{"id":224,"date":"2020-02-29T18:09:40","date_gmt":"2020-02-29T18:09:40","guid":{"rendered":"https:\/\/rndpedia.com\/blog\/?p=224"},"modified":"2024-07-22T01:54:07","modified_gmt":"2024-07-22T01:54:07","slug":"top-five-phase-performed-by-hackers","status":"publish","type":"post","link":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/","title":{"rendered":"Top five phase performed by hackers."},"content":{"rendered":"\n<p><strong>Phase I: Reconnaissance<\/strong><br>Reconnaissance can be described as the pre-attack phase and is a systematic attempt to locate, gather, identify, and record information about the target. The Hacker seeks to find out as much information as possible about the target.<br><strong>Phase II: Scanning and Enumeration<\/strong><br>Scanning and enumeration is considered the second pre-attack phase. This phase involves taking the information discovered during reconnaissance and using it to examine the network. Scanning involves steps such as intelligent system port scanning which is used to determine open ports and vulnerable services. In this stage the attacker can use different automated tools to discover system vulnerabilities.<\/p>\n\n\n\n<p><strong>Phase III: Gaining Access<\/strong><br>This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the Hacker uses for an exploit can be a local area network, local access to a PC, the Internet, or offline. Gaining access is known in the Hacker world as owning the system. During a real security breach it would be this stage where the Hacker can utilize simple techniques to cause irreparable damage to the target system.<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<!-- horizintal -->\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"8832200140\"\n     data-ad-format=\"auto\"\n     data-full-width-responsive=\"true\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n\n\n\n<p><strong>Phase IV: Maintaining Access and Placing Backdoors<\/strong><br>Once a Hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes, Hackers harden the system from other Hackers or security personnel by securing their exclusive access with Backdoors, Root kits, and Trojans.<br>The attacker can use automated scripts and automated tools for hiding attack evidence and also to create backdoors for further attack.<br><strong>Phase V: Clearing Tracks<\/strong><br>In this phase, once Hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. At present, many successful security breaches are made but never detected. This includes cases where firewalls and vigilant log checking were in place.<\/p>\n\n\n\n<p>Thanks&#8230;<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-format=\"autorelaxed\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"6076785113\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Phase I: ReconnaissanceReconnaissance can be described as the pre-attack phase and is a systematic attempt to locate, gather, identify, and record information about the target. The Hacker seeks to find out as much information as possible about the target.Phase II: Scanning and EnumerationScanning and enumeration is considered the second pre-attack phase. This phase involves taking [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":228,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[126,180,201],"class_list":["post-224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking","tag-hackers","tag-phase","tag-reconnaissance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top five phase performed by hackers. - Nesark | Tutorials<\/title>\n<meta name=\"description\" content=\"In general, there are five Hacking phases: ... Hacking Phase: Reconnaissance ... to extract information from the target or use that device to perform.....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top five phase performed by hackers. - Nesark | Tutorials\" \/>\n<meta property=\"og:description\" content=\"In general, there are five Hacking phases: ... Hacking Phase: Reconnaissance ... to extract information from the target or use that device to perform.....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Nesark | Tutorials\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nesarktech\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-29T18:09:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-22T01:54:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/Untitled-design-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ram Nath Das\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ram Nath Das\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/\"},\"author\":{\"name\":\"Ram Nath Das\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#\\\/schema\\\/person\\\/5282df381645953288b5502b89a86126\"},\"headline\":\"Top five phase performed by hackers.\",\"datePublished\":\"2020-02-29T18:09:40+00:00\",\"dateModified\":\"2024-07-22T01:54:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/\"},\"wordCount\":334,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Untitled-design-1.png\",\"keywords\":[\"Hackers\",\"Phase\",\"Reconnaissance\"],\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/\",\"name\":\"Top five phase performed by hackers. - Nesark | Tutorials\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Untitled-design-1.png\",\"datePublished\":\"2020-02-29T18:09:40+00:00\",\"dateModified\":\"2024-07-22T01:54:07+00:00\",\"description\":\"In general, there are five Hacking phases: ... Hacking Phase: Reconnaissance ... to extract information from the target or use that device to perform.....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Untitled-design-1.png\",\"contentUrl\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Untitled-design-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/top-five-phase-performed-by-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top five phase performed by hackers.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/\",\"name\":\"Nesark | Tutorials\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#organization\",\"name\":\"Nesark Worldservices Pvt. Ltd.\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Mask-Group-7.png\",\"contentUrl\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Mask-Group-7.png\",\"width\":200,\"height\":59,\"caption\":\"Nesark Worldservices Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/nesarktech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/nesarktech\",\"https:\\\/\\\/www.youtube.com\\\/nesarktech\",\"https:\\\/\\\/www.instagram.com\\\/nesarktech\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#\\\/schema\\\/person\\\/5282df381645953288b5502b89a86126\",\"name\":\"Ram Nath Das\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"caption\":\"Ram Nath Das\"},\"description\":\"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.\",\"sameAs\":[\"https:\\\/\\\/www.nesark.com\\\/blog\"],\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/author\\\/ramnathdas6\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top five phase performed by hackers. - Nesark | Tutorials","description":"In general, there are five Hacking phases: ... Hacking Phase: Reconnaissance ... to extract information from the target or use that device to perform.....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Top five phase performed by hackers. - Nesark | Tutorials","og_description":"In general, there are five Hacking phases: ... Hacking Phase: Reconnaissance ... to extract information from the target or use that device to perform.....","og_url":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/","og_site_name":"Nesark | Tutorials","article_publisher":"https:\/\/www.facebook.com\/nesarktech","article_published_time":"2020-02-29T18:09:40+00:00","article_modified_time":"2024-07-22T01:54:07+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/Untitled-design-1.png","type":"image\/png"}],"author":"Ram Nath Das","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ram Nath Das","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/#article","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/"},"author":{"name":"Ram Nath Das","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126"},"headline":"Top five phase performed by hackers.","datePublished":"2020-02-29T18:09:40+00:00","dateModified":"2024-07-22T01:54:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/"},"wordCount":334,"commentCount":0,"publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/Untitled-design-1.png","keywords":["Hackers","Phase","Reconnaissance"],"articleSection":["Ethical Hacking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/","url":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/","name":"Top five phase performed by hackers. - Nesark | Tutorials","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/Untitled-design-1.png","datePublished":"2020-02-29T18:09:40+00:00","dateModified":"2024-07-22T01:54:07+00:00","description":"In general, there are five Hacking phases: ... Hacking Phase: Reconnaissance ... to extract information from the target or use that device to perform.....","breadcrumb":{"@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/#primaryimage","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/Untitled-design-1.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/02\/Untitled-design-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.nesark.com\/blog\/top-five-phase-performed-by-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nesark.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Top five phase performed by hackers."}]},{"@type":"WebSite","@id":"https:\/\/www.nesark.com\/blog\/#website","url":"https:\/\/www.nesark.com\/blog\/","name":"Nesark | Tutorials","description":"Blog","publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nesark.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nesark.com\/blog\/#organization","name":"Nesark Worldservices Pvt. Ltd.","url":"https:\/\/www.nesark.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","width":200,"height":59,"caption":"Nesark Worldservices Pvt. Ltd."},"image":{"@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nesarktech","https:\/\/www.linkedin.com\/company\/nesarktech","https:\/\/www.youtube.com\/nesarktech","https:\/\/www.instagram.com\/nesarktech"]},{"@type":"Person","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126","name":"Ram Nath Das","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","caption":"Ram Nath Das"},"description":"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.","sameAs":["https:\/\/www.nesark.com\/blog"],"url":"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/comments?post=224"}],"version-history":[{"count":1,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/224\/revisions"}],"predecessor-version":[{"id":1290,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/224\/revisions\/1290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media\/228"}],"wp:attachment":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media?parent=224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/categories?post=224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/tags?post=224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}