{"id":3392,"date":"2014-06-20T17:55:30","date_gmt":"2014-06-20T17:55:30","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3392"},"modified":"2020-05-06T10:31:34","modified_gmt":"2020-05-06T17:31:34","slug":"dns-firewalls-hat-trick","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/","title":{"rendered":"DNS Firewall&#8217;s Hat Trick!"},"content":{"rendered":"<p>I had a great conversation with Logan Kleier at the GigaOM Structure conference a couple of days ago. Logan is the Chief Information and Privacy Security Officer for the city of Portland. On the topic of advanced persistent threats (APTs), Logan mentioned how hollow the FUD that different vendors kept pitching to him sounded, and how each pitch pointed out yet another exposure that others did not cover.<\/p>\n<p>All they really did, he said, was give the impression that there is no way to fully protect against APTs because the list of what-ifs never ends, even after emulation, sandboxing, and applying layers of security at the host and network. And at what cost?<\/p>\n<p>I think one of the things security purists miss is that eventually this boils down to risk benefit analysis.\u00a0It begs the question of how much pain and money enterprises are willing to bear to address the insurmountable targeted-threat attack vectors. Is it feasible to have all the traffic routed through deep inspection, analytics, and encryption? What about usability, performance and latency aspects of the business needs?<\/p>\n<p><strong>Or is there a smarter way to protect against APTs?<\/strong><\/p>\n<p>As it turns out, working smarter instead of harder helps solve the problem to a large degree. And the key is in looking for the footprints or the trail that malware leaves behind. One promising evidence trail to follow is the use of DNS to reach out to bad destinations and command-and-control sites. DNS Firewall is a lightweight but very effective way to address that.<\/p>\n<p>DNS Firewall has recently demonstrated its ability to do that effectively, pulling off what I call the \u201chat trick\u201d\u2014scoring wins against three types of much-talked-about malware in only a few weeks.<\/p>\n<p>1. Dyreza<\/p>\n<p>Dennis Fisher, writing in\u00a0<a href=\"http:\/\/threatpost.com\/dyreza-banker-trojan-seen-bypassing-ssl\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><em>ThreatPost<\/em><\/a>, describes a new piece of banking malware called \u201cDyreza,\u201d which he points out is targeting many major online banking services, including:<\/p>\n<ul>\n<li><em>Bank of America<\/em><\/li>\n<li><em>Natwest<\/em><\/li>\n<li><em>Citibank<\/em><\/li>\n<li><em>RBS<\/em><\/li>\n<li><em>Ulsterbank<\/em><\/li>\n<\/ul>\n<p>The way the Dyreza code works is similar to the way the ZeuS code works, and like most online banking threats, it supports browser hooking for Internet Explorer, Chrome, and Firefox and harvests data at any point where an infected user connects to the targets specified in the malware.<\/p>\n<p>DNS Firewall had\u00a0this in\u00a0its\u00a0feeds before Dyreza became commonly known. Due to the nature of the malware, a lot of\u00a0the\u00a0feed content\u00a0that is\u00a0proactively added to the DNS Firewall is not published or called out, but is actively protecting our customers.<\/p>\n<p>2. Gamover ZeuS<\/p>\n<p>UAE ranks third in a list of countries most affected by the GameOver ZeuS (GOZ) botnet.\u00a0<a href=\"http:\/\/www.itp.net\/598440-fbi-cracks-100m-financial-crime-botnet\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">U.S. FBI cracked a botnet<\/a>\u00a0that was spreading the GameOver Zeus malware kit, which had stolen personal and financial data worldwide. According to\u00a0<a href=\"http:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/gameover-zeus-computer-users-given-twoweek-warning-over-virus-threat-9474878.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><em>The Independent<\/em><\/a>, more than 15,000 machines in the UK are believed to have been infected by a cybergroup based in Russia and the Ukraine.<\/p>\n<p>The FBI believes GameOver Zeus has been responsible for $100 million in losses. In addition to searching for personal credentials for the purpose of financial theft, the kit also drops the CryptoLocker ransomware program, which encrypts all files on a target&#8217;s computer, including personal photographs, and charges \u00a3300 ($500) to unlock them.<\/p>\n<p>In instances of both Gameover Zeus and\u00a0Cryptolocker, DNS Firewall protected customers by stopping\u00a0communications to bad destinations.<\/p>\n<p>3. Blackshades RAT<\/p>\n<p>In our May 20 blog titled\u00a0<a href=\"https:\/\/community.infoblox.com\/blogs\/2014\/05\/20\/protecting-creepware-using-dns-firewall\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cProtecting from Creepware Using DNS Firewall\u201d<\/a>, Balaji Prasad talked about the Blackshades remote access tool, or RAT, which targets Microsoft Windows-based operating systems and allows cybercriminals to take control of your computer. Once inside, they can spy on you through your Web camera, steal your files and account information, and see what you are typing.<\/p>\n<p>As with Dyreza, we had identified the threat and were protecting our customers from it before its existence was commonly known. Currently we have over 13,000 domains related to Blackshades in the DNS Firewall feed. And by cracking the domain generation algorithm, we pre-populated potential domains they could use!<\/p>\n<p>That&#8217;s a hat-trick! The\u00a0smart (and cost effective) way to protect against rapidly emerging APTs could be much simpler than you think. (Hint: DNS Firewall)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I had a great conversation with Logan Kleier at the GigaOM Structure conference a couple of days ago. Logan is the Chief Information and Privacy Security Officer for the city of Portland. On the topic of advanced persistent threats (APTs), Logan mentioned how hollow the FUD that different vendors kept pitching to him sounded, and [&hellip;]<\/p>\n","protected":false},"author":254,"featured_media":1601,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,15],"class_list":{"0":"post-3392","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Firewall&#039;s Hat Trick!<\/title>\n<meta name=\"description\" content=\"I had a great conversation with Logan Kleier at the GigaOM Structure conference a couple of days ago. Logan is the Chief Information and Privacy Security Officer for the city of Portland.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Firewall&#039;s Hat Trick!\" \/>\n<meta property=\"og:description\" content=\"I had a great conversation with Logan Kleier at the GigaOM Structure conference a couple of days ago. Logan is the Chief Information and Privacy Security Officer for the city of Portland.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-20T17:55:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-12.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Renuka Nadkarni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Renuka Nadkarni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/\"},\"author\":{\"name\":\"Renuka Nadkarni\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\"},\"headline\":\"DNS Firewall&#8217;s Hat Trick!\",\"datePublished\":\"2014-06-20T17:55:30+00:00\",\"dateModified\":\"2020-05-06T17:31:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/\"},\"wordCount\":689,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-12.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/\",\"name\":\"DNS Firewall's Hat Trick!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-12.jpg\",\"datePublished\":\"2014-06-20T17:55:30+00:00\",\"dateModified\":\"2020-05-06T17:31:34+00:00\",\"description\":\"I had a great conversation with Logan Kleier at the GigaOM Structure conference a couple of days ago. Logan is the Chief Information and Privacy Security Officer for the city of Portland.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-12.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-12.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-firewalls-hat-trick\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Firewall&#8217;s Hat Trick!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\",\"name\":\"Renuka Nadkarni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"caption\":\"Renuka Nadkarni\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/renuka-nadkarni\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Firewall's Hat Trick!","description":"I had a great conversation with Logan Kleier at the GigaOM Structure conference a couple of days ago. Logan is the Chief Information and Privacy Security Officer for the city of Portland.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/","og_locale":"en_US","og_type":"article","og_title":"DNS Firewall's Hat Trick!","og_description":"I had a great conversation with Logan Kleier at the GigaOM Structure conference a couple of days ago. Logan is the Chief Information and Privacy Security Officer for the city of Portland.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/","og_site_name":"Infoblox Blog","article_published_time":"2014-06-20T17:55:30+00:00","article_modified_time":"2020-05-06T17:31:34+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-12.jpg","type":"image\/jpeg"}],"author":"Renuka Nadkarni","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Renuka Nadkarni","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/"},"author":{"name":"Renuka Nadkarni","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9"},"headline":"DNS Firewall&#8217;s Hat Trick!","datePublished":"2014-06-20T17:55:30+00:00","dateModified":"2020-05-06T17:31:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/"},"wordCount":689,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-12.jpg","keywords":["Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/","url":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/","name":"DNS Firewall's Hat Trick!","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-12.jpg","datePublished":"2014-06-20T17:55:30+00:00","dateModified":"2020-05-06T17:31:34+00:00","description":"I had a great conversation with Logan Kleier at the GigaOM Structure conference a couple of days ago. Logan is the Chief Information and Privacy Security Officer for the city of Portland.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-12.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-12.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-firewalls-hat-trick\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"DNS Firewall&#8217;s Hat Trick!"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9","name":"Renuka Nadkarni","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","caption":"Renuka Nadkarni"},"url":"https:\/\/www.infoblox.com\/blog\/author\/renuka-nadkarni\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/254"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3392"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3392\/revisions"}],"predecessor-version":[{"id":3393,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3392\/revisions\/3393"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1601"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}