{"id":1005,"date":"2024-09-21T04:10:02","date_gmt":"2024-09-21T04:10:02","guid":{"rendered":"https:\/\/hackmybox.com\/?p=1005"},"modified":"2024-09-21T04:10:02","modified_gmt":"2024-09-21T04:10:02","slug":"introduction-to-digital-forensics","status":"publish","type":"post","link":"https:\/\/hackmybox.com\/index.php\/2024\/09\/21\/introduction-to-digital-forensics\/","title":{"rendered":"Introduction to Digital Forensics"},"content":{"rendered":"<div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-7332ec4c\" data-vce-do-apply=\"all el-7332ec4c\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-f4abb60e\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-f4abb60e\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-f4abb60e\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-b86cb4a8\" data-vce-do-apply=\"all el-b86cb4a8\"><h3 class=\"card-title w-75\" style=\"text-align: center;\"><span style=\"font-size: 24pt; color: #ffff00;\">Part 1 - Introduction<\/span><\/h3><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-f482a931\" data-vce-do-apply=\"all el-f482a931\"><p>Interpol defines digital forensics as a branch of forensic science focused on identifying, acquiring, processing, analyzing, and reporting electronically stored data. This data, from sources like computers and smartphones, is crucial for law enforcement and must be handled meticulously to be admissible in court. This &nbsp;key element of digital forensics is the&nbsp;<span style=\"color: #ffff00;\">Chain of Custody<\/span>,&nbsp;which tracks evidence from collection through analysis by documenting each handler, transfer time, and purpose.<\/p><p>In this course, we will explore tools to understand key concepts, basics, and practical aspects of digital forensics.<\/p><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-c10111b2\" data-vce-do-apply=\"all el-c10111b2\"><h3 class=\"card-title w-75\" style=\"text-align: center;\"><span style=\"font-size: 24pt; color: #ffff00;\">Part 2 - Linux CLI<\/span><\/h3><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-ebf52303\" data-vce-do-apply=\"all el-ebf52303\"><h2 style=\"text-align: center;\"><em><span style=\"color: #00ff00;\">File Command<\/span><\/em><\/h2><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-837f332b\" data-vce-do-apply=\"all el-837f332b\"><p>In the course challenge, we need to find files with modified extensions to conceal their content. The file command in Linux analyzes a file's content header to reveal its actual type. From the sample below, you can see that doggo.zip is actually a JPEG image. For more information about the file command, see the resources below.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-032e212e\" data-vce-do-apply=\"all el-032e212e\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 958px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 20.4593%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"958\" height=\"196\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/doggo-320x65.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/doggo-480x98.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/doggo-800x164.png 800w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/doggo-958x196.png 958w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/doggo-958x196.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/doggo.png\" data-attachment-id=\"999\"  alt=\"\" title=\"doggo\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-91c5d43a\" data-vce-do-apply=\"all el-91c5d43a\"><h2 style=\"text-align: center;\"><span style=\"font-size: 18pt;\"><em><span style=\"color: #00ff00;\">Tree Command<\/span><\/em><\/span><\/h2><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-0f089bda\" data-vce-do-apply=\"all el-0f089bda\"><p><strong>A simple yet useful command in Linux is the <span style=\"color: #ffff00;\">tree command<\/span>. It displays the filesystem hierarchy in a visually structured format directly from the command line. <span style=\"color: #ffff00;\">-a<\/span> show all files (Including Hidden).<\/strong><\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-cde5c35a\" data-vce-do-apply=\"all el-cde5c35a\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 722px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 100%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"722\" height=\"722\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/tree-320x320.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/tree-480x480.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/tree-722x722.png 722w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/tree-722x722.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/tree.png\" data-attachment-id=\"1014\"  alt=\"\" title=\"tree\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-d01c2080\" data-vce-do-apply=\"all el-d01c2080\"><h4 class=\"card-title w-75\" style=\"text-align: center;\"><span style=\"font-size: 24pt; color: #ffff00;\">Part 3 - Steganography<\/span><\/h4><p>Steganography is a method that hides sensitive information within an ordinary, non-secret file or message, making it undetectable. Once the file or message reaches its destination, the sensitive data can be extracted, ensuring it remains securely hidden throughout the process.<\/p><p>From a cybersecurity perspective, threat actors can use steganography to embed malicious data within seemingly normal files.<\/p><p>From concealing malicious payloads, ransomware, malvertising, and similar tactics use the same concept to hide and plant malicious code.<\/p><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-b2e6ea68\" data-vce-do-apply=\"all el-b2e6ea68\"><ol><li>Install<span style=\"color: #ffff00;\"> Steghide&nbsp;<\/span><\/li><\/ol><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-f25e986a\" data-vce-do-apply=\"all el-f25e986a\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 638px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 22.7273%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"638\" height=\"145\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/install-320x73.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/install-480x109.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/install-638x145.png 638w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/install-638x145.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/install.png\" data-attachment-id=\"1020\"  alt=\"\" title=\"install\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-bcd15f1b\" data-vce-do-apply=\"all el-bcd15f1b\"><p>2.&nbsp; Then we create a ZIP file from the folder we want to embed, naming it Secret.zip.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-865aff02\" data-vce-do-apply=\"all el-865aff02\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 624px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 32.3718%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"624\" height=\"202\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/2-320x104.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/2-480x155.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/2-624x202.png 624w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/2-624x202.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/2.png\" data-attachment-id=\"1022\"  alt=\"\" title=\"2\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-d7ed584c\" data-vce-do-apply=\"all el-d7ed584c\"><p>3. The next command takes Secret.zip, hides it within box.jpeg, and creates a new image called box2.jpeg, which will now contain the hidden file.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-a1695e2c\" data-vce-do-apply=\"all el-a1695e2c\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 538px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 31.2268%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"538\" height=\"168\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/3-320x100.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/3-480x150.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/3-538x168.png 538w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/3-538x168.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/3.png\" data-attachment-id=\"1023\"  alt=\"\" title=\"3\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-5d2044e6\" data-vce-do-apply=\"all el-5d2044e6\"><p><span style=\"color: #ffff00;\"><em>Here\u2019s a breakdown of the command:<\/em><\/span><\/p><p><span style=\"color: #ffff00;\">steghide:<\/span> This is the command-line tool used for steganography, which is the practice of hiding files within other files, typically images or audio files.<\/p><p><span style=\"color: #ffff00;\">embed<\/span>: This is the operation you're performing, which is to hide a file inside another file.<\/p><p><span style=\"color: #ffff00;\">-cf box.jpeg<\/span>: This specifies the cover file (the image that will contain the hidden file). In this case, box.jpeg is the image that will have the hidden data.<\/p><p><span style=\"color: #ffff00;\">-ef Secret.zip<\/span>: This specifies the embedded file (the file you want to hide). Here, Secret.zip is the file that will be hidden inside the cover image.<\/p><p><span style=\"color: #ffff00;\">-sf box2.jpeg<\/span>: This specifies the output file (the new image that will contain the hidden file). box2.jpeg is the resulting image that will be created, which contains Secret.zip hidden within it.<\/p><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-7c683e4c\" data-vce-do-apply=\"all el-7c683e4c\"><p>4. Now we copy and save box2.jpeg. As you can see, the picture looks like a normal JPEG file.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-6a22f9e1\" data-vce-do-apply=\"all el-6a22f9e1\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 624px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 68.5897%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"624\" height=\"428\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/box-320x219.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/box-480x329.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/box-624x428.png 624w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/box-624x428.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/box.png\" data-attachment-id=\"1025\"  alt=\"\" title=\"box\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-f9ad53f4\" data-vce-do-apply=\"all el-f9ad53f4\"><p>4. We can then use the command <span style=\"color: #ffff00;\">steghide extract -sf box2.jpeg<\/span> is&nbsp; to extract hidden data from the image file box2.jpeg.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-eefb90a3\" data-vce-do-apply=\"all el-eefb90a3\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 624px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 50.8013%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"624\" height=\"317\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/4-320x163.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/4-480x244.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/4-624x317.png 624w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/4-624x317.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/4.png\" data-attachment-id=\"1027\"  alt=\"\" title=\"4\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-88ee8eed\" data-vce-do-apply=\"all el-88ee8eed\"><h3 class=\"card-title w-75\" style=\"text-align: center;\"><span style=\"color: #ffff00; font-size: 24pt;\">Part 4 - Cracking ZIP Files<\/span><\/h3><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-d9f32fb0\" data-vce-do-apply=\"all el-d9f32fb0\"><p><span style=\"color: #ffff00;\">fcrackzip<\/span> is a password cracker for ZIP files that offers options for cracking passwords using brute force or dictionary attacks.&nbsp;<\/p><ol><li>To install type in command&nbsp;<em>sudo apt install fcrackzip<\/em>.<\/li><\/ol><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-9aa4823e\" data-vce-do-apply=\"all el-9aa4823e\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 602px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 72.7575%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"602\" height=\"438\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture1-320x233.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture1-480x349.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture1-602x438.png 602w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture1-602x438.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture1.png\" data-attachment-id=\"971\"  alt=\"\" title=\"Picture1\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-e302d91b\" data-vce-do-apply=\"all el-e302d91b\"><ol start=\"2\"><li>Kali Linux often comes with the&nbsp;rockyou.txt&nbsp;wordlist pre-installed. It is typically located in the&nbsp;<strong>\/usr\/share\/wordlists\/<\/strong>directory. Follow the command below to decompress it.<\/li><\/ol><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-95a322e4\" data-vce-do-apply=\"all el-95a322e4\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 610px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 46.7213%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"610\" height=\"285\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture2-320x150.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture2-480x224.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture2-610x285.png 610w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture2-610x285.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/09\/Picture2.png\" data-attachment-id=\"973\"  alt=\"\" title=\"Picture2\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-dd58a701\" data-vce-do-apply=\"all el-dd58a701\"><ol start=\"3\"><li>To run fcrackzip see command below.<\/li><\/ol><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-center\"><div class=\"vce vce-single-image-wrapper\" id=\"el-bfd3b7cf\" data-vce-do-apply=\"all el-bfd3b7cf\"><figure><div class=\"vce-single-image-figure-inner\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%;\"><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-b49d13ed\" data-vce-do-apply=\"all el-b49d13ed\"><p><span style=\"color: #ffff00;\"><strong>Breakdown of the Command<\/strong><\/span><\/p><p><span style=\"color: #ffff00;\">-D<\/span>&nbsp;: &nbsp;specifies&nbsp; a dictionary attack<\/p><p><span style=\"color: #ffff00;\">-u&nbsp;<\/span>:&nbsp; use the unzip format, for compatibility with different ZIP compression<\/p><p><span style=\"color: #ffff00;\">-p \/usr\/share\/wordlist\/rockyou.tx<\/span>t&nbsp;: This specifies the path to the rockyou.txt file.<\/p><p><span style=\"color: #ffff00;\">DictionaryAttack.zip<\/span>&nbsp;: target ZIP file we want to crack.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Part 1 &#8211; IntroductionInterpol defines digital forensics as a branch of forensic science focused on identifying, acquiring, processing, analyzing, and reporting electronically stored data. This data, from sources like computers and smartphones, is crucial for law enforcement and must be handled meticulously to be admissible in court. This &nbsp;key element of digital forensics is the&nbsp;Chain [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1032,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","site-transparent-header":"default","prose-style":"enable","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[12],"tags":[],"class_list":["post-1005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/1005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/comments?post=1005"}],"version-history":[{"count":22,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/1005\/revisions"}],"predecessor-version":[{"id":1034,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/1005\/revisions\/1034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media\/1032"}],"wp:attachment":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media?parent=1005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/categories?post=1005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/tags?post=1005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}