{"id":1991,"date":"2017-05-15T16:08:23","date_gmt":"2017-05-15T16:08:23","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1991"},"modified":"2020-05-06T10:27:59","modified_gmt":"2020-05-06T17:27:59","slug":"are-you-sitting-on-a-deadly-dns-time-bomb","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/","title":{"rendered":"Are you sitting on a deadly DNS time bomb?"},"content":{"rendered":"<p>As a Sales Engineer at Infoblox, I\u2019ve had the opportunity to meet thousands of IT and security pros at Fortune 1000 companies.\u00a0 It always amazes me how little attention is given to the DNS protocol as a vulnerable protocol.\u00a0 More importantly, it is also surprising to see the lack of awareness and\/or recognition on this issue, though many an attack (e.g., DNS Messenger) in the recent past have been exploiting DNS servers. \u00a0Even though there has been a huge rise in the use of this protocol as a covert channel and an exploitable vulnerability, many IT departments are still debating whether they should take any security measures to stop DNS attacks, and if so what kind of measures to take.\u00a0 This uncertainty can result in lack of action. Instead they may decide to protect other parts of the stack such as end-points where the impact of the threat is clearer.<\/p>\n<p>While most corporate IT practitioners attempt to wrap their heads around securing the enterprise from DNS exploits, more and more nefarious entities are writing botnets and \u00a0malware, to take advantage of DNS and using other means &#8211; such as DNS tunneling \u2013 to exploit this unsecured entry point into the network.<\/p>\n<p><strong>Experience at a Casino<\/strong><\/p>\n<p>The best part of my job educating customers on what they are not able to see is happening on their network with DNS. Especially, when they see the data related to exfiltration and DNS tunneling. I was recently working on a Proof of Concept (POC) in Las Vegas at a casino.\u00a0 The customer had almost all the known security measures, such as firewalls (Palo Alto Networks), SIEM (QRadar), IDS\/IDP (Source Fire) and client based incident response (Carbon Black).\u00a0 However, they were particularly interested in DNS Tunneling and Data Exfiltration.\u00a0 The aim of the POC was to showcase the benefit of using Infoblox security measures to protect recursive DNS traffic (lookups out to the Internet).<\/p>\n<p>As a DNS lookup is the\u00a0<strong><u>first<\/u><\/strong>\u00a0thing that happens when a user within the company needs to communicate with the Internet, it is a very good first line of defense for stopping malicious traffic and command and control communications.\u00a0 We identified many malware C2 (command and control) sites immediately that their other Cybersecurity measures were not finding, but the real fireworks started when we turned on our DNS behavioral analytics and started finding DNS tunnels.<\/p>\n<p><strong>NOTE: DNS tunnels are advanced covert tactics that use the DNS protocol as a covert communication channel for moving data in and out of an organization undetected by security measures.\u00a0 This technique essentially hides the nefarious activity by using a prepackaged DNS tunnel software \u2013 with a preconfigured software including a client and server.\u00a0 These can be easily downloaded from internet \u2013 most commonly known are DNSCAT, DNSCAT2, SlowDNS and Iodine.\u00a0 The other method is easier and simpler \u2013 simply hiding the data in the DNS query.\u00a0<\/strong><\/p>\n<p>The security department wanted to know why their other equipment was not catching these \u201cquery based\u201d tunnels.\u00a0 We validated that the DNS tunnels were real and that the workstations being exposed had a browser based add-on that was displaying a marketing banner and looked like it was reporting back demographics and purchasing activity.\u00a0 We blocked the tunnel traffic and they were happy.\u00a0 They ended up putting our DNS security solution in their data centers as well as the 12 sites they could not re-route to data center due to network connectivity.<\/p>\n<p>In the last year, I\u2019ve seen internally launched DNS reflection attacks orchestrated by botnets that took down a network, undetected DNS tunnels being used for gaming devices and one of my colleagues helped an oil company stop Anonymous (Anonymous is a loosely associated international network of activist and hacktivist entities) as they attempted to use DNS to steal (exfiltrate) data out of the customers\u2019 network.<\/p>\n<p>DNS is one of the most useful and necessary protocols on the planet.\u00a0 It\u2019s an infrastructure service and it is essential to most companies, but unprotected it can be used as a powerful weapon to bypass all security measures.\u00a0\u00a0Don\u2019t let your DNS traffic go unexamined \u2013 firewalls and endpoint security are very important &#8211;\u00a0 but they will not protect your data from unprotected DNS traffic!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a Sales Engineer at Infoblox, I\u2019ve had the opportunity to meet thousands of IT and security pros at Fortune 1000 companies.\u00a0 It always amazes me how little attention is given to the DNS protocol as a vulnerable protocol.\u00a0 More importantly, it is also surprising to see the lack of awareness and\/or recognition on this [&hellip;]<\/p>\n","protected":false},"author":149,"featured_media":1797,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,16,15],"class_list":{"0":"post-1991","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Are you sitting on a deadly DNS time bomb?<\/title>\n<meta name=\"description\" content=\"As a Sales Engineer at Infoblox, I\u2019ve had the opportunity to meet thousands of IT and security pros at Fortune 1000 companies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are you sitting on a deadly DNS time bomb?\" \/>\n<meta property=\"og:description\" content=\"As a Sales Engineer at Infoblox, I\u2019ve had the opportunity to meet thousands of IT and security pros at Fortune 1000 companies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-15T16:08:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex del Rio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex del Rio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/\"},\"author\":{\"name\":\"Alex del Rio\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bc8e8b7b294434cc9e66450e81b22b4a\"},\"headline\":\"Are you sitting on a deadly DNS time bomb?\",\"datePublished\":\"2017-05-15T16:08:23+00:00\",\"dateModified\":\"2020-05-06T17:27:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/\"},\"wordCount\":713,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"keywords\":[\"DNS\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/\",\"name\":\"Are you sitting on a deadly DNS time bomb?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"datePublished\":\"2017-05-15T16:08:23+00:00\",\"dateModified\":\"2020-05-06T17:27:59+00:00\",\"description\":\"As a Sales Engineer at Infoblox, I\u2019ve had the opportunity to meet thousands of IT and security pros at Fortune 1000 companies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-sitting-on-a-deadly-dns-time-bomb\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Are you sitting on a deadly DNS time bomb?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bc8e8b7b294434cc9e66450e81b22b4a\",\"name\":\"Alex del Rio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_149_1571767254-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_149_1571767254-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_149_1571767254-96x96.jpg\",\"caption\":\"Alex del Rio\"},\"description\":\"Alex del Rio is currently a Principal Solution Architect at Infoblox. Previously he has held positions at Landmark Education, Focused Networks, and Network Vigilance. Alex holds a Bachelor of Business Administration, Information Systems from the University of Houston.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/alex-del-rio\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are you sitting on a deadly DNS time bomb?","description":"As a Sales Engineer at Infoblox, I\u2019ve had the opportunity to meet thousands of IT and security pros at Fortune 1000 companies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/","og_locale":"en_US","og_type":"article","og_title":"Are you sitting on a deadly DNS time bomb?","og_description":"As a Sales Engineer at Infoblox, I\u2019ve had the opportunity to meet thousands of IT and security pros at Fortune 1000 companies.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/","og_site_name":"Infoblox Blog","article_published_time":"2017-05-15T16:08:23+00:00","article_modified_time":"2020-05-06T17:27:59+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","type":"image\/jpeg"}],"author":"Alex del Rio","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex del Rio","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/"},"author":{"name":"Alex del Rio","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bc8e8b7b294434cc9e66450e81b22b4a"},"headline":"Are you sitting on a deadly DNS time bomb?","datePublished":"2017-05-15T16:08:23+00:00","dateModified":"2020-05-06T17:27:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/"},"wordCount":713,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","keywords":["DNS","Infoblox","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/","url":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/","name":"Are you sitting on a deadly DNS time bomb?","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","datePublished":"2017-05-15T16:08:23+00:00","dateModified":"2020-05-06T17:27:59+00:00","description":"As a Sales Engineer at Infoblox, I\u2019ve had the opportunity to meet thousands of IT and security pros at Fortune 1000 companies.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-sitting-on-a-deadly-dns-time-bomb\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Are you sitting on a deadly DNS time bomb?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bc8e8b7b294434cc9e66450e81b22b4a","name":"Alex del Rio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_149_1571767254-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_149_1571767254-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_149_1571767254-96x96.jpg","caption":"Alex del Rio"},"description":"Alex del Rio is currently a Principal Solution Architect at Infoblox. Previously he has held positions at Landmark Education, Focused Networks, and Network Vigilance. Alex holds a Bachelor of Business Administration, Information Systems from the University of Houston.","url":"https:\/\/www.infoblox.com\/blog\/author\/alex-del-rio\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/149"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1991"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1991\/revisions"}],"predecessor-version":[{"id":1994,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1991\/revisions\/1994"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1797"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}