{"id":229,"date":"2020-03-02T00:37:11","date_gmt":"2020-03-02T00:37:11","guid":{"rendered":"https:\/\/rndpedia.com\/blog\/?p=229"},"modified":"2024-07-22T01:51:44","modified_gmt":"2024-07-22T01:51:44","slug":"what-do-ethical-hackers-do-roles-and-responsibilities","status":"publish","type":"post","link":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/","title":{"rendered":"What do Ethical Hackers do? Roles and Responsibilities"},"content":{"rendered":"\n<p>Every Ethical Hacker must follow few basic principles. If he do not follow, bad things can happen. Most of the time these principles get ignored or forgotten when planning or executing ethical hacking tests. The results are even very dangerous.<\/p>\n\n\n\n<p><strong>Working ethically:<\/strong><br>The word ethical can be defined as working with high professional morals and principles. Whether you\u2019re performing ethical hacking tests against your own systems or for someone who has hired you, everything you do as an ethical Hacker must be approved and must support the company\u2019s goals. No hidden agendas are allowed! Trustworthiness is the ultimate objective. The misuse of information is absolutely not allowed. That\u2019s what the bad guys do.<\/p>\n\n\n\n<p><strong>Respecting privacy:<\/strong><br>Treat the information you gather with complete respect. All information you obtain during your testing \u2014 from Web application log files to clear-text passwords \u2014 must be kept private.<\/p>\n\n\n\n<p><strong>Not crashing your systems:<\/strong><br>One of the biggest mistakes is when people try to hack their own systems; they come up with crashing their systems. The main reason for this is poor planning. These testers have not read the documentation or misunderstand the usage and power of the security tools and techniques.<br>You can easily create miserable conditions on your systems when testing. Running too many tests too quickly on a system causes many system lockups. Many security assessment tools can control how many tests are performed on a system at the same time. These tools are especially handy if you need to run the tests on production systems during regular business hours.<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<!-- horizintal -->\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"8832200140\"\n     data-ad-format=\"auto\"\n     data-full-width-responsive=\"true\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n\n\n\n<p><strong>Executing the plan:<\/strong><br>In Ethical hacking, Time and patience are important. Be careful when you\u2019re performing your ethical hacking tests.<br>A Hacker in your network or an employee looking over your shoulder may watch what\u2019s going on. This person could use this information against you. It\u2019s not practical to make sure that no Hackers are on your systems before you start. Just make sure you keep everything as quiet and private as possible.<br>This is especially critical when transmitting and storing your test results. You\u2019re now on a reconnaissance mission.<br>Find as much information as possible about your organization and systems, which is what malicious Hackers do. Start with a broad view of mind and narrow your focus. Search the Internet for your organization\u2019s name, your computer and network system names, and your IP addresses. Google is a great place to start for this.<br>Don\u2019t take ethical hacking too far, though. It makes little sense to harden your systems from unlikely attacks. For instance, if you don\u2019t have a internal Web server running, you may not have to worry too much about. However, don\u2019t forget about insider threats from malicious employees or your friends or colleagues!<\/p>\n\n\n\n<p><strong>\u201cNever share your password with anyone even with your Boyfriend(s) or Girlfriend(s)\u201d.<\/strong><\/p>\n\n\n\n<p>Thanks&#8230;<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-format=\"autorelaxed\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"6076785113\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Every Ethical Hacker must follow few basic principles. If he do not follow, bad things can happen. Most of the time these principles get ignored or forgotten when planning or executing ethical hacking tests. The results are even very dangerous. Working ethically:The word ethical can be defined as working with high professional morals and principles. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":231,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[89,98,209],"class_list":["post-229","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking","tag-duties","tag-ethical-hackers","tag-roles-and-responsibilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What do Ethical Hackers do? Roles and Responsibilities Nesark | Tutorials<\/title>\n<meta name=\"description\" content=\"Apart from the regular pen tester duties, ethical hackers are associated with other responsibilities. Now let us go over the roles and responsibilities....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What do Ethical Hackers do? Roles and Responsibilities Nesark | Tutorials\" \/>\n<meta property=\"og:description\" content=\"Apart from the regular pen tester duties, ethical hackers are associated with other responsibilities. Now let us go over the roles and responsibilities....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Nesark | Tutorials\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nesarktech\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-02T00:37:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-22T01:51:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ram Nath Das\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ram Nath Das\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/\"},\"author\":{\"name\":\"Ram Nath Das\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126\"},\"headline\":\"What do Ethical Hackers do? Roles and Responsibilities\",\"datePublished\":\"2020-03-02T00:37:11+00:00\",\"dateModified\":\"2024-07-22T01:51:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/\"},\"wordCount\":485,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png\",\"keywords\":[\"Duties\",\"Ethical hackers\",\"Roles and Responsibilities\"],\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/\",\"url\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/\",\"name\":\"What do Ethical Hackers do? Roles and Responsibilities Nesark | Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png\",\"datePublished\":\"2020-03-02T00:37:11+00:00\",\"dateModified\":\"2024-07-22T01:51:44+00:00\",\"description\":\"Apart from the regular pen tester duties, ethical hackers are associated with other responsibilities. Now let us go over the roles and responsibilities....\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#primaryimage\",\"url\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png\",\"contentUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nesark.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What do Ethical Hackers do? Roles and Responsibilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#website\",\"url\":\"https:\/\/www.nesark.com\/blog\/\",\"name\":\"Nesark | Tutorials\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nesark.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\",\"name\":\"Nesark Worldservices Pvt. Ltd.\",\"url\":\"https:\/\/www.nesark.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png\",\"contentUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png\",\"width\":200,\"height\":59,\"caption\":\"Nesark Worldservices Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nesarktech\",\"https:\/\/www.linkedin.com\/company\/nesarktech\",\"https:\/\/www.youtube.com\/nesarktech\",\"https:\/\/www.instagram.com\/nesarktech\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126\",\"name\":\"Ram Nath Das\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"caption\":\"Ram Nath Das\"},\"description\":\"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.\",\"sameAs\":[\"https:\/\/www.nesark.com\/blog\"],\"url\":\"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What do Ethical Hackers do? Roles and Responsibilities Nesark | Tutorials","description":"Apart from the regular pen tester duties, ethical hackers are associated with other responsibilities. Now let us go over the roles and responsibilities....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/","og_locale":"en_US","og_type":"article","og_title":"What do Ethical Hackers do? Roles and Responsibilities Nesark | Tutorials","og_description":"Apart from the regular pen tester duties, ethical hackers are associated with other responsibilities. Now let us go over the roles and responsibilities....","og_url":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/","og_site_name":"Nesark | Tutorials","article_publisher":"https:\/\/www.facebook.com\/nesarktech","article_published_time":"2020-03-02T00:37:11+00:00","article_modified_time":"2024-07-22T01:51:44+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png","type":"image\/png"}],"author":"Ram Nath Das","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ram Nath Das","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#article","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/"},"author":{"name":"Ram Nath Das","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126"},"headline":"What do Ethical Hackers do? Roles and Responsibilities","datePublished":"2020-03-02T00:37:11+00:00","dateModified":"2024-07-22T01:51:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/"},"wordCount":485,"commentCount":0,"publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png","keywords":["Duties","Ethical hackers","Roles and Responsibilities"],"articleSection":["Ethical Hacking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/","url":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/","name":"What do Ethical Hackers do? Roles and Responsibilities Nesark | Tutorials","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#primaryimage"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png","datePublished":"2020-03-02T00:37:11+00:00","dateModified":"2024-07-22T01:51:44+00:00","description":"Apart from the regular pen tester duties, ethical hackers are associated with other responsibilities. Now let us go over the roles and responsibilities....","breadcrumb":{"@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#primaryimage","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/03\/Roles-and-Responsibilities.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.nesark.com\/blog\/what-do-ethical-hackers-do-roles-and-responsibilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nesark.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What do Ethical Hackers do? Roles and Responsibilities"}]},{"@type":"WebSite","@id":"https:\/\/www.nesark.com\/blog\/#website","url":"https:\/\/www.nesark.com\/blog\/","name":"Nesark | Tutorials","description":"Blog","publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nesark.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nesark.com\/blog\/#organization","name":"Nesark Worldservices Pvt. Ltd.","url":"https:\/\/www.nesark.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","width":200,"height":59,"caption":"Nesark Worldservices Pvt. Ltd."},"image":{"@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nesarktech","https:\/\/www.linkedin.com\/company\/nesarktech","https:\/\/www.youtube.com\/nesarktech","https:\/\/www.instagram.com\/nesarktech"]},{"@type":"Person","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126","name":"Ram Nath Das","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","caption":"Ram Nath Das"},"description":"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.","sameAs":["https:\/\/www.nesark.com\/blog"],"url":"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":1,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/229\/revisions"}],"predecessor-version":[{"id":1289,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/229\/revisions\/1289"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media\/231"}],"wp:attachment":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media?parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/categories?post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/tags?post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}