{"id":83,"date":"2024-02-24T21:40:43","date_gmt":"2024-02-24T21:40:43","guid":{"rendered":"https:\/\/fin3ss3g0d.net\/?p=83"},"modified":"2024-04-08T21:44:50","modified_gmt":"2024-04-08T20:44:50","slug":"qr-code-phishing-with-evilgophish","status":"publish","type":"post","link":"https:\/\/fin3ss3g0d.net\/index.php\/2024\/02\/24\/qr-code-phishing-with-evilgophish\/","title":{"rendered":"QR Code Phishing with EvilGophish"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83\" class=\"elementor elementor-83\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c67f299 e-flex e-con-boxed e-con e-parent\" data-id=\"c67f299\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e0faad elementor-widget elementor-widget-text-editor\" data-id=\"8e0faad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the evolving landscape of cybersecurity, adversaries are continually seeking innovative methods to bypass traditional security measures. One such method gaining traction is the use of QR codes. At first glance, QR codes appear as benign tools for quick access to websites or information. However, their inherent characteristics offer unique advantages for cyber threats, particularly in evading detection. Here\u2019s why:<\/p><p><strong>1. Concealed URLs:<\/strong> Unlike traditional links where the destination is visible and can be scrutinized for legitimacy, QR codes mask the underlying URL. This obscurity allows malicious links to bypass initial human scrutiny, making them perfect trojans for phishing attacks.<\/p><p><strong>2. Evasion of Traditional Security Solutions:<\/strong> Many security systems are designed to scan and filter text-based content, such as emails and websites, for malicious links. QR codes, being graphical, do not fit into this text-based analysis, allowing them to slip through these defenses unnoticed.<\/p><p><strong>3. Bypassing Awareness Training:<\/strong> With extensive awareness around clicking on suspicious links, users have become more cautious. QR codes, however, exploit a gap in this awareness. The novelty and technological engagement encourage users to scan them, often bypassing the caution exercised with clickable links.<\/p><p><strong>4. Targeted Mobile Exploitation:<\/strong> QR codes are predominantly scanned by mobile devices, which might not always be equipped with the same level of security as desktop systems. This makes them a strategic choice for targeting the mobile ecosystem, from stealing personal data to injecting malware.<\/p><p><strong>5. Leveraging Physical and Digital Realms:<\/strong> QR codes uniquely bridge the physical and digital worlds. They can be placed anywhere, from posters to digital screens, reaching audiences outside the scope of digital-only strategies and evading digital tracking or filtering systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c60f73c e-flex e-con-boxed e-con e-parent\" data-id=\"c60f73c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db3c88a elementor-widget elementor-widget-heading\" data-id=\"db3c88a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">EvilGophish Weaponization<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec7622c e-flex e-con-boxed e-con e-parent\" data-id=\"ec7622c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f76ae89 elementor-widget elementor-widget-text-editor\" data-id=\"f76ae89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Now that we have a solid understanding of why adversaries might want to use QR codes in a social engineering campaign, let&#8217;s talk about weaponizing it ourselves using <em>EvilGophish<\/em>. This is a new feature only available to sponsors. To become a sponsor, select the appropriate tier from my list of tiers that will grant you access to the private Sponsors repository on GitHub Sponsors\u00a0<a href=\"https:\/\/github.com\/sponsors\/fin3ss3g0d\">here<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa471e3 e-flex e-con-boxed e-con e-parent\" data-id=\"aa471e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43c596a elementor-widget elementor-widget-heading\" data-id=\"43c596a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">EvilGophish Implementation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09621d9 e-flex e-con-boxed e-con e-parent\" data-id=\"09621d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1387153 elementor-widget elementor-widget-text-editor\" data-id=\"1387153\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I was thinking about how I could implement this feature so that it was as convenient as possible for an operator and I wanted to give operators full control over how QR codes would be inserted into emails. On top of this, I wanted the feature to be as potent and effective as possible. This meant putting in some thought as to how I was going to implement this. Instead of placing the images at the end of emails by default and removing a certain amount of control for operators or even including the images as attachments, I decided to create a new template variable for email templates <em><strong>{{.QR}}<\/strong><\/em>.<\/p><p><span style=\"font-style: inherit; font-weight: inherit; color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\">This will put the QR code as an inline image wherever you place the template variable, allowing full control for the operator as to where the image will be placed when the victim views the email. By placing the images inline, they are also more likely to be viewed or scanned rather than being included as a rogue attachment or a place in the email that doesn&#8217;t align with the pretext. The control over placement can also increase effectiveness. If there was not the ability to control the placement of the images, then the image may not fit certain pretexts or the amount of pretexts taking advantage of this feature would be more limited. Speaking of reducing limitations, operators also have full control over the height and width of included QR code images, allowing total customization when weaponizing this attack with EvilGophish. I figured this would be the easiest, most potent way for operators to use this new feature and would give operators the most amount of control.<\/span><\/p><p><span style=\"font-style: inherit; font-weight: inherit; color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\">The image below demonstrates including the new template variable inside of a HTML email template. This is the first step for using this new feature for an email campaign within EvilGophish.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f69761 e-flex e-con-boxed e-con e-parent\" data-id=\"5f69761\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f36963 elementor-widget elementor-widget-image\" data-id=\"3f36963\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1007\" src=\"https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-template-example-1024x1007.png\" class=\"attachment-large size-large wp-image-88\" alt=\"\" srcset=\"https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-template-example-1024x1007.png 1024w, https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-template-example-300x295.png 300w, https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-template-example-768x755.png 768w, https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-template-example.png 1034w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">HTML email template using new {{.QR}} template variable<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05d8887 e-flex e-con-boxed e-con e-parent\" data-id=\"05d8887\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ad2927 elementor-widget elementor-widget-text-editor\" data-id=\"2ad2927\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The next step in the process would be to configure the size of the QR code images when starting a new campaign. Leave the <em>QR Code Size<\/em> option blank if you wish to run a standard campaign without QR code images.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f4e416 e-flex e-con-boxed e-con e-parent\" data-id=\"9f4e416\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd74741 elementor-widget elementor-widget-image\" data-id=\"bd74741\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"934\" height=\"1024\" src=\"https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-campaign-example-934x1024.png\" class=\"attachment-large size-large wp-image-86\" alt=\"\" srcset=\"https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-campaign-example-934x1024.png 934w, https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-campaign-example-274x300.png 274w, https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-campaign-example-768x842.png 768w, https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-campaign-example.png 1026w\" sizes=\"(max-width: 934px) 100vw, 934px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Campaign configuration specifying QR code size<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f8e0e0 e-flex e-con-boxed e-con e-parent\" data-id=\"3f8e0e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6253eb4 elementor-widget elementor-widget-text-editor\" data-id=\"6253eb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At this point, every email recipient will receive an email containing a QR code image with their phish URL including their unique identifiers for campaign tracking statistics. When scanned, the device performing the scanning will open its browser application to the\u00a0<em>evilginx <\/em>server URL for MFA bypass campaigns. This test was simply pointing to Google, which can be verified if you scan the QR code below. The screenshot below shows a sample of what victims will receive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e6bfc6 e-flex e-con-boxed e-con e-parent\" data-id=\"6e6bfc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-938fad3 elementor-widget elementor-widget-image\" data-id=\"938fad3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"787\" height=\"480\" src=\"https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-inbox-example.png\" class=\"attachment-large size-large wp-image-87\" alt=\"\" srcset=\"https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-inbox-example.png 787w, https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-inbox-example-300x183.png 300w, https:\/\/fin3ss3g0d.net\/wp-content\/uploads\/2024\/02\/qr-inbox-example-768x468.png 768w\" sizes=\"(max-width: 787px) 100vw, 787px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Inline QR code image within received email<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-54f2972 e-flex e-con-boxed e-con e-parent\" data-id=\"54f2972\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e783c25 elementor-widget elementor-widget-text-editor\" data-id=\"e783c25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>And that&#8217;s it for weaponization using EvilGophish!\u00a0<span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\">For those who are unfamiliar with\u00a0<\/span><a style=\"text-align: var(--text-align); background-color: #ffffff;\" href=\"https:\/\/github.com\/gophish\/gophish\" target=\"_blank\" rel=\"noopener\">Gophish<\/a><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\">\u00a0<\/span><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\">or EvilGophish, the dashboard will display results for the campaign in a graphical view. We will get notified for all events regarding the campaign with corresponding date\/time information including sent emails, clicked links, submitted credentials to the Evilginx server, captured sessions (cookies\/auth tokens) from Evilginx, and the ability to correlate all of these statistics per victim. The free version of EvilGophish is available on GitHub\u00a0<\/span><a style=\"text-align: var(--text-align); background-color: #ffffff;\" href=\"https:\/\/github.com\/fin3ss3g0d\/evilgophish\" target=\"_blank\" rel=\"noopener\">here<\/a><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\">\u00a0but it is kept intentionally less updated than the paid version available<\/span><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\">\u00a0via GitHub Sponsors\u00a0<\/span><a style=\"text-align: var(--text-align); background-color: #ffffff;\" href=\"https:\/\/github.com\/sponsors\/fin3ss3g0d\" target=\"_blank\" rel=\"noopener\">here<\/a><span style=\"color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-013e896 e-flex e-con-boxed e-con e-parent\" data-id=\"013e896\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d42e066 elementor-widget elementor-widget-heading\" data-id=\"d42e066\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d34b1d e-flex e-con-boxed e-con e-parent\" data-id=\"3d34b1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b26972b elementor-widget elementor-widget-text-editor\" data-id=\"b26972b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Implications:<\/strong> The strategic use of QR codes by adversaries underscores a critical need for adaptive security strategies. It highlights the importance of extending cybersecurity awareness to include newer technologies and their potential misuse. As the digital landscape evolves, so too must our vigilance and defenses.<\/p><p><strong style=\"font-style: inherit; color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\">Takeaway:<\/strong><span style=\"font-style: inherit; font-weight: inherit; color: var( --e-global-color-text ); text-align: var(--text-align); background-color: var(--ast-global-color-5);\"> In the arms race of cybersecurity, awareness and adaptation are our best defenses. Understanding the why and how behind the use of technologies like QR codes for malicious purposes empowers us to better protect ourselves and our organizations.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the evolving landscape of cybersecurity, adversaries are continually seeking innovative methods to bypass traditional security measures. One such method [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-83","post","type-post","status-publish","format-standard","hentry","category-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/posts\/83","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/comments?post=83"}],"version-history":[{"count":35,"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/posts\/83\/revisions"}],"predecessor-version":[{"id":433,"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/posts\/83\/revisions\/433"}],"wp:attachment":[{"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/media?parent=83"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/categories?post=83"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fin3ss3g0d.net\/index.php\/wp-json\/wp\/v2\/tags?post=83"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}