{"id":575,"date":"2025-09-01T01:52:20","date_gmt":"2025-09-01T01:52:20","guid":{"rendered":"https:\/\/infosecjake.net\/?p=575"},"modified":"2025-09-01T01:52:23","modified_gmt":"2025-09-01T01:52:23","slug":"hackthebox-dog-walkthrough","status":"publish","type":"post","link":"https:\/\/infosecjake.net\/?p=575","title":{"rendered":"HackTheBox &#8211; Dog Walkthrough"},"content":{"rendered":"\n<p>Back again with another box from HackTheBox. This time, a box called Dog. Let\u2019s see if we can get Fido here to give us the flags we need.<\/p>\n\n\n\n<p>First off, as usual, we start with an NMAP scan.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"494\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image.png\" alt=\"nmap scan\" class=\"wp-image-576\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-300x152.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-768x389.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"469\" height=\"113\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-2.png\" alt=\"Adding box\/ip to etc\/hosts\" class=\"wp-image-578\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-2.png 469w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-2-300x72.png 300w\" sizes=\"auto, (max-width: 469px) 100vw, 469px\" \/><\/figure>\n\n\n\n<p>Above, we also add the hostname &amp; ip address to our \/etc\/hosts\/ file for easy browsing.<\/p>\n\n\n\n<p>I also ran a different NMAP scan, this time doing some further enumeration. As we can see, there appears to be a git repo hosted on the site and several things in the robots.txt file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"602\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-3.png\" alt=\"alt scan\" class=\"wp-image-579\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-3.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-3-300x185.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-3-768x474.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>So, it looks like we have a web application running on port 80 and an SSH server on port 22. Let\u2019s add the IP and host name to our \/etc\/hosts file and browse the website.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"592\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-4.png\" alt=\"website view\n\" class=\"wp-image-580\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-4.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-4-300x182.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-4-768x466.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Quickly browsing the site we see there is a login page, which shows to be powered by Backdrop CMS. So, let\u2019s do some digging into Backdrop CMS and see if there\u2019s any potential vulnerabilities we can exploit to get into the site.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"652\" height=\"900\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-5.png\" alt=\"CMS login page\" class=\"wp-image-581\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-5.png 652w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-5-217x300.png 217w\" sizes=\"auto, (max-width: 652px) 100vw, 652px\" \/><\/figure>\n\n\n\n<p>So, after finding the login page and looking up some known vulnerabilities for Backdrop CMS, I also spent some time digging through the items in the robots.txt file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"348\" height=\"769\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-6.png\" alt=\"robots.txt\" class=\"wp-image-582\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-6.png 348w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-6-136x300.png 136w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/figure>\n\n\n\n<p>One of the things I was also able to find outside of this was a git repository, as shown below.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"806\" height=\"877\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-7.png\" alt=\"git repo\" class=\"wp-image-583\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-7.png 806w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-7-276x300.png 276w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-7-768x836.png 768w\" sizes=\"auto, (max-width: 806px) 100vw, 806px\" \/><\/figure>\n\n\n\n<p>So, with this repo being open, I downloaded it to my VM and spent some time digging through it for anything interesting. FYI \u2013 I created a folder called dog on my desktop to store all relevant files from this machine. Good place to put the git repo.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"681\" height=\"245\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-8.png\" alt=\"mirroring repo\" class=\"wp-image-584\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-8.png 681w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-8-300x108.png 300w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"599\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-9.png\" alt=\"Repo files\" class=\"wp-image-585\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-9.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-9-300x184.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-9-768x472.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>After spending some time, and re-downloading the git repository, I was able to find a settings.php file that contained a password.<\/p>\n\n\n\n<p>mysql:\/\/root:BackDropJ2024DS2024@127.0.0.1\/backdrop<\/p>\n\n\n\n<p>Of course, I tried to login to SSH with root and this password, but that did not work. So, I then dug a bit deeper and noticed on one of the JSON files there was a username. <a href=\"mailto:Tiffany@dog.htb\">Tiffany@dog.htb<\/a>.<\/p>\n\n\n\n<p>Perhaps this is the username &amp; password for the login page on the website?<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"938\" height=\"202\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-10.png\" alt=\"logged in as Tiffany\" class=\"wp-image-586\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-10.png 938w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-10-300x65.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-10-768x165.png 768w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/figure>\n\n\n\n<p>Bingo, logged in as Tiffany!<\/p>\n\n\n\n<p>Now that we are in, let\u2019s see what kind of exploits Backdrop has. For this, I\u2019m going to do some searching on exploit DB.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.exploit-db.com\/exploits\/52021\">https:\/\/www.exploit-db.com\/exploits\/52021<\/a><\/p>\n\n\n\n<p>Went to exploit db and just searched for Backdrop and found the RCE vuln listed above. So, let\u2019s see if we can use this.<\/p>\n\n\n\n<p>Downloaded the exploit above and ran it as shown below.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"159\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-11.png\" alt=\"exploit usage\" class=\"wp-image-587\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-11.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-11-300x49.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-11-768x125.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>However, on the \u2018install modules\u2019 section, noting that we are not allowed to install zip files.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"327\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-12.png\" alt=\"file issues\" class=\"wp-image-588\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-12.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-12-300x101.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-12-768x258.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>So, we must unpack and repack as a tar file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"542\" height=\"152\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-13.png\" alt=\"tar the file\" class=\"wp-image-589\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-13.png 542w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-13-300x84.png 300w\" sizes=\"auto, (max-width: 542px) 100vw, 542px\" \/><\/figure>\n\n\n\n<p>Now that we have our file packaged correctly, let\u2019s upload it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"423\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-14.png\" alt=\"Adding file\" class=\"wp-image-590\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-14.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-14-300x130.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-14-768x333.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Finally! Now, we just follow what the script said to do and visit the URL where it will trigger the RCE shell.<\/p>\n\n\n\n<p>NOTE: <strong>Do not<\/strong> navigate away from the page above. Open the exploit in a new page. I had to re-install because it didn\u2019t work when I navigated away from the success page above.<\/p>\n\n\n\n<p>Now, we have a command prompt when we visit the URL the script noted.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"230\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-15.png\" alt=\"Exe command prompt\" class=\"wp-image-591\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-15.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-15-300x71.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-15-768x181.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Let\u2019s see if we can find any users that have\u00a0 bash access.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"156\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-16.png\" alt=\"Users with bash access\" class=\"wp-image-592\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-16.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-16-300x48.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-16-768x123.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>I ran cat \/etc\/passwd | grep bash and found a user by the name of johncusack and one by jobert.<\/p>\n\n\n\n<p>NOTE: I had to keep re-uploading the exploit as it would sporadically stop working. This took a bit of time.<\/p>\n\n\n\n<p>Let\u2019s try SSH with johncusack and the original password we found in the git.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"720\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-17.png\" alt=\"user access\" class=\"wp-image-593\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-17.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-17-300x222.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-17-768x567.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Well then, I really wasn\u2019t expecting that to work. Now for the user flag!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"503\" height=\"86\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-18.png\" alt=\"user flag\" class=\"wp-image-594\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-18.png 503w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-18-300x51.png 300w\" sizes=\"auto, (max-width: 503px) 100vw, 503px\" \/><\/figure>\n\n\n\n<p>For privilege escalation, I did a quick check of \u2018sudo -l\u2019 to see what sudo permissions this user has.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"239\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-19.png\" alt=\"sudo -l\" class=\"wp-image-595\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-19.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-19-300x74.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-19-768x188.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Let\u2019s have a look at this bee file.<\/p>\n\n\n\n<p>(just kidding\u2026the box stopped responding on me and I had to restart it\u2026oof)<\/p>\n\n\n\n<p>Ok, back up. Did a bit of research and found this github about Bee. <a href=\"https:\/\/github.com\/backdrop-contrib\/bee\">https:\/\/github.com\/backdrop-contrib\/bee<\/a><\/p>\n\n\n\n<p>Bee is a CLI for Backdrop CMS. I ran Bee and looked at the available command line options as well.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"423\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-20.png\" alt=\"Bee\" class=\"wp-image-596\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-20.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-20-300x130.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-20-768x333.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Down at the very bottom is an option \u2018ev\u2019. So, let\u2019s give that a try and see if we can access the root flag.<\/p>\n\n\n\n<p>NOTE: You HAVE to be in the \/var\/www\/html directory as I\u2019m assuming it\u2019s due to Backdrop running there. Otherwise you\u2019ll get a lovely error that the \u2018required bootstrap level for \u2018eval\u2019 is not ready\u2019.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"959\" height=\"97\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-21.png\" alt=\"Error message\" class=\"wp-image-597\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-21.png 959w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-21-300x30.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-21-768x78.png 768w\" sizes=\"auto, (max-width: 959px) 100vw, 959px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"81\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-22.png\" alt=\"Root flag\" class=\"wp-image-598\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-22.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-22-300x25.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/image-22-768x64.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>And we have the root flag! Ideally, we would want to login as root. But, that should be easy to do from here by either changing root password or grabbing the hash and cracking it.<\/p>\n\n\n\n<p>Hope you enjoyed this one! Had several issues throughout this one that made it drag on longer than it should have, but we got it done and that\u2019s all that matters.<\/p>\n\n\n\n<p>Remember, it\u2019s all about persistence. I may not detail it as well as I should but these can take several hours or more to work through, depending on how hard they are. While the walkthroughs are short, the actual process of doing them isn\u2019t. So, don\u2019t feel overwhelmed or that you can\u2019t do it, take a break, gather your thoughts, and hit it again. You got this!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back again with another box from HackTheBox. This time, a box called Dog. Let\u2019s see if we can get Fido<\/p>\n<p><a href=\"https:\/\/infosecjake.net\/?p=575\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\">HackTheBox &#8211; Dog Walkthrough<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":600,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[31],"tags":[33,34],"class_list":["post-575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ctf-challenge-walkthroughs","tag-ctf","tag-walkthrough"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/09\/Dog.png","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=575"}],"version-history":[{"count":1,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/575\/revisions"}],"predecessor-version":[{"id":599,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/575\/revisions\/599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/media\/600"}],"wp:attachment":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}