min.js"></script> <script type="text/javascript"> /* <![CDATA[ */ var wc_cart_fragments_params = {"ajax_url":"\/wp-admin\/admin-ajax.php","wc_ajax_url":"\/?wc-ajax=%%endpoint%%","cart_hash_key":"wc_cart_hash_4be7f35a92063fcce6c7f3d6c643fcbd","fragment_name":"wc_fragments_4be7f35a92063fcce6c7f3d6c643fcbd","request_timeout":"5000"}; /* ]]> */ </script> <script type="text/javascript" src="https://c0.wp.com/p/woocommerce/3.6.7/assets/js/frontend/cart-fragments.min.js"></script> <script type="text/javascript"> jQuery( 'body' ).bind( 'wc_fragments_refreshed', function() { jQuery( 'body' ).trigger( 'jetpack-lazy-images-load' ); } ); </script> <script type="text/javascript"> /* <![CDATA[ */ var mailchimp_public_data = {"site_url":"http:\/\/hypercareme.com","ajax_url":"http:\/\/hypercareme.com\/wp-admin\/admin-ajax.php","queue_url":"http:\/\/hypercareme.com\/index.php?rest_route=\/mailchimp-for-woocommerce\/v1\/queue\/work","queue_should_fire":""}; /* ]]> */ </script> <script type="text/javascript" src="http://hypercareme.com/wp-content/plugins/mailchimp-for-woocommerce/public/js/mailchimp-woocommerce-public.min.js?ver=2.1.17"></script> <script type="text/javascript" src="https://c0.wp.com/c/5.2.18/wp-includes/js/comment-reply.min.js"></script> <script type="text/javascript"> /* <![CDATA[ */ var DIVI = {"item_count":"%d Item","items_count":"%d Items"}; var et_shortcodes_strings = {"previous":"Previous","next":"Next"}; var et_pb_custom = {"ajaxurl":"http:\/\/hypercareme.com\/wp-admin\/admin-ajax.php","images_uri":"http:\/\/hypercareme.com\/wp-content\/themes\/Divi\/images","builder_images_uri":"http:\/\/hypercareme.com\/wp-content\/themes\/Divi\/includes\/builder\/images","et_frontend_nonce":"58bfb9b323","subscription_failed":"Please, check the fields below to make sure you entered the correct information.","et_ab_log_nonce":"489cafe861","fill_message":"Please, fill in the following fields:","contact_error_message":"Please, fix the following errors:","invalid":"Invalid email","captcha":"Captcha","prev":"Prev","previous":"Previous","next":"Next","wrong_captcha":"You entered the wrong number in captcha.","ignore_waypoints":"no","is_divi_theme_used":"1","widget_search_selector":".widget_search","is_ab_testing_active":"","page_id":"239975","unique_test_id":"","ab_bounce_rate":"5","is_cache_plugin_active":"no","is_shortcode_tracking":"","tinymce_uri":""}; var et_pb_box_shadow_elements = []; /* ]]> */ </script> <script type="text/javascript" src="http://hypercareme.com/wp-content/themes/Divi/js/custom.min.js?ver=3.25.3"></script> <script type="text/javascript" src="http://hypercareme.com/wp-content/themes/Divi/core/admin/js/common.js?ver=3.25.3"></script> <script type="text/javascript" src="https://c0.wp.com/c/5.2.18/wp-includes/js/wp-embed.min.js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202321.js" async="async" defer></script> <script type="text/javascript"> _stq = window._stq || []; _stq.push([ 'view', {v:'ext',j:'1:7.4.2',blog:'163143035',post:'239975',tz:'2',srv:'hypercareme.com'} ]); _stq.push([ 'clickTrackerInit', '163143035', '239975' ]); </script> </body> </html>