{"id":1789,"date":"2017-01-05T21:04:12","date_gmt":"2017-01-05T21:04:12","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1789"},"modified":"2020-05-06T10:28:01","modified_gmt":"2020-05-06T17:28:01","slug":"think-like-a-hacker","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/","title":{"rendered":"Think Like a Hacker"},"content":{"rendered":"<p>An acquaintance of mine was surprised to see a picture of me driving a Lamborghini. So I said to him that just because I don&#8217;t own it does not mean I cannot drive it.<\/p>\n<p>That\u2019s how hackers think.<\/p>\n<p>They don&#8217;t own hundreds of servers that can generate several gigabytes of network traffic, yet they can successfully launch massive sustained DDoS attacks capable of bringing down some of the most fortified enterprises.<\/p>\n<h3 id=\"toc-hId--1902218856\">How do they do it?<\/h3>\n<p>They \u201cdrive\u201d thousands of servers on the Internet by commanding them to send legitimate requests to the destinations they want to attack. They do that by installing a piece of malware on them forming a network of infected computers, also known as a \u201cbotnet.\u201d Every single request that comes in as part of the DDoS attack is by itself a seemingly valid request for the service. So they can slip right past conventional defenses.<\/p>\n<p>In fact, this is becoming so prevalent that in an\u00a0<a href=\"http:\/\/www.bankinfosecurity.com\/top-banks-offer-new-ddos-details-a-5667\/op-1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">April, 2013 blog post<\/a>\u00a0on the Bankinfo Security site, Tracy Kitten reported that Bank of America, Citi, JP Morgan Chase, HSBC America, and other banks have begun to report DDoS attacks and their results in their SEC filings.<\/p>\n<p>In\u00a0<a href=\"http:\/\/dkmatai.tumblr.com\/post\/34061092899\/red-alert-cyber-attacks-on-banks-of-100-billion#notes\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">another blog posting<\/a>, DK Matai points out that these attacks, for which a hacktivist group calling itself Izz ad-Din al-Qassam is claiming credit, exceed 100 gygabytes per second!<\/p>\n<p>Prolexic recently published a report showing that 75 percent of attack traffic targets the infrastructure of the network.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1792\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/prolexic-report.png\" alt=\"Prolexic Report\" width=\"898\" height=\"469\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/prolexic-report.png 898w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/prolexic-report-300x157.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/prolexic-report-768x401.png 768w\" sizes=\"auto, (max-width: 898px) 100vw, 898px\" \/><\/p>\n<p>And guess what the DNS portion of that is: 7.25, which quadrupled in just one year! DNS is becoming the next most-popular attack vector.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1791\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/dns-report.png\" alt=\"DNS Report\" width=\"649\" height=\"489\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-report.png 649w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-report-300x226.png 300w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><\/p>\n<p>Just as the whole new field of web-proxy analytics and web-application firewall technologies arose in the last decade as we saw HTTP and web-based attacks boom, new defenses now have to be developed for DNS.<\/p>\n<h3 id=\"toc-hId--1873589705\">DNS is too easy to attack.<\/h3>\n<p>What makes DNS so special or unique or lucrative to attackers?<\/p>\n<p>First and foremost is the nature of the protocol. DNS queries are asymmetrical. The response is usually many times larger than the query itself, which means that your DNS system itself can be made to amplify an attack. Hackers can send one packet of data and cause a flurry that is amplified by thousands.<\/p>\n<p>So effectively, to stop a business in its tracks, the bad guys don&#8217;t really need to fill up the network pipe and generate hundreds of gigs of traffic.<\/p>\n<p>They can bring down your web server (but that\u2019s and old trick and you probably have defenses in place).<\/p>\n<p>Or they can bring down your DNS authoritative servers so that no one can find the website they are reaching out to. And unfortunately, that\u2019s easy!<\/p>\n<h3 id=\"toc-hId--1844960554\">What you need is security from within.<\/h3>\n<p>That massive big-iron firewall you have lets ALL of the port 53 traffic in. So to fight the DNS threat, you need to focus not just on the servers but also on securing key assets like DNS infrastructure. Remember, all DDoS requests are individually valid, so a firewall will never block them. What we talking about is security from within.<\/p>\n<ul>\n<li>Use hardened, purpose-built DNS appliances instead of open-source technologies.<\/li>\n<li>Strictly control access, granting it to authorized users only.<\/li>\n<li>Close all unnecessary communication to and from the servers.<\/li>\n<li>Allow all the internal DNS traffic to go to designated DNS servers only.<\/li>\n<li>Block all other port-53-based traffic at your firewalls.<\/li>\n<\/ul>\n<p>And that\u2019s just the starting point\u2014base zero, let\u2019s call it. Stay tuned to this blog for what to do next.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An acquaintance of mine was surprised to see a picture of me driving a Lamborghini. So I said to him that just because I don&#8217;t own it does not mean I cannot drive it. That\u2019s how hackers think. They don&#8217;t own hundreds of servers that can generate several gigabytes of network traffic, yet they can [&hellip;]<\/p>\n","protected":false},"author":295,"featured_media":1790,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,59,15,36],"class_list":{"0":"post-1789","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-risk","10":"tag-security","11":"tag-threats","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Think Like a Hacker<\/title>\n<meta name=\"description\" content=\"An acquaintance of mine was surprised to see a picture of me driving a Lamborghini.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Think Like a Hacker\" \/>\n<meta property=\"og:description\" content=\"An acquaintance of mine was surprised to see a picture of me driving a Lamborghini.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-05T21:04:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/\"},\"author\":{\"name\":\"Infoblox Security\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f422bb7a06be93cb128df08840ca8bf\"},\"headline\":\"Think Like a Hacker\",\"datePublished\":\"2017-01-05T21:04:12+00:00\",\"dateModified\":\"2020-05-06T17:28:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/\"},\"wordCount\":592,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-aug-5.jpg\",\"keywords\":[\"Infoblox\",\"Risk\",\"Security\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/\",\"name\":\"Think Like a Hacker\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-aug-5.jpg\",\"datePublished\":\"2017-01-05T21:04:12+00:00\",\"dateModified\":\"2020-05-06T17:28:01+00:00\",\"description\":\"An acquaintance of mine was surprised to see a picture of me driving a Lamborghini.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-aug-5.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-aug-5.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/think-like-a-hacker\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Think Like a Hacker\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f422bb7a06be93cb128df08840ca8bf\",\"name\":\"Infoblox Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"caption\":\"Infoblox Security\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/isecurityteam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Think Like a Hacker","description":"An acquaintance of mine was surprised to see a picture of me driving a Lamborghini.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/","og_locale":"en_US","og_type":"article","og_title":"Think Like a Hacker","og_description":"An acquaintance of mine was surprised to see a picture of me driving a Lamborghini.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/","og_site_name":"Infoblox Blog","article_published_time":"2017-01-05T21:04:12+00:00","article_modified_time":"2020-05-06T17:28:01+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","type":"image\/jpeg"}],"author":"Infoblox Security","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/"},"author":{"name":"Infoblox Security","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5f422bb7a06be93cb128df08840ca8bf"},"headline":"Think Like a Hacker","datePublished":"2017-01-05T21:04:12+00:00","dateModified":"2020-05-06T17:28:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/"},"wordCount":592,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","keywords":["Infoblox","Risk","Security","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/","url":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/","name":"Think Like a Hacker","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","datePublished":"2017-01-05T21:04:12+00:00","dateModified":"2020-05-06T17:28:01+00:00","description":"An acquaintance of mine was surprised to see a picture of me driving a Lamborghini.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/think-like-a-hacker\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Think Like a Hacker"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5f422bb7a06be93cb128df08840ca8bf","name":"Infoblox Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","caption":"Infoblox Security"},"url":"https:\/\/www.infoblox.com\/blog\/author\/isecurityteam\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1789"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1789\/revisions"}],"predecessor-version":[{"id":1793,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1789\/revisions\/1793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1790"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}