{"id":213,"date":"2020-02-10T10:41:19","date_gmt":"2020-02-10T10:41:19","guid":{"rendered":"https:\/\/rndpedia.com\/blog\/?p=213"},"modified":"2024-07-22T01:57:46","modified_gmt":"2024-07-22T01:57:46","slug":"types-of-hackers-and-what-they-do-white-black-and-grey","status":"publish","type":"post","link":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/","title":{"rendered":"TYPES OF HACKERS AND WHAT THEY DO ?"},"content":{"rendered":"\n<p><strong>Types of Hackers on the basis of activities performed by them.<\/strong><\/p>\n\n\n\n<p><strong>White Hat Hacker<\/strong>:- A White Hat Hacker is computer guy who perform Ethical Hacking. These are usually security professionals with knowledge of hacking and the Hacker toolset and who use this knowledge to locate security weaknesses and implement counter measures in the resources.<br>They are also known as an Ethical Hacker or a Penetration Tester. They focus on Securing and Protecting IT Systems.<\/p>\n\n\n\n<p><strong>Black Hat Hacker<\/strong>:- A Black Hat Hacker is computer guy who performs Unethical Hacking. These are the Criminal Hackers or Crackers who use their skills and knowledge for illegal or malicious purposes. They break into or otherwise violate the system integrity of remote machines, with malicious intent.<br>These are also known as an Unethical Hacker or a Security Cracker. They focus on Security Cracking and Data stealing.<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<!-- horizintal -->\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"8832200140\"\n     data-ad-format=\"auto\"\n     data-full-width-responsive=\"true\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n\n\n\n<p><strong>Grey Hat Hacker<\/strong>:- A Grey Hat Hacker is a Computer guy who sometimes acts legally, sometimes in good will, and sometimes not.<br>They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.<br>They are hybrid between White Hat and Black Hat Hackers.<\/p>\n\n\n\n<p>Thanks&#8230;<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-format=\"autorelaxed\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"6076785113\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Types of Hackers on the basis of activities performed by them. White Hat Hacker:- A White Hat Hacker is computer guy who perform Ethical Hacking. These are usually security professionals with knowledge of hacking and the Hacker toolset and who use this knowledge to locate security weaknesses and implement counter measures in the resources.They are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":215,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[126,128,249],"class_list":["post-213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking","tag-hackers","tag-hacking-techniques","tag-types"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TYPES OF HACKERS AND WHAT THEY DO ? - Nesark | Tutorials<\/title>\n<meta name=\"description\" content=\"Hackers can be classified into three different categories: Black Hat Hacker; White Hat Hacker; Grey Hat Hacker. White Hat Hackers Mission: To ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TYPES OF HACKERS AND WHAT THEY DO ? - Nesark | Tutorials\" \/>\n<meta property=\"og:description\" content=\"Hackers can be classified into three different categories: Black Hat Hacker; White Hat Hacker; Grey Hat Hacker. White Hat Hackers Mission: To ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/\" \/>\n<meta property=\"og:site_name\" content=\"Nesark | Tutorials\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nesarktech\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-10T10:41:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-22T01:57:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ram Nath Das\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ram Nath Das\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/\"},\"author\":{\"name\":\"Ram Nath Das\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126\"},\"headline\":\"TYPES OF HACKERS AND WHAT THEY DO ?\",\"datePublished\":\"2020-02-10T10:41:19+00:00\",\"dateModified\":\"2024-07-22T01:57:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/\"},\"wordCount\":211,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg\",\"keywords\":[\"Hackers\",\"Hacking Techniques\",\"TYPES\"],\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/\",\"url\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/\",\"name\":\"TYPES OF HACKERS AND WHAT THEY DO ? - Nesark | Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg\",\"datePublished\":\"2020-02-10T10:41:19+00:00\",\"dateModified\":\"2024-07-22T01:57:46+00:00\",\"description\":\"Hackers can be classified into three different categories: Black Hat Hacker; White Hat Hacker; Grey Hat Hacker. White Hat Hackers Mission: To ...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#primaryimage\",\"url\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg\",\"contentUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Types of Hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nesark.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TYPES OF HACKERS AND WHAT THEY DO ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#website\",\"url\":\"https:\/\/www.nesark.com\/blog\/\",\"name\":\"Nesark | Tutorials\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nesark.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\",\"name\":\"Nesark Worldservices Pvt. Ltd.\",\"url\":\"https:\/\/www.nesark.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png\",\"contentUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png\",\"width\":200,\"height\":59,\"caption\":\"Nesark Worldservices Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nesarktech\",\"https:\/\/www.linkedin.com\/company\/nesarktech\",\"https:\/\/www.youtube.com\/nesarktech\",\"https:\/\/www.instagram.com\/nesarktech\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126\",\"name\":\"Ram Nath Das\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"caption\":\"Ram Nath Das\"},\"description\":\"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.\",\"sameAs\":[\"https:\/\/www.nesark.com\/blog\"],\"url\":\"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TYPES OF HACKERS AND WHAT THEY DO ? - Nesark | Tutorials","description":"Hackers can be classified into three different categories: Black Hat Hacker; White Hat Hacker; Grey Hat Hacker. White Hat Hackers Mission: To ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/","og_locale":"en_US","og_type":"article","og_title":"TYPES OF HACKERS AND WHAT THEY DO ? - Nesark | Tutorials","og_description":"Hackers can be classified into three different categories: Black Hat Hacker; White Hat Hacker; Grey Hat Hacker. White Hat Hackers Mission: To ...","og_url":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/","og_site_name":"Nesark | Tutorials","article_publisher":"https:\/\/www.facebook.com\/nesarktech","article_published_time":"2020-02-10T10:41:19+00:00","article_modified_time":"2024-07-22T01:57:46+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg","type":"image\/jpeg"}],"author":"Ram Nath Das","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ram Nath Das","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#article","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/"},"author":{"name":"Ram Nath Das","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126"},"headline":"TYPES OF HACKERS AND WHAT THEY DO ?","datePublished":"2020-02-10T10:41:19+00:00","dateModified":"2024-07-22T01:57:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/"},"wordCount":211,"commentCount":0,"publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg","keywords":["Hackers","Hacking Techniques","TYPES"],"articleSection":["Ethical Hacking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/","url":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/","name":"TYPES OF HACKERS AND WHAT THEY DO ? - Nesark | Tutorials","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#primaryimage"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg","datePublished":"2020-02-10T10:41:19+00:00","dateModified":"2024-07-22T01:57:46+00:00","description":"Hackers can be classified into three different categories: Black Hat Hacker; White Hat Hacker; Grey Hat Hacker. White Hat Hackers Mission: To ...","breadcrumb":{"@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#primaryimage","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/2.jpg","width":1200,"height":628,"caption":"Types of Hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nesark.com\/blog\/types-of-hackers-and-what-they-do-white-black-and-grey\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nesark.com\/blog\/"},{"@type":"ListItem","position":2,"name":"TYPES OF HACKERS AND WHAT THEY DO ?"}]},{"@type":"WebSite","@id":"https:\/\/www.nesark.com\/blog\/#website","url":"https:\/\/www.nesark.com\/blog\/","name":"Nesark | Tutorials","description":"Blog","publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nesark.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nesark.com\/blog\/#organization","name":"Nesark Worldservices Pvt. Ltd.","url":"https:\/\/www.nesark.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","width":200,"height":59,"caption":"Nesark Worldservices Pvt. Ltd."},"image":{"@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nesarktech","https:\/\/www.linkedin.com\/company\/nesarktech","https:\/\/www.youtube.com\/nesarktech","https:\/\/www.instagram.com\/nesarktech"]},{"@type":"Person","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126","name":"Ram Nath Das","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","caption":"Ram Nath Das"},"description":"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.","sameAs":["https:\/\/www.nesark.com\/blog"],"url":"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":1,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/213\/revisions"}],"predecessor-version":[{"id":1292,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/213\/revisions\/1292"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media\/215"}],"wp:attachment":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media?parent=213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/categories?post=213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/tags?post=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}