{"id":430,"date":"2020-04-07T07:58:04","date_gmt":"2020-04-07T07:58:04","guid":{"rendered":"https:\/\/rndpedia.com\/blog\/?p=430"},"modified":"2024-06-19T09:57:02","modified_gmt":"2024-06-19T09:57:02","slug":"what-is-human-based-social-engineering","status":"publish","type":"post","link":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/","title":{"rendered":"What is human based social engineering?"},"content":{"rendered":"\n<p>In human-based social engineering attacks, the social engineer interacts directly with the target to get information. <\/p>\n\n\n\n<p>An example of this type of attack would be where the attacker calls the database administrator asking to reset the password for the targets account from a remote location by gathering the user information from any remote social networking site of the XYZ company.<\/p>\n\n\n\n<p><strong>Human-based social engineering can be categorized as follows:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Piggybacking:<\/strong> In this type of attack the attacker takes advantage by tricking authorized personnel to get inside a restricted area of the targeted company, such as the server room. For example, attacker X enters the ABC company as a candidate for an interview but later enters a restricted area by tricking an authorized person, claiming that he is a new employee of the company and so doesn&#8217;t have an employee ID, and using the targets ID card.<\/li>\n\n\n\n<li><strong>Impersonating:<\/strong> In this type of attack, a social engineer pretends to be a valid employee of the organization and gains physical access. This can be perfectly carried out in the real world by wearing a suit or duplicate ID for the company. Once inside the premises, the social engineer can gain valuable information from a desktop computer.<\/li>\n<\/ul>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<!-- horizintal -->\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"8832200140\"\n     data-ad-format=\"auto\"\n     data-full-width-responsive=\"true\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Eavesdropping:<\/strong> This is the unauthorized listening to of communication between two people or the reading of private messages. It can be performed using communication channels such as telephone lines and e-mails.<\/li>\n\n\n\n<li><strong>Reverse social engineering:<\/strong> This is when the attacker creates a persona that appears to be in a position of authority. In such a situation, the target will ask for the information that they want. Reverse engineering attacks usually occur in areas of marketing and technical support.<\/li>\n\n\n\n<li><strong>Dumpster diving:<\/strong> Dumpster diving involves looking in the trash can for information written on pieces of paper or computer printouts. The hacker can often find passwords, filenames, or other pieces of confidential information in trash cans.<\/li>\n\n\n\n<li><strong>Posing as a legitimate end user:<\/strong> In this type of attack, the social engineer assumes the identity of a legitimate user and tries to get the information, for example, calling the help desk and saying, &#8220;Hi, I am Mary from the X department. I do not remember my account password; can you help me out?&#8221;<\/li>\n<\/ul>\n\n\n\n<p> Next tutorials, I will discuss about &#8220;Computer-based social engineering&#8221;<\/p>\n\n\n\n<p>Thanks<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-format=\"autorelaxed\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"6076785113\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>In human-based social engineering attacks, the social engineer interacts directly with the target to get information. An example of this type of attack would be where the attacker calls the database administrator asking to reset the password for the targets account from a remote location by gathering the user information from any remote social networking [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":432,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[35,125,129,221],"class_list":["post-430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking","tag-attack","tag-hacker","tag-human-based","tag-social-engg"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is human based social engineering? - Nesark | Tutorials<\/title>\n<meta name=\"description\" content=\"Social engineering is an attack vector that relies heavily on human interaction and often ... From there, the hacker can design an attack based on....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is human based social engineering? - Nesark | Tutorials\" \/>\n<meta property=\"og:description\" content=\"Social engineering is an attack vector that relies heavily on human interaction and often ... From there, the hacker can design an attack based on....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Nesark | Tutorials\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nesarktech\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-07T07:58:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-19T09:57:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ram Nath Das\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ram Nath Das\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/\"},\"author\":{\"name\":\"Ram Nath Das\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#\\\/schema\\\/person\\\/5282df381645953288b5502b89a86126\"},\"headline\":\"What is human based social engineering?\",\"datePublished\":\"2020-04-07T07:58:04+00:00\",\"dateModified\":\"2024-06-19T09:57:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/\"},\"wordCount\":387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Untitled-design-1.png\",\"keywords\":[\"attack\",\"hacker\",\"human based\",\"social engg\"],\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/\",\"name\":\"What is human based social engineering? - Nesark | Tutorials\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Untitled-design-1.png\",\"datePublished\":\"2020-04-07T07:58:04+00:00\",\"dateModified\":\"2024-06-19T09:57:02+00:00\",\"description\":\"Social engineering is an attack vector that relies heavily on human interaction and often ... From there, the hacker can design an attack based on....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Untitled-design-1.png\",\"contentUrl\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Untitled-design-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/what-is-human-based-social-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is human based social engineering?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/\",\"name\":\"Nesark | Tutorials\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#organization\",\"name\":\"Nesark Worldservices Pvt. Ltd.\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Mask-Group-7.png\",\"contentUrl\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Mask-Group-7.png\",\"width\":200,\"height\":59,\"caption\":\"Nesark Worldservices Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/nesarktech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/nesarktech\",\"https:\\\/\\\/www.youtube.com\\\/nesarktech\",\"https:\\\/\\\/www.instagram.com\\\/nesarktech\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/#\\\/schema\\\/person\\\/5282df381645953288b5502b89a86126\",\"name\":\"Ram Nath Das\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"caption\":\"Ram Nath Das\"},\"description\":\"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.\",\"sameAs\":[\"https:\\\/\\\/www.nesark.com\\\/blog\"],\"url\":\"https:\\\/\\\/www.nesark.com\\\/blog\\\/author\\\/ramnathdas6\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is human based social engineering? - Nesark | Tutorials","description":"Social engineering is an attack vector that relies heavily on human interaction and often ... From there, the hacker can design an attack based on....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/","og_locale":"en_US","og_type":"article","og_title":"What is human based social engineering? - Nesark | Tutorials","og_description":"Social engineering is an attack vector that relies heavily on human interaction and often ... From there, the hacker can design an attack based on....","og_url":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/","og_site_name":"Nesark | Tutorials","article_publisher":"https:\/\/www.facebook.com\/nesarktech","article_published_time":"2020-04-07T07:58:04+00:00","article_modified_time":"2024-06-19T09:57:02+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design-1.png","type":"image\/png"}],"author":"Ram Nath Das","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ram Nath Das","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/#article","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/"},"author":{"name":"Ram Nath Das","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126"},"headline":"What is human based social engineering?","datePublished":"2020-04-07T07:58:04+00:00","dateModified":"2024-06-19T09:57:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/"},"wordCount":387,"commentCount":0,"publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design-1.png","keywords":["attack","hacker","human based","social engg"],"articleSection":["Ethical Hacking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/","url":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/","name":"What is human based social engineering? - Nesark | Tutorials","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design-1.png","datePublished":"2020-04-07T07:58:04+00:00","dateModified":"2024-06-19T09:57:02+00:00","description":"Social engineering is an attack vector that relies heavily on human interaction and often ... From there, the hacker can design an attack based on....","breadcrumb":{"@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/#primaryimage","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design-1.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/04\/Untitled-design-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.nesark.com\/blog\/what-is-human-based-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nesark.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is human based social engineering?"}]},{"@type":"WebSite","@id":"https:\/\/www.nesark.com\/blog\/#website","url":"https:\/\/www.nesark.com\/blog\/","name":"Nesark | Tutorials","description":"Blog","publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nesark.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nesark.com\/blog\/#organization","name":"Nesark Worldservices Pvt. Ltd.","url":"https:\/\/www.nesark.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","width":200,"height":59,"caption":"Nesark Worldservices Pvt. Ltd."},"image":{"@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nesarktech","https:\/\/www.linkedin.com\/company\/nesarktech","https:\/\/www.youtube.com\/nesarktech","https:\/\/www.instagram.com\/nesarktech"]},{"@type":"Person","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126","name":"Ram Nath Das","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","caption":"Ram Nath Das"},"description":"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.","sameAs":["https:\/\/www.nesark.com\/blog"],"url":"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/comments?post=430"}],"version-history":[{"count":1,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/430\/revisions"}],"predecessor-version":[{"id":1240,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/430\/revisions\/1240"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media\/432"}],"wp:attachment":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media?parent=430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/categories?post=430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/tags?post=430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}