{"id":277,"date":"2022-02-20T09:48:31","date_gmt":"2022-02-20T09:48:31","guid":{"rendered":"https:\/\/www.cybersecuritynotepad.com\/?p=277"},"modified":"2022-02-20T10:05:38","modified_gmt":"2022-02-20T10:05:38","slug":"targeted-process-injection-linux","status":"publish","type":"post","link":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/","title":{"rendered":"Targeted process injection &#8211; Linux"},"content":{"rendered":"\n<p>In this post I will cover briefly how to modify the memory of running process in real-time.  The example chosen for this demonstration is simple. The main purpose is to show the approach rather than make it look sophisticated. However, you can take it as far as you wish, depending on your objectives. In future posts, I will cover additional scenarios and also will add more weaponised examples.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>One important question that needs answering is why would somebody want to directly inject information\/data into the running process. Imagine the following scenario, post compromise you have SSH access to the Linux server. At this stage you can escalate privileges or stay on the system as low privileged user. For privilege escalation traditional methods such as misconfigured permissions, cron jobs, unpatched software and other issues could be used. Those techniques and methods are well known to offensive, defensive and forensic teams. As soon as you follow the usual script, your presence will be detected and the access may be removed. In those types of scenarios, you can be creative and that&#8217;s when this technique may come in handy.  <\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>For the demo, I used the &#8220;nano&#8221; text editor. The user &#8220;user2&#8221; who is a standard system user with limited privileges opened a text file &#8220;myfile.txt&#8221; and started typing text into the file just like a typical user would. <\/p>\n\n\n\n<div class=\"wp-block-image is-style-twentytwentyone-border\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1-1024x490.png\" alt=\"\" class=\"wp-image-290\" width=\"768\" height=\"368\" srcset=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1-1024x490.png 1024w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1-300x143.png 300w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1-768x367.png 768w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1-1536x735.png 1536w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1.png 1562w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure><\/div>\n\n\n\n<p>As you can see the text &#8220;CHANGEME&#8221; text appears in the left terminal and in the right terminal the process 1227 is attached to the &#8220;gdb&#8221; debugger. <\/p>\n\n\n\n<p>Next we identify the area where the text is in the process memory. In this case it is on the heap. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized is-style-twentytwentyone-border\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d2c-1024x486.png\" alt=\"\" class=\"wp-image-279\" width=\"768\" height=\"365\" srcset=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d2c-1024x486.png 1024w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d2c-300x142.png 300w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d2c-768x364.png 768w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d2c-1536x729.png 1536w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d2c.png 1564w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>We are only interested in the heap because this is where the text is that the user &#8220;user2&#8221; wrote within &#8220;nano&#8221; text editor. <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>heap start address 0x56399993e000 \nheap end address 0x563999a04000<\/code><\/pre>\n\n\n\n<p>When searching memory it is never easy to find specific information without some trial and error approach. In this case, after spending a while examining the memory I knew immediately where I should look for the desired information. I simplified the process for you so that you can see the results rather than trying to find the needle in the haystack.  As you can see now, I found the memory address where the string &#8220;CHANGEME&#8221; sits and replaced it with the string &#8220;LIVEDEMO&#8221;. After completing that task I detached the process 1227 from the debugger. <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>0x5639999dea10 = CHANGEME (string)<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large is-resized is-style-twentytwentyone-border\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d3c-1024x494.png\" alt=\"\" class=\"wp-image-280\" width=\"768\" height=\"371\" srcset=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d3c-1024x494.png 1024w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d3c-300x145.png 300w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d3c-768x370.png 768w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d3c-1536x741.png 1536w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d3c.png 1564w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>Now you can see above that in the left terminal, the &#8220;CHANGEME&#8221; string is still there as before. It looks to the user &#8220;user2&#8221; as if nothing has changed because the text has not been refreshed. However, in memory the change has been made and, if the user saved the file or even copied the first line &#8220;CHANGEME&#8221; into the clipboard they would get &#8220;LIVEDEMO&#8221; string when pasting from the clipboard or saving the file &#8220;myfile.txt&#8221;.  I have added short descriptions to the left terminal so that you can see what happened. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized is-style-twentytwentyone-border\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d4c-1024x496.png\" alt=\"\" class=\"wp-image-281\" width=\"768\" height=\"372\" srcset=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d4c-1024x496.png 1024w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d4c-300x145.png 300w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d4c-768x372.png 768w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d4c-1536x744.png 1536w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d4c.png 1563w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>The final screenshot shows that even if on user&#8217;s screen nothing changes, the memory address shown below has been modified:<\/p>\n\n\n\n<pre id=\"block-a51755ac-a874-483f-843b-79735a991429\" class=\"wp-block-code\"><code>0x5639999dea10 <\/code><\/pre>\n\n\n\n<p>The above address no longer stored the string &#8220;CHANGEME&#8221; but &#8220;LIVEDEMO&#8221;. After saving the text file and reopening it the user &#8220;user2&#8221; will see the modified string &#8220;LIVEDEMO&#8221; confirming that the injection into the live memory within the heap space has been successful. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized is-style-twentytwentyone-border\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d6c-1024x506.png\" alt=\"\" class=\"wp-image-282\" width=\"768\" height=\"380\" srcset=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d6c-1024x506.png 1024w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d6c-300x148.png 300w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d6c-768x379.png 768w, https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d6c.png 1517w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>As you can see, it is not that difficult to get it done. In fact, it is easier than you may think. Imagine what would happen, if you changed just one byte in the right place and at the right time to disable security controls. Going one step further, you can execute the code without leaving forensic artifacts, as long as you know what you are doing.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this post I will cover briefly how to modify the memory of running process in real-time. The example chosen for this demonstration is simple. The main purpose is to show the approach rather than make it look sophisticated. However, you can take it as far as you wish, depending on your objectives. In future&hellip; <a class=\"more-link\" href=\"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/\">Continue reading <span class=\"screen-reader-text\">Targeted process injection &#8211; Linux<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[23],"tags":[34,35,32,6,33,31],"class_list":["post-277","post","type-post","status-publish","format-standard","hentry","category-research","tag-debugger","tag-gdb","tag-injection","tag-linux","tag-memory","tag-process","entry"],"yoast_head":"<title>Targeted process injection - Linux - Cyber Security Notepad<\/title>\n<meta name=\"description\" content=\"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Targeted process injection - Linux - Cyber Security Notepad\" \/>\n<meta property=\"og:description\" content=\"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Notepad\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-20T09:48:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-20T10:05:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1-1024x490.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/\"},\"author\":\"cybersecuritynotepad\",\"headline\":\"Targeted process injection &#8211; Linux\",\"datePublished\":\"2022-02-20T09:48:31+00:00\",\"dateModified\":\"2022-02-20T10:05:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/\"},\"wordCount\":621,\"image\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/d1c-1-1024x490.png\",\"keywords\":[\"debugger\",\"gdb\",\"injection\",\"Linux\",\"memory\",\"process\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/\",\"url\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/\",\"name\":\"Targeted process injection - Linux - Cyber Security Notepad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/d1c-1-1024x490.png\",\"datePublished\":\"2022-02-20T09:48:31+00:00\",\"dateModified\":\"2022-02-20T10:05:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/#\\\/schema\\\/person\\\/7fd460a876c44ee288cb37cb33e1ed5e\"},\"description\":\"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/d1c-1.png\",\"contentUrl\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/d1c-1.png\",\"width\":1562,\"height\":747},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/2022\\\/02\\\/20\\\/targeted-process-injection-linux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Targeted process injection &#8211; Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/#website\",\"url\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/\",\"name\":\"Cyber Security Notepad\",\"description\":\"Cyber and Information Security News, Trends, Guides and Tools\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>","yoast_head_json":{"title":"Targeted process injection - Linux - Cyber Security Notepad","description":"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Targeted process injection - Linux - Cyber Security Notepad","og_description":"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information","og_url":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/","og_site_name":"Cyber Security Notepad","article_published_time":"2022-02-20T09:48:31+00:00","article_modified_time":"2022-02-20T10:05:38+00:00","og_image":[{"url":"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1-1024x490.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/#article","isPartOf":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/"},"author":"cybersecuritynotepad","headline":"Targeted process injection &#8211; Linux","datePublished":"2022-02-20T09:48:31+00:00","dateModified":"2022-02-20T10:05:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/"},"wordCount":621,"image":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1-1024x490.png","keywords":["debugger","gdb","injection","Linux","memory","process"],"articleSection":["Research"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/","url":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/","name":"Targeted process injection - Linux - Cyber Security Notepad","isPartOf":{"@id":"https:\/\/www.cybersecuritynotepad.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1-1024x490.png","datePublished":"2022-02-20T09:48:31+00:00","dateModified":"2022-02-20T10:05:38+00:00","author":{"@id":"https:\/\/www.cybersecuritynotepad.com\/#\/schema\/person\/7fd460a876c44ee288cb37cb33e1ed5e"},"description":"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information","breadcrumb":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/#primaryimage","url":"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1.png","contentUrl":"https:\/\/www.cybersecuritynotepad.com\/wp-content\/uploads\/2022\/02\/d1c-1.png","width":1562,"height":747},{"@type":"BreadcrumbList","@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/2022\/02\/20\/targeted-process-injection-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cybersecuritynotepad.com\/"},{"@type":"ListItem","position":2,"name":"Targeted process injection &#8211; Linux"}]},{"@type":"WebSite","@id":"https:\/\/www.cybersecuritynotepad.com\/#website","url":"https:\/\/www.cybersecuritynotepad.com\/","name":"Cyber Security Notepad","description":"Cyber and Information Security News, Trends, Guides and Tools","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cybersecuritynotepad.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/posts\/277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/comments?post=277"}],"version-history":[{"count":16,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/posts\/277\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/posts\/277\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/media?parent=277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/categories?post=277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/tags?post=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}