{"id":32043,"date":"2018-11-03T19:18:58","date_gmt":"2018-11-03T13:48:58","guid":{"rendered":"https:\/\/www.wikitechy.com\/technology\/?p=32043"},"modified":"2018-11-03T19:18:58","modified_gmt":"2018-11-03T13:48:58","slug":"whitelisting-in-modsecurity","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/technology\/whitelisting-in-modsecurity\/","title":{"rendered":"Whitelisting in ModSecurity"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong>Whitelisting in ModSecurity<\/strong><\/span><\/p>\n<p>Broken down into\u00a02\u00a0components\u00a0our article\u2019s\u00a01st\u00a0section hits on \u201c<strong>how to whitelist IPs or URIs,<\/strong>\u201d for\u00a0those who area unit\u00a0somewhat\u00a0aware of\u00a0ModSecurity. However\u00a0need\u00a0to grasp\u00a0more\u00a0concerning\u00a0the method. Our second section examines why\u00a0we have a tendency to\u00a0<strong>set up\u00a0ModSecurity\u00a0approach<\/strong> to stop\u00a0the protection of the server from\u00a0entering into\u00a0the way of our work. If\u00a0you\u2019ve got\u00a0a completely\u00a0Managed Liquid\u00a0internet server reach\u00a0dead set\u00a0our Heroic Support team for\u00a0help\u00a0with whitelisting!<\/p>\n<h3 id=\"how-to-whitelist-ips-or-uris\"><span style=\"color: #003366;\">How to Whitelist IPs or URIs<\/span><\/h3>\n<p>\u201cModSecurity\u00a0may be a\u00a0toolkit for\u00a0time period\u00a0internet\u00a0application\u00a0observation, logging, and access\u00a0management.\u201d (<strong>modsecurity.org<\/strong>). In\u00a0straightforward\u00a0terms,\u00a0this implies\u00a0that <strong>ModSec<\/strong>,\u00a0conjointly\u00a0known <strong>asmod_security or ModSecurity<\/strong>,\u00a0may be a\u00a0internet\u00a0application firewall\u00a0that may\u00a0actively\u00a0hunt for\u00a0attacks to the system and stop malicious activity.<\/p>\n<p>However,\u00a0generally\u00a0these rules trigger\u00a0once\u00a0legitimate work is\u00a0happening,\u00a0block\u00a0your\u00a0informatics. And stopping you or your developer\u2019s\u00a0till\u00a0you\u2019ll\u00a0take away\u00a0the\u00a0informatics\u00a0block. The\u00a0method\u00a0around for being blocked\u00a0is understood\u00a0as whitelisting,\u00a0that\u00a0primarily\u00a0permits\u00a0for\u00a0a selected informatics\u00a0to access the server. There\u00a0area unit\u00a0a couple of\u00a0ways in which\u00a0to whitelist\u00a0letter of invitation\u00a0in ModSec. Either by\u00a0<strong>informatics\u00a0or by URI<\/strong> (URIs\u00a0area unit\u00a0specific pages on the website).<\/p>\n<h3 id=\"getting-started\"><span style=\"color: #ff9900;\">Getting Started<\/span><\/h3>\n<p>Find your\u00a0informatics\u00a0or\u00a0raise\u00a0your developer for theirs. (You\u00a0will\u00a0realize\u00a0this by\u00a0progressing to informatics.liquidweb.com)If you or your developer have a static\u00a0informatics\u00a0(one\u00a0that may\u00a0not change),\u00a0a way\u00a0you\u2019ll\u00a0whitelist the ModSec rules is by\u00a0informatics. Find the ModSec error\u00a0within the\u00a0<a href=\"https:\/\/www.wikitechy.com\/tutorials\/apache\/ubuntu-simple-hello-world-example-in-apache\" target=\"_blank\" rel=\"noopener\">Apache<\/a> error logs with\u00a0the subsequent\u00a0command (Be\u00a0bound to\u00a0modify the command\u00a0along with your\u00a0informatics\u00a0in site of \u201c<strong>IP here.<\/strong>\u201d):<\/p>\n<h2 id=\"how-to-whitelist-ips-or-uris-2\"><span style=\"color: #333399;\"><strong>How to Whitelist IPs or URIs<\/strong><\/span><\/h2>\n[pastacode lang=\u201dapacheconf\u201d manual=\u201dgrep%20ModSec%20%2Fusr%2Flocal%2Fapache%2Flogs%2Ferror_log%20%7C%20grep%20%E2%80%9CIP%20here%E2%80%9D.\u201d message=\u201d\u201d highlight=\u201d\u201d provider=\u201dmanual\u201d\/]\n<ol>\n<li>The output of this command will give you a list of hits for <strong>ModSecurity<\/strong> from you or your <strong>developer\u2019s IP,<\/strong> which you can see below. While this looks intimidating, you will only want to pay attention to 3 bits of information highlighted.\u00a0 Please note, the output\u00a0will not show these colors when you are viewing the files.<\/li>\n<\/ol>\n<h4 id=\"note\"><span style=\"color: #993300;\"><strong>Note<\/strong><\/span><\/h4>\n<p><span style=\"color: #0000ff;\"><strong>Blue\u00a0<\/strong><\/span>= <strong>client<\/strong>, the IP which tripped the rule<br \/>\n<strong><span style=\"color: #ff0000;\">Red<\/span>\u00a0<\/strong>=<strong> ID number<\/strong> of tripped rule within ModSec<br \/>\n<span style=\"color: #008000;\"><strong>Green<\/strong><\/span>\u00a0= <strong>URI<\/strong>, the location where the error started from<\/p>\n[pastacode lang=\u201dapacheconf\u201d manual=\u201d%5BFri%20May%2025%2023%3A07%3A04.178701%202018%5D%20%5B%3Aerror%5D%20%5Bpid%2078007%3Atid%20139708457686784%5D%20%5Bclient%2061.14.210.4%3A30095%5D%20%5Bclient%2061.14.210.4%5D%20ModSecurity%3A%20Access%20denied%20with%20code%20406%20(phase%202).%20Pattern%20match%20%22Mozilla%2F(4%7C5)%5C%5C%5C%5C.0%24%22%20at%20REQUEST_HEADERS%3AUser-Agent.%20%5Bfile%20%22%2Fetc%2Fapache2%2Fconf.d%2Fmodsec2.liquidweb.conf%22%5D%20%5Bline%20%22109%22%5D%20%5Bid%20%2220000221%22%5D%20%5Bhostname%20%2267.227.209.163%22%5D%20%5Buri%20%22%2Fdb%2Findex.php%22%5D%20%5Bunique_id%20%22WwjPWChxvG1CO4kz-D55eQAAACU%22%5D\u201d message=\u201d\u201d highlight=\u201d\u201d provider=\u201dmanual\u201d\/]\n<h3 id=\"whitelist-by-ip\"><span style=\"color: #008080;\"><strong>Whitelist By IP:<\/strong><\/span><\/h3>\n<ol>\n<li>Once you have the correct <strong>ModSec error<\/strong>, you will need to edit the <strong>ModSec configuration<\/strong>. If you are using Easy Apache 4 you will find the configuration file with this path:<br \/>\n<strong>\/etc\/apache2\/conf.d\/modsec2\/whitelist.conf<\/strong><\/li>\n<li>Open the file with your <strong>favorite text editor<\/strong>, such as vim, nano, or file manager like so:<\/li>\n<\/ol>\n[pastacode lang=\u201dapacheconf\u201d manual=\u201dvim%20%2Fetc%2Fapache2%2Fconf.d%2Fwhitelist.conf\u201d message=\u201d\u201d highlight=\u201d\u201d provider=\u201dmanual\u201d\/]\n<ol start=\"3\">\n<li>The <strong>blue text<\/strong> above will be the <a href=\"https:\/\/www.wikitechy.com\/technology\/change-ip-address-less-1-minute\/\" target=\"_blank\" rel=\"noopener\">IP address<\/a> that you are whitelisting from the <strong>original error<\/strong>. You must keep the <strong>backslashes (\\) and up-carrot (^)<\/strong> in order for the IP to be read correctly. Thus it will always look something like:<\/li>\n<\/ol>\n<p><strong>\u201c^192\\.168\\.896\\.321\u201d<\/strong><\/p>\n<p>For for the<strong> id<\/strong>, noted in<strong> red,<\/strong> you will <strong>change the number<\/strong> after the colon, which will be the Apache error log like we saw above. This will look similar to:<\/p>\n<p><strong>Id:2000221<\/strong><\/p>\n<p><strong>Add<\/strong> the following <strong>code with the colored sections<\/strong> edited to match your intended IP.<\/p>\n[pastacode lang=\u201dapacheconf\u201d manual=\u201dSecRule%20REMOTE_ADDR%20%22%5E64%5C.14%5C.210%5C.4%22%0A%22phase%3A1%2Cnolog%2Callow%2Cctl%3AruleEngine%3Doff%2Cid%3A20000221%22\u2033 message=\u201d\u201d highlight=\u201d\u201d provider=\u201dmanual\u201d\/]\n<h3 id=\"whitelist-by-uri\"><span style=\"color: #3366ff;\"><strong>Whitelist By URI:<\/strong><\/span><\/h3>\n<p>If your <strong>IP is dynamic<\/strong> (changing) and you keep getting <strong>blocked in the firewall<\/strong>, it is best to whitelist it via <strong><em>URI,<\/em><\/strong> the <strong>yellow item<\/strong> in the ModSec error.<\/p>\n<ol>\n<li>Begin by opening the <strong>Easy Apache 4 configuration file:<\/strong><\/li>\n<\/ol>\n[pastacode lang=\u201dapacheconf\u201d manual=\u201dvim%20%2Fetc%2Fapache2%2Fconf.d%2Fwhitelist.conf\u201d message=\u201d\u201d highlight=\u201d\u201d provider=\u201dmanual\u201d\/]\n<p>2. Add the following text to the configuration. Remember to pay attention to the highlighted parts.\u00a0\u00a0Change the\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <strong>yellow \u201c\/db\/index.php<\/strong>\u201d to match <strong>your URI<\/strong> and the <strong>red id<\/strong> to match the <strong>id of your error<\/strong> (Do not use the colon in this one).<\/p>\n[pastacode lang=\u201dapacheconf\u201d manual=\u201d%3CLocationMatch%20%22%2Fdb%2Findex.php%22%3E%0ASecRuleRemoveById%2020000221%0A%3C%2FLocationMatch%3E\u201d message=\u201d\u201d highlight=\u201d\u201d provider=\u201dmanual\u201d\/]\n<p>3. The <strong>final step for whitelisting,<\/strong> before you finalize the process, is to ensure you have correctly set up the\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0whitelist. For Easy Apache 4 you will run the command:<\/p>\n[pastacode lang=\u201dapacheconf\u201d manual=\u201dapachectl%20-t\u201d message=\u201d\u201d highlight=\u201d\u201d provider=\u201dmanual\u201d\/]\n<p>As long as the command returns <strong>\u201c<em>Syntax Ok<\/em>\u201d<\/strong> you are safe to make the whitelist active by restarting Apache. Otherwise, review the whitelists to make sure the syntax matches up correctly with the above directions.<\/p>\n<ol start=\"4\">\n<li>Lastly, <strong>restart Apache<\/strong> with the following command.<\/li>\n<\/ol>\n[pastacode lang=\u201dapacheconf\u201d manual=\u201d%2Fscripts%2Frestartsrv_httpd\u201d message=\u201d\u201d highlight=\u201d\u201d provider=\u201dmanual\u201d\/]\n<p><span style=\"color: #008000;\"><strong>You have successfully whitelisted yourself in ModSec!<\/strong><\/span><\/p>\n<h2 id=\"using-modsec\"><span style=\"color: #003366;\"><strong>Using ModSec<\/strong><\/span><\/h2>\n<p><strong>Cyber Security<\/strong>\u00a0may be a\u00a0hydra. Once one threat is\u00a0ending,\u00a02\u00a0additional\u00a0grow back.\u00a0whereas\u00a0this can be\u00a0not\u00a0a replacement\u00a0analogy.\u00a0 It\u2019s\u00a0vital\u00a0to grasp\u00a0as\u00a0we have a tendency to\u00a0battle threats to our <a href=\"https:\/\/www.wikitechy.com\/errors-and-fixes\/sql\/cluster-network-name-showing-netbios-status-as-the-system-cannot-find-the-file-specified\" target=\"_blank\" rel=\"noopener\">network<\/a>, computers, and servers. With all the complexities that\u00a0escort\u00a0security,\u00a0I need\u00a0to speak\u00a0regarding\u00a0adequately configuring ModSec\u00a0to discourage\u00a0threats\u00a0whereas\u00a0still\u00a0permitting\u00a0you\u00a0to figure\u00a0on your websites. Often,\u00a0once\u00a0it\u00a0involves\u00a0server security,\u00a0an excessive amount of\u00a0protection\u00a0will\u00a0hinder effectiveness.<\/p>\n<h4 id=\"for-example-say-you-have-got-the-subsequent-established-on-your-server\"><span style=\"color: #008080;\"><strong>For example<\/strong>, say\u00a0you have got\u00a0the subsequent\u00a0established\u00a0on your server:<\/span><\/h4>\n<p>You do not\u00a0permit\u00a0root SSH login to the server utilize dual-factor authentication for any <a href=\"https:\/\/www.wikitechy.com\/tutorials\/linux\/how-to-download-a-file-from-server-using-ssh-in-linux\" target=\"_blank\" rel=\"noopener\">SSH logins<\/a> use\u00a0<strong>Associate in Nursing\u00a0SSH key<\/strong> for the <strong>sudo user\u00a0<\/strong>and need\u00a0different\u00a0security safeguards While\u00a0this kind\u00a0of configuration is secure, it takes longer to log into your system\u00a0to form\u00a0a fast\u00a0edit to your settings, a\u00a0ambiguous\u00a0sword;\u00a0however\u00a0are you able to\u00a0keep the server safe\u00a0whereas\u00a0not\u00a0ligature\u00a0your own hands?\u00a0a good\u00a0example of\u00a0however\u00a0this plays out is\u00a0victimization\u00a0ModSec.<\/p>\n<p>ModSec\u00a0will\u00a0block your\u00a0scientific discipline\u00a0if it\u00a0incorrectly\u00a0flags your work.\u00a0whereas\u00a0this module improves system security, you\u2019ll\u00a0got to\u00a0remember\u00a0of properly implementing and \u201c<strong>scoping<\/strong>\u201d the technology. Scoping\u00a0during this\u00a0sense\u00a0means that\u00a0to manage risks,\u00a0the main focus\u00a0of\u00a0what\u2019s\u00a0vital\u00a0for security\u00a0whereas\u00a0still\u00a0permitting\u00a0work on the server with\u00a0tokenish\u00a0interference. To tune out legitimate requests to your server,\u00a0like after you\u00a0square measure\u00a0piece of writing\u00a0your website\u2019s code via a plugin. ModSec has\u00a0the choices\u00a0to<strong> whitelist rules or IPs<\/strong> and keep your work\u00a0on the right track.<\/p>\n<p><strong>Whitelisting\u00a0Associate in Nursing<\/strong>\u00a0scientific discipline\u00a0from\u00a0the principles\u00a0that ModSec follows\u00a0may be a\u00a0nice choice\u00a0goodbye\u00a0because the\u00a0scientific discipline\u00a0ne\u2019er\u00a0changes (i.e. a static\u00a0scientific discipline, see article here\u00a0to be told\u00a0additional<strong>\u00a0https:\/\/support.google.com\/fiber\/answer\/3547208?<\/strong>hl=en) and\u00a0is restricted\u00a0to\u00a0solely\u00a0folks\u00a0you trust.<\/p>\n<p>This\u00a0methodology\u00a0prevents ModSec from viewing your requests as malicious and\u00a0interference\u00a0your\u00a0scientific discipline. This\u00a0follow\u00a0has\u00a0the downside\u00a0that if\u00a0somebody\u00a0(say\u00a0<strong>Associate in Nursing\u00a0sad\u00a0employee<\/strong>) has access to your network, they\u00a0currently\u00a0have\u00a0the way\u00a0around ModSec to attack your server.<\/p>\n<h3 id=\"whitelisting-rules\"><span style=\"color: #003366;\">Whitelisting Rules<\/span><\/h3>\n<p>With non-static (dynamic)\u00a0scientific disciplines\u00a0the <strong>issues\u00a0of whitelisting<\/strong>\u00a0Associate in Nursing\u00a0IP\u00a0square measure\u00a0promptly\u00a0apparent. With the continual\u00a0modification\u00a0of a dynamic\u00a0scientific discipline, it creates the potential of exploiting your server, as\u00a0somebody\u00a0might\u00a0use\u00a0Associate in Nursing\u00a0previous\u00a0scientific discipline\u00a0to access the server. Whitelisting specific rules\u00a0involves\u00a0save the day!. After you\u00a0whitelist by rules,\u00a0you\u2019ll\u00a0edit with\u00a0roughness\u00a0and limit\u00a0the principles\u00a0to\u00a0explicit\u00a0domains and URIs. <strong>URI\u2019s are protective<\/strong>\u00a0the remainder\u00a0of the server<strong> from attacks<\/strong>\u00a0associated with\u00a0that very same\u00a0rule!<\/p>\n<h3 id=\"example-of-modsecurity\"><span style=\"color: #3366ff;\"><strong>Example of ModSecurity<\/strong><\/span><\/h3>\n<p>ModSec reads a series of rules and applies them to incoming requests being\u00a0created\u00a0to\u00a0the net\u00a0server.\u00a0Associate in Nursing\u00a0example of what a block\u00a0sounds like\u00a0is:<\/p>\n[pastacode lang=\u201dapacheconf\u201d manual=\u201d%5BSat%20Jun%2030%2002%3A21%3A56.013837%202018%5D%20%5B%3Aerror%5D%20%5Bpid%2079577%3Atid%20139862413879040%5D%20%5Bclient%20120.27.217.223%3A24397%5D%20%5Bclient%20120.27.217.223%5D%20ModSecurity%3A%20Access%20denied%20with%20code%20406%20(phase%202).%20Pattern%20match%20%22Mozilla%2F(4%7C5)%5C%5C%5C%5C.0%24%22%20at%20REQUEST_HEADERS%3AUser-Agent.%20%5Bfile%20%22%2Fetc%2Fapache2%2Fconf.d%2Fmodsec2.liquidweb.conf%22%5D%20%5Bline%20%22109%22%5D%20%5Bid%20%222000064%22%5D%20%5Bhostname%20%2267.227.192.139%22%5D%20%5Buri%20%22%2Fmysql%2Findex.php%22%5D%20%5Bunique_id%20%22WzchhAjuZ6wPAzo9AwW1WwAAAE8%22%5D\u201d message=\u201d\u201d highlight=\u201d\u201d provider=\u201dmanual\u201d\/]\n<p>This error shows Apache stopped a potential attack on a file at<strong> \/mysql\/index.php.<\/strong> This is an error similar to what appears when the code is being written or edited within programs like Drupal or WordPress.<\/p>\n<h3 id=\"evaluating-modsecurity\"><span style=\"color: #000080;\"><strong>Evaluating ModSecurity:<\/strong><\/span><\/h3>\n<p>If\u00a0you\u2019re\u00a0persistently being blocked in your firewall\u00a0whereas\u00a0engaged on\u00a0your code, ModSec\u00a0is that the doubtless\u00a0offender. The ModSec errors\u00a0will be\u00a0found\u00a0within the\u00a0Apache error log (in cPanel\u00a0the trail\u00a0is <strong>\/usr\/local\/apache\/logs\/error_log<\/strong>). The phrase \u201c<strong>ModSec<\/strong>\u201d\u00a0will be\u00a0quickly isolated from the log (via the command \u2018<strong>grep \u201cModSec\u201d \/usr\/local\/apache\/logs\/error_log<\/strong>\u2019).<\/p>\n<p>By\u00a0examination\u00a0you or your developer(s)\u00a0IP\u00a0to the log, you\u2019ll be\u00a0ready to\u00a0determine\u00a0stopped requests that\u00a0area unit\u00a0legitimate. Verify these\u00a0area unit\u00a0valid requests by double-checking\u00a0that somebody\u00a0in your organization\u00a0created\u00a0them. Once\u00a0you have got\u00a0done\u00a0therefore,\u00a0you\u2019ll be able to\u00a0move forward in\u00a0fitting\u00a0a whitelist for the error, per the steps\u00a0on top of.<\/p>\n<p>Again,\u00a0we would like\u00a0to scope\u00a0to permit\u00a0the smallest amount of\u00a0flexibility\u00a0for an attack and\u00a0guarantee. That we will\u00a0keep\u00a0operating. If\u00a0you\u2019re\u00a0unable\u00a0to possess\u00a0a\u00a0trusty\u00a0static\u00a0IP, you\u2019ll\u00a0ought to\u00a0use the whitelist URI\u00a0technique, providing\u00a0the particular\u00a0page as an exemption. Once completed,\u00a0take away\u00a0each whitelisted\u00a0things\u00a0from the configuration file,\u00a0just in case\u00a0of\u00a0a real\u00a0attack.<\/p>\n<p>On a parting note, I encourage you to explore ModSec and learn\u00a0additional\u00a0of the ins and outs of the\u00a0code. Exploring\u00a0totally different\u00a0ways\u00a0of whitelisting\u00a0will be\u00a0heaps\u00a0of for\u00a0to find out\u00a0and\u00a0most significantly\u00a0helps to tighten server security. As always, our\u00a0totally\u00a0Supported Customers\u00a0will\u00a0contact our\u00a0useful\u00a0Human Support team for\u00a0help.\u00a0consider\u00a0articles on security in our\u00a0mental object, like this one on <strong>Maldet!<\/strong> It\u2019s another\u00a0glorious\u00a0thanks to\u00a0find out about\u00a0your server and develop an understanding of server security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whitelisting in ModSecurity Broken down into\u00a02\u00a0components\u00a0our article\u2019s\u00a01st\u00a0section hits on \u201chow to whitelist IPs or URIs,\u201d for\u00a0those who area unit\u00a0somewhat\u00a0aware of\u00a0ModSecurity. However\u00a0need\u00a0to grasp\u00a0more\u00a0concerning\u00a0the method. Our second section examines why\u00a0we have a tendency to\u00a0set up\u00a0ModSecurity\u00a0approach to stop\u00a0the protection of the server from\u00a0entering into\u00a0the way of our work. If\u00a0you\u2019ve got\u00a0a completely\u00a0Managed Liquid\u00a0internet server reach\u00a0dead set\u00a0our Heroic Support team [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":32045,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85747,3092],"tags":[86228,86229,86230,86231,86232,86233,86234,86235,86237,86236,86238,86239,86240,86241,86242,86243,86244],"class_list":["post-32043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apache-tomcat","category-security","tag-configserver-modsecurity-whitelist-file","tag-cpanel-modsecurity-whitelist-ip","tag-cpanel-whitelist-ip","tag-ctl-ruleengine-off","tag-mod_security-block-ip-address","tag-modsecurity-action","tag-modsecurity-disable-rule-by-id","tag-modsecurity-disable-rule-for-url","tag-modsecurity-rule-engine","tag-modsecurity-rule-id-list","tag-modsecurity-rules-examples","tag-modsecurity-unblock-ip","tag-modsecurity-whitelist-ip-range","tag-modsecurity-whitelist-url","tag-whitelist-mod_security-rule","tag-whitelist-mod_security-rule-cpanel","tag-whm-modsecurity-whitelist-ip"],"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/32043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/comments?post=32043"}],"version-history":[{"count":0,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/32043\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/media\/32045"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/media?parent=32043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/categories?post=32043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/tags?post=32043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}