{"id":327,"date":"2023-09-01T22:13:01","date_gmt":"2023-09-01T22:13:01","guid":{"rendered":"https:\/\/infosecjake.net\/?p=327"},"modified":"2023-09-02T01:43:12","modified_gmt":"2023-09-02T01:43:12","slug":"tryhackme-anonymous-ctf-walkthrough","status":"publish","type":"post","link":"https:\/\/infosecjake.net\/?p=327","title":{"rendered":"Tryhackme &#8211; Anonymous CTF Walkthrough"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"339\" height=\"339\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image.png\" alt=\"\" class=\"wp-image-328\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image.png 339w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-300x300.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-150x150.png 150w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-50x50.png 50w\" sizes=\"auto, (max-width: 339px) 100vw, 339px\" \/><\/figure>\n<\/div>\n\n\n<p>I love CTF boxes that run a mixture of different exploits to gain an initial foothold and then require you to dig further to find a good privilege escalation path. These types of CTF&#8217;s are very useful if you&#8217;re preparing for the OSCP or CPENT exams. Hands-on privilege escalation and exploit research is a fundamental skill when going up against those types of certifications. Let&#8217;s get started!<\/p>\n\n\n\n<p>First, let\u2019s start by booting our Kali VM, connecting to the VPN for TryHackMe and then joining the room and starting up the box. After all that is done, we can start by scanning to see what services and ports are open on the machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"575\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-1.png\" alt=\"nmap results\" class=\"wp-image-329\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-1.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-1-300x177.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-1-768x453.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>So, we have 4 ports open. With FTP, SSH, and SMB services running. Right off the bat, we can answer questions 1, 2, and 3 with our nmap output.<\/p>\n\n\n\n<p>So, we can take a couple approaches to this box. We can attempt to attack FTP or SSH services by brute forcing usernames and passwords, searching for an exploit within Metasploit, or trying default creds. Alternatively, we can take a look at this SMB service and see if there are any shares that we may be able to get to.<\/p>\n\n\n\n<p>Considering that question 4 asks about a share, I\u2019m going to take a look at this first.<\/p>\n\n\n\n<p>This time, we ran an nmap script specifically for smb discovery.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"558\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-2.png\" alt=\"SMB scan\" class=\"wp-image-330\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-2.png 930w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-2-300x180.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-2-768x461.png 768w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/figure>\n\n\n\n<p>Additionally, running nmap with the -sC options will give us additional information on the SMB service and the FTP service as well.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"428\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-3.png\" alt=\"nmap -sC\" class=\"wp-image-331\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-3.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-3-300x132.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-3-768x337.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"374\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-4.png\" alt=\"nmap -sC\" class=\"wp-image-332\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-4.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-4-300x115.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-4-768x295.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>One thing that immediately sticks out about the SMB service is that signing is disabled. This is dangerous and perhaps something that we can exploit.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"684\" height=\"38\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-5.png\" alt=\"smb signing disabled\" class=\"wp-image-333\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-5.png 684w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-5-300x17.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-5-666x38.png 666w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/figure>\n\n\n\n<p>So, let\u2019s try some quick brute forcing on SMB.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"301\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-6.png\" alt=\"hydra brute force\" class=\"wp-image-334\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-6.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-6-300x93.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-6-768x237.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Rather quickly we can see that Anonymous access appears to be enabled. So, I\u2019ve canceled Hydra. Let\u2019s run smbmap instead with username \u2018Anonymous\u2019.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"114\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-7.png\" alt=\"smb shares\" class=\"wp-image-335\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-7.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-7-300x35.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-7-768x90.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>It looks like we do have access to the \u2018pics\u2019 share. This is also the answer to question 4.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"196\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-8.png\" alt=\"smbclient connection\" class=\"wp-image-336\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-8.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-8-300x60.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-8-768x154.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Just a couple of pictures. I did try to view them but this looks like it\u2019s a dead end. So, let\u2019s circle back to the FTP service.<\/p>\n\n\n\n<p>As noted previously with the -sC options on our nmap scan, anonymous access is allowed through FTP as well. In fact, nmap connected anonymously to the ftp service. So, let\u2019s try that.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"816\" height=\"384\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-9.png\" alt=\"ftp connection\" class=\"wp-image-337\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-9.png 816w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-9-300x141.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-9-768x361.png 768w\" sizes=\"auto, (max-width: 816px) 100vw, 816px\" \/><\/figure>\n\n\n\n<p>No password needed, and we have a scripts folder.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"934\" height=\"153\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-10.png\" alt=\"Directory listing\" class=\"wp-image-338\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-10.png 934w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-10-300x49.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-10-768x126.png 768w\" sizes=\"auto, (max-width: 934px) 100vw, 934px\" \/><\/figure>\n\n\n\n<p>A few files here. I looked at the log file and the txt file but nothing interesting. However, we do have the clean.sh shell script.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"239\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-11.png\" alt=\"clean.sh file\" class=\"wp-image-339\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-11.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-11-300x74.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-11-768x188.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>It appears that this file cleans up tmp files and writes the output to the removed_files.log file. The script is of no use to us\u2026however, it is executable. Could we write to it and create a reverse shell back to our Kali VM? Let\u2019s try it!<\/p>\n\n\n\n<p>First, let\u2019s start a listener on our Kali VM.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"194\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-12.png\" alt=\"netcat listener\" class=\"wp-image-340\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-12.png 508w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-12-300x115.png 300w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/figure>\n\n\n\n<p>Listener is started, now let\u2019s find a good reverse shell to insert.<\/p>\n\n\n\n<p>We are going to use Pentestmonkey\u2019s reverse shell cheat sheet linked here <a href=\"https:\/\/pentestmonkey.net\/cheat-sheet\/shells\/reverse-shell-cheat-sheet\">Reverse Shell Cheat Sheet | pentestmonkey<\/a>. We will try with the top script for a Bash reverse shell.<\/p>\n\n\n\n<p>So, I created a new clean.sh file on my Kali VM with the Bash reverse shell script. I then uploaded it to the \/scripts folder on the victim machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"190\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-13.png\" alt=\"bash reverse shell\" class=\"wp-image-341\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-13.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-13-300x58.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-13-768x150.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Now, let\u2019s see if we get a shell.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"156\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-14.png\" alt=\"reverse shell\" class=\"wp-image-342\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-14.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-14-300x48.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-14-768x123.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>We have a shell!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"589\" height=\"208\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-15.png\" alt=\"user flag\" class=\"wp-image-343\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-15.png 589w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-15-300x106.png 300w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/figure>\n\n\n\n<p>And we have the user flag now.<\/p>\n\n\n\n<p>Now, we need to get root. There\u2019s a few ways we can go about this. First, let\u2019s just try a \u2018sudo su \u2013\u2018 and see what happens.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"105\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-16.png\" alt=\"sudo su -\" class=\"wp-image-344\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-16.png 728w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-16-300x43.png 300w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><\/figure>\n\n\n\n<p>Ok, no winner there.<\/p>\n\n\n\n<p>Alright, let\u2019s use a neat little tool called linpeas. Linpeas, linux privilege escalation tool, is a great tool to run on a victim machine to find suitable ways to escalate your privileges to root. First, we\u2019ll need to have the script set in a specific folder. I have a folder called pywww on my Kali desktop that I use. From there, we\u2019ll run a simple http server in that folder to host the contents. This will allow us to curl and grab that script from our victim machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"184\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-17.png\" alt=\"Simple http server\" class=\"wp-image-345\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-17.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-17-300x57.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-17-768x145.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>In the above screenshot you can see our victim machine requesting linpeas.sh.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"544\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-18.png\" alt=\"linpeas script\" class=\"wp-image-346\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-18.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-18-300x167.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-18-768x429.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>And here is the view from our shell we got previously. We did a curl request to get the linpeas.sh file and it auto-executed.<br><br>Scrolling through the results we see that the ftp scripts folder has root privileges, but we also see the below.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"752\" height=\"72\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-19.png\" alt=\"usr\/bin\/env PE\" class=\"wp-image-347\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-19.png 752w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-19-300x29.png 300w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><\/figure>\n\n\n\n<p>\/user\/bin\/env is showing as a high chance for gaining root privileges.<\/p>\n\n\n\n<p>Here is the color coded legend for linpeas. Just to understand what this color means.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"168\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-20.png\" alt=\"linpeas legend\" class=\"wp-image-348\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-20.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-20-300x52.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-20-768x132.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>So, with it being a high chance at escalating our privileges. Let\u2019s check it out.<\/p>\n\n\n\n<p>A quick google search of \u201c\/usr\/bin\/env privilege escalation\u201d leads me to a GTFO bins page, <a href=\"https:\/\/gtfobins.github.io\/gtfobins\/env\/\">env | GTFOBins<\/a><\/p>\n\n\n\n<p>So, let\u2019s try it out.<\/p>\n\n\n\n<p>After a couple failed attempts, it works!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"606\" height=\"280\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-21.png\" alt=\"privilege escalation\" class=\"wp-image-349\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-21.png 606w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-21-300x139.png 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/figure>\n\n\n\n<p>We now have root!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"463\" height=\"150\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-22.png\" alt=\"root flag\" class=\"wp-image-350\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-22.png 463w, https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image-22-300x97.png 300w\" sizes=\"auto, (max-width: 463px) 100vw, 463px\" \/><\/figure>\n\n\n\n<p>And with that, we have the flag.<\/p>\n\n\n\n<p>This is a great box that I would highly encourage you to try out. I love the usage of local executable files that you can take over to get an initial shell as well as privilege escalation techniques that you can employ to get root. These types of techniques will come in very handy for exams like the OSCP and CPENT.<br><br>Hope you enjoyed it!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I love CTF boxes that run a mixture of different exploits to gain an initial foothold and then require you<\/p>\n<p><a href=\"https:\/\/infosecjake.net\/?p=327\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\">Tryhackme &#8211; Anonymous CTF Walkthrough<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":328,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[31],"tags":[33,32,34],"class_list":["post-327","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ctf-challenge-walkthroughs","tag-ctf","tag-tryhackme","tag-walkthrough"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/infosecjake.net\/wp-content\/uploads\/2023\/09\/image.png","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=327"}],"version-history":[{"count":3,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/327\/revisions"}],"predecessor-version":[{"id":354,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/327\/revisions\/354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/media\/328"}],"wp:attachment":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}