{"id":1253,"date":"2020-12-11T09:00:00","date_gmt":"2020-12-11T09:00:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1253"},"modified":"2022-12-21T06:52:01","modified_gmt":"2022-12-21T06:52:01","slug":"open-directories","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/open-directories\/","title":{"rendered":"Cybersecurity Treasures in Open Directories"},"content":{"rendered":"\n<p>In most cases, it\u2019s a challenge to find out additional information about malware and its actions. Common sandboxes let analysts know only domain names or IP addresses with which malware communicates. But knowing where the malware came from or what data was stolen allows you to get additional information that can save the day. Not to mention discovering new malware samples in the wild, which sometimes goes undetected by AV solutions. Here comes open directories that you can explore with <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in_house&amp;utm_content=opendir\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN malware sandbox\u2019s tools. (opens in a new tab)\">ANY.RUN malware sandbox\u2019s tools.<\/a><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>What is an open directory?<\/strong><\/p>\n\n\n\n<p>Open directories are lists of direct links to files stored on the server. Opendirs are basically <strong>unprotected directories<\/strong> that are used to share numerous types of data: documents, pictures, videos, databases, and software.<\/p>\n\n\n\n<p>Cybercriminals give us such &#8220;presents&#8221; as they leave open directories misconfigured. And they may contain a lot of information for our research. Access to important directories or files without restrictions provide data that has already been utilized by an attacker when formulating or conducting an attack.<\/p>\n\n\n\n<p>There are several types of information that can be there: <strong>additional payloads<\/strong>, including ones from the other \u201cprojects\u201d and <strong>logs<\/strong>, which can be used to analyze the collected data and estimate the damage<\/p>\n\n\n\n<p>All stolen files are stored on the servers, where you can get into with the help of opendirs.&nbsp;<br><\/p>\n\n\n\n<p>We would like to discuss 2 approaches with open directories:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>On one hand, open directories might be configured incorrectly or customized in a special way that can show the directory listing, that\u2019s kept on a server without any protection. With this oversight, an attacker can potentially <strong>expose sensitive information<\/strong>.<\/li><li>On the other hand, open directories could become a <strong>place to keep payload files or stolen information<\/strong> from the infected machines. And this is exactly what you can trace using ANY.RUN. Find where this data has gone, to what IP address, or determine the files that were stolen.&nbsp;<\/li><\/ol>\n\n\n\n<p>Generally, open directories contain a wealth of fresh samples and different IOCs. ANY.RUN\u2019s users can research tasks that contain open directories, just find them by the \u201copendir\u201d tag in the <a href=\"https:\/\/app.any.run\/submissions\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in_house&amp;utm_content=opendir#tag:opendir\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Public submissions<\/a>. During your research, find the \u201cNetwork\u201d block, this tag is shown in the \u201cHTTP Requests\u201d section.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/kgvgP-pJ6a6EavYI2s2eqmpMNbCyHmrskAJuP2n526yyONudIvrao7zIuFjGGXxCyqqDoxRlEYA_vzoQrjJmYMOIbV8bc6UL7K2TJmth0k-3eopUTRwqlZCk7hPRFjJ-iNaM54lB\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>Use open directories to find the stolen data&nbsp;<\/strong><br><\/p>\n\n\n\n<p>Besides files analysis, with ANY.RUN you can add a URL address for direct downloading or browsing open directories and websites. The feature together with interactivity gives analysts the ability to browse, download, and run samples during the same task.&nbsp;<\/p>\n\n\n\n<p>To demonstrate this functionality, let\u2019s investigate <a href=\"https:\/\/app.any.run\/tasks\/3582a2f9-6131-4d58-8021-6ced3487cefe\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the sample with the \u201copendir\u201d tag<\/a>.&nbsp;<\/p>\n\n\n\n<p>The task already has a URL pasted and the &#8220;Internet Explorer&#8221; web browser chosen. Immediately we start to work with the virtual machine. The browser opens at the same time as the task started.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/Jq-VJ-FjD4PBUZ798BWqkihmjgA0VwUzWl2SG2ERN2a2cM2c2F9HZzjPWevm-R4Z4cojHbRtgMoQcou-kIRKQYX5DKSGzQbFC_CFcELZBARZKLfY2Bs8emE0g2SFNHKq3nivZW1c\" alt=\"\"\/><\/figure>\n\n\n\n<p>As you can see, there are quite a few executables in this open directory and you can download all of them during one task. You will not get confused with types of malware there, as all malicious processes are tagged in the process tree with detected malware family names. All the executable files stored here can be downloaded later as a payload into the infected systems by initial loaders such as malicious documents.<\/p>\n\n\n\n<p>Let\u2019s work with the r.exe file. The sample makes a network connection with a known threat \u2013 it matches <a href=\"https:\/\/any.run\/malware-trends\/agenttesla\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Agent Tesla<\/a>&#8216;s Suricata IDS signature. Find the &#8220;Network&#8221; block and choose the &#8220;Connections&#8221; tab. Agent Tesla has been using SMTP&#8217;s 587 port for a long time already and often with broken encryption so it sends the unencrypted information.<\/p>\n\n\n\n<p> We can take advantage of that mistake and look inside the &#8220;Network stream&#8221; by clicking on the packet in the &#8220;Traffic&#8221; column from the process.<\/p>\n\n\n\n<p>We can take our chance &#8211; copy authorization information from the &#8220;Network stream&#8221; and try to log into the crooks\u2019 account. Also in this stream, you see what information this trojan has stolen from the infected machines and has sent to the Command &amp; Control server.&nbsp;<\/p>\n\n\n\n<p>By going through the stolen information that is saved by malware in an open directory, it\u2019s possible to find out how many workstations have already been compromised.<\/p>\n\n\n\n<p>Have a look at this sample in action in the following video:<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Open Directories in Agent Tesla malware analysis\" width=\"770\" height=\"433\" src=\"https:\/\/www.youtube.com\/embed\/K685MNMGmyc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>Use open directories to see the malware\u2019s storage<\/strong><\/p>\n\n\n\n<p>Now it\u2019s time to explore opendirs that can help us to trace where the malware is from.&nbsp;<\/p>\n\n\n\n<p>The following <a href=\"https:\/\/app.any.run\/tasks\/0de2e11d-86ba-4ec4-a722-4440fe08a878\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">task with the Formbook trojan <\/a>can be useful for this matter.&nbsp;<\/p>\n\n\n\n<p>Let&#8217;s take a look at the \u201cHTTP Requests\u201d section. There is a URL with the \u201copendir\u201d tag. To get to know what is kept inside this open directory, we need to follow these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Copy the URL address paste it into the VM\u2019s web browser using the\u201cRemote ClipBoard\u201d;<\/li><li>Wait for the response from the server takes time;<\/li><li>Explore what this directory keeps: archive files, scripts, Microsoft Office files, executable files, and nested directories.&nbsp;<\/li><\/ol>\n\n\n\n<p>And here it is \u2013 the file from our task! No magic, just ANY.RUN tools.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/Wlp8KmkvtbDBSyZrwaInuMnBFpLtoIdKXITBPZ2WR0A9sJFFeJL4EzO_aFQk-nc3JejHZeDIf7NopVEcnfpS2njYt069UEoo7ZGa0INUZetddZ_gd3H_cA5BLYUhxmKWI8xYP9Kx\" alt=\"\"\/><\/figure>\n\n\n\n<p>Are you curious about what else can be stored there? The hackers might have prepared loads of disgusting stuff, and right now we have an opportunity to find out their plans and possible attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Let\u2019s download any file and explore what it is. We\u2019ve decided to unmask the \u201cDocument_001.xlsx\u201d file. It looks like a malicious document and the most interesting is what payload it delivers to infected machines.<\/p>\n\n\n\n<p>Just go around all the security measures, open the maldoc, and click on the &#8220;Enable Editing&#8221; button.&nbsp;<\/p>\n\n\n\n<p>Apparently, this maldoc has macros that through the exploitation of CVE-2017-11882, downloads and runs the executable file. And it turns out to be the <a href=\"https:\/\/any.run\/malware-trends\/lokibot\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Lokibot<\/a> trojan! The trojan was detected both by the network and the local signatures. If you want to get more details about this sample, watch the video:<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to detect malware and get more IOCs through Opendir\" width=\"770\" height=\"433\" src=\"https:\/\/www.youtube.com\/embed\/mdp-zcgSQYU?start=242&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>All the mentioned tasks are available for your own research, just rerun them and start the analysis. But if you want to save time, we have prepared a video with examples that show open directories in all their glory: <\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Open Directories and Remcos\/Amadey malware analysis with ANY.RUN interactive sandbox\" width=\"770\" height=\"433\" src=\"https:\/\/www.youtube.com\/embed\/Pwn7rtaqD-M?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>Conclusion<\/strong>&nbsp;<\/p>\n\n\n\n<p>Malware is a real issue in any company\u2019s security and it\u2019s great to have the advantage to investigate its background or intentions. We hope that now you can use open directories for these goals, and <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in_house&amp;utm_content=opendir\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a> will always be glad to help you.<br><\/p>\n\n\n\n<p>Open directories occur as a simple mistake, but it can be turned into a vulnerability in the security of your organization. So, if you\u2019re a cybersecurity specialist, be attentive enough and close the directories!<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In most cases, it\u2019s a challenge to find out additional information about malware and its actions. Common sandboxes let analysts know only domain names or IP addresses with which malware communicates. But knowing where the malware came from or what data was stolen allows you to get additional information that can save the day. Not [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3198,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,8],"tags":[10],"class_list":["post-1253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","category-malware-analysis","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity treasures in open directories - ANY.RUN Blog<\/title>\n<meta name=\"description\" content=\"We&#039;ll tell you how to get more malware data while exploring open directories. Check out use cases and videos in the article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Cybersecurity Treasures in Open Directories\",\"datePublished\":\"2020-12-11T09:00:00+00:00\",\"dateModified\":\"2022-12-21T06:52:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/\"},\"wordCount\":1153,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Cybersecurity Lifehacks\",\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/\",\"name\":\"Cybersecurity treasures in open directories - ANY.RUN Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2020-12-11T09:00:00+00:00\",\"dateModified\":\"2022-12-21T06:52:01+00:00\",\"description\":\"We'll tell you how to get more malware data while exploring open directories. Check out use cases and videos in the article.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malicious History\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/history\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Treasures in Open Directories\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity treasures in open directories - ANY.RUN Blog","description":"We'll tell you how to get more malware data while exploring open directories. Check out use cases and videos in the article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/open-directories\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/open-directories\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/open-directories\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Cybersecurity Treasures in Open Directories","datePublished":"2020-12-11T09:00:00+00:00","dateModified":"2022-12-21T06:52:01+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/open-directories\/"},"wordCount":1153,"commentCount":2,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity"],"articleSection":["Cybersecurity Lifehacks","Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/open-directories\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/open-directories\/","url":"https:\/\/any.run\/cybersecurity-blog\/open-directories\/","name":"Cybersecurity treasures in open directories - ANY.RUN Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2020-12-11T09:00:00+00:00","dateModified":"2022-12-21T06:52:01+00:00","description":"We'll tell you how to get more malware data while exploring open directories. Check out use cases and videos in the article.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/open-directories\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/open-directories\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/open-directories\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malicious History","item":"https:\/\/any.run\/cybersecurity-blog\/category\/history\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Treasures in Open Directories"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1253"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1253"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1253\/revisions"}],"predecessor-version":[{"id":3790,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1253\/revisions\/3790"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3198"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}