{"id":571,"date":"2020-10-28T03:09:52","date_gmt":"2020-10-28T03:09:52","guid":{"rendered":"https:\/\/rndpedia.com\/blog\/?p=571"},"modified":"2024-06-19T09:42:39","modified_gmt":"2024-06-19T09:42:39","slug":"what-are-hacking-methodologies","status":"publish","type":"post","link":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/","title":{"rendered":"What are Hacking Methodologies?"},"content":{"rendered":"\n<p>A hacking methodology refers to the step-by-step approach used by an aggressor to attack a target such as a computer network. There is no specific step-by-step approach used by all hackers. As can be expected when a group operates outside the rules as hackers do, rules do not apply the same way. A major difference between a hacker and an ethical hacker is the code of ethics to which each subscribes. <\/p>\n\n\n\n<p>The following steps, make up the hacking process:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Footprinting means that you are using primarily passive methods of gaining information from a target prior to performing the later active methods. Typically, you keep interaction with your target to a minimum to avoid detection, thus alerting the target that something is coming in their direction. A myriad of methods is available to perform this task, such as Whois queries, Google searches, job board searches, and discussion groups.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scanning is the phase in which you take the information gleaned from the footprinting phase and use it to target your attack much more precisely. The idea here is to act on the information from the prior phase, not to blunder around without purpose, and set off alarms. Scanning means performing tasks like ping sweeps, port scans, and observations of facilities. One of the tools you will use is Nmap, which is very useful for this purpose.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enumeration is the next phase, where you extract much more detailed information about what you uncovered in the scanning phase to determine its usefulness. Think of the information gathered in the previous phase as walking down a hallway and rattling the doorknobs, taking note of which ones turn and which ones do not. Just because a door is unlocked doesn\u2019t mean anything of use is behind it. In this phase, you are looking behind the door to see if there is anything of value behind it. The results of this step can include a list of usernames, groups, applications, banner settings, and auditing information.<\/li>\n<\/ul>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<!-- horizintal -->\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"8832200140\"\n     data-ad-format=\"auto\"\n     data-full-width-responsive=\"true\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n\n\n\n<ul class=\"wp-block-list\">\n<li>System hacking follows enumeration. You can now plan and execute an attack based on the information you uncovered. You could, for example, start choosing user accounts to attack based on the ones uncovered in the enumeration phase. You could also start crafting an attack based on service information uncovered by retrieving banners from applications or services.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Escalation of privilege is the hacking phase, where you can start to obtain privileges that are granted to higher privileged accounts than you broke into originally. Depending on your skills, it might be possible to move from a low-level account such as a guest account all the way up to administrator or system-level access.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Covering tracks is the phase when you attempt to remove evidence of your presence in a system. You purge log files and destroy other evidence that might give away the valuable clues needed for the system owner to determine an attack occurred. Think of it this way: If someone were to pick a lock to get into your house versus throwing a brick through the window, the clues are much less obvious in the former than the latter. In the latter case, you would look for what the visitor took immediately, and in the former case, you might notice the break-in much later, after the trail had gone cold.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Planting of backdoors means to leave something behind that would enable you to come back later if you wanted. Items such as special accounts or Trojan horses come to mind.<\/li>\n<\/ul>\n\n\n\n<p>Ethical hackers not only will have permission prior to starting the first<br> phase but will also be generating a report that they will present at the end of the process.<\/p>\n\n\n\n<p> Next tutorials, I will discuss about \u201cWhat Is Incident Response?\u201d. <\/p>\n\n\n\n<p>Thanks<\/p>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1910841001912053\"\n     crossorigin=\"anonymous\"><\/script>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-format=\"autorelaxed\"\n     data-ad-client=\"ca-pub-1910841001912053\"\n     data-ad-slot=\"6076785113\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>A hacking methodology refers to the step-by-step approach used by an aggressor to attack a target such as a computer network. There is no specific step-by-step approach used by all hackers. As can be expected when a group operates outside the rules as hackers do, rules do not apply the same way. A major difference [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":572,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[127,128],"class_list":["post-571","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking","tag-hacking","tag-hacking-techniques"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are Hacking Methodologies? - Nesark | Tutorials<\/title>\n<meta name=\"description\" content=\"Footprinting means that you are using primarily passive methods of gaining information from a target prior to performing the later active methods.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are Hacking Methodologies? - Nesark | Tutorials\" \/>\n<meta property=\"og:description\" content=\"Footprinting means that you are using primarily passive methods of gaining information from a target prior to performing the later active methods.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/\" \/>\n<meta property=\"og:site_name\" content=\"Nesark | Tutorials\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nesarktech\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-28T03:09:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-19T09:42:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ram Nath Das\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ram Nath Das\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/\"},\"author\":{\"name\":\"Ram Nath Das\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126\"},\"headline\":\"What are Hacking Methodologies?\",\"datePublished\":\"2020-10-28T03:09:52+00:00\",\"dateModified\":\"2024-06-19T09:42:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/\"},\"wordCount\":623,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png\",\"keywords\":[\"hacking\",\"Hacking Techniques\"],\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/\",\"url\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/\",\"name\":\"What are Hacking Methodologies? - Nesark | Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png\",\"datePublished\":\"2020-10-28T03:09:52+00:00\",\"dateModified\":\"2024-06-19T09:42:39+00:00\",\"description\":\"Footprinting means that you are using primarily passive methods of gaining information from a target prior to performing the later active methods.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#primaryimage\",\"url\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png\",\"contentUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nesark.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are Hacking Methodologies?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#website\",\"url\":\"https:\/\/www.nesark.com\/blog\/\",\"name\":\"Nesark | Tutorials\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nesark.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#organization\",\"name\":\"Nesark Worldservices Pvt. Ltd.\",\"url\":\"https:\/\/www.nesark.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png\",\"contentUrl\":\"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png\",\"width\":200,\"height\":59,\"caption\":\"Nesark Worldservices Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nesarktech\",\"https:\/\/www.linkedin.com\/company\/nesarktech\",\"https:\/\/www.youtube.com\/nesarktech\",\"https:\/\/www.instagram.com\/nesarktech\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126\",\"name\":\"Ram Nath Das\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g\",\"caption\":\"Ram Nath Das\"},\"description\":\"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.\",\"sameAs\":[\"https:\/\/www.nesark.com\/blog\"],\"url\":\"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are Hacking Methodologies? - Nesark | Tutorials","description":"Footprinting means that you are using primarily passive methods of gaining information from a target prior to performing the later active methods.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/","og_locale":"en_US","og_type":"article","og_title":"What are Hacking Methodologies? - Nesark | Tutorials","og_description":"Footprinting means that you are using primarily passive methods of gaining information from a target prior to performing the later active methods.","og_url":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/","og_site_name":"Nesark | Tutorials","article_publisher":"https:\/\/www.facebook.com\/nesarktech","article_published_time":"2020-10-28T03:09:52+00:00","article_modified_time":"2024-06-19T09:42:39+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png","type":"image\/png"}],"author":"Ram Nath Das","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ram Nath Das","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#article","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/"},"author":{"name":"Ram Nath Das","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126"},"headline":"What are Hacking Methodologies?","datePublished":"2020-10-28T03:09:52+00:00","dateModified":"2024-06-19T09:42:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/"},"wordCount":623,"commentCount":0,"publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png","keywords":["hacking","Hacking Techniques"],"articleSection":["Ethical Hacking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/","url":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/","name":"What are Hacking Methodologies? - Nesark | Tutorials","isPartOf":{"@id":"https:\/\/www.nesark.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#primaryimage"},"image":{"@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png","datePublished":"2020-10-28T03:09:52+00:00","dateModified":"2024-06-19T09:42:39+00:00","description":"Footprinting means that you are using primarily passive methods of gaining information from a target prior to performing the later active methods.","breadcrumb":{"@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#primaryimage","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2020\/10\/Untitled-design-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.nesark.com\/blog\/what-are-hacking-methodologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nesark.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What are Hacking Methodologies?"}]},{"@type":"WebSite","@id":"https:\/\/www.nesark.com\/blog\/#website","url":"https:\/\/www.nesark.com\/blog\/","name":"Nesark | Tutorials","description":"Blog","publisher":{"@id":"https:\/\/www.nesark.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nesark.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nesark.com\/blog\/#organization","name":"Nesark Worldservices Pvt. Ltd.","url":"https:\/\/www.nesark.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","contentUrl":"https:\/\/www.nesark.com\/blog\/wp-content\/uploads\/2021\/10\/Mask-Group-7.png","width":200,"height":59,"caption":"Nesark Worldservices Pvt. Ltd."},"image":{"@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nesarktech","https:\/\/www.linkedin.com\/company\/nesarktech","https:\/\/www.youtube.com\/nesarktech","https:\/\/www.instagram.com\/nesarktech"]},{"@type":"Person","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/5282df381645953288b5502b89a86126","name":"Ram Nath Das","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nesark.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/059938dcfb66a295197ca697bf38c5947e4b3fae2e51dfbbbdb1d44f2c3a893f?s=96&d=mm&r=g","caption":"Ram Nath Das"},"description":"I'm a results-driven professional with a passion for leveraging digital strategies to drive business growth. With 6 years of experience in the dynamic fields of marketing, social media, Google - Facebook Ads and SMS marketing, I specialize in creating impactful campaigns that resonate with audiences and deliver measurable results. Let's Connect: I believe in the power of networking and collaboration. Feel free to reach out, connect, or send me a message. Together, we can uncover new possibilities and chart a course for success in the ever-evolving digital landscape. Thank you.","sameAs":["https:\/\/www.nesark.com\/blog"],"url":"https:\/\/www.nesark.com\/blog\/author\/ramnathdas6\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/comments?post=571"}],"version-history":[{"count":1,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/571\/revisions"}],"predecessor-version":[{"id":1223,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/posts\/571\/revisions\/1223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media\/572"}],"wp:attachment":[{"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/media?parent=571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/categories?post=571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nesark.com\/blog\/wp-json\/wp\/v2\/tags?post=571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}