{"id":825,"date":"2016-12-20T06:00:41","date_gmt":"2016-12-20T06:00:41","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=825"},"modified":"2020-05-06T10:28:02","modified_gmt":"2020-05-06T17:28:02","slug":"googles-shield-learnings","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/","title":{"rendered":"Google&#8217;s Shield Learnings"},"content":{"rendered":"<p>You may remember Google was in the news not too long ago because its Malaysian site had been hit with a DNS cache-poisoning attack. It came as a big surprise to everyone. One of the threat-research vendors that I was talking to remarked that the Google site hack did come in from one of the his company\u2019s sources, but he and his colleagues expected it to be fixed by Google before it got noticed publicly.<\/p>\n<p>In fact, he went as far as saying there are some short-lived attacks on some major companies that his organization chooses not to report and include in their research deliverables because they get fixed before anyone even notices them.<\/p>\n<p>But not this time.<\/p>\n<p>Pictures of the splash screens that the hackers, calling themselves \u201cTeam Madleets,\u201d replaced the Google screens with were all over Twitter and lasted for a significant time.<\/p>\n<p><!--\n\n[caption id=\"\" align=\"aligncenter\" width=\"680\"]<img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/shield1.png\" alt=\"Google's Shield Learnings-MADLEETS\" width=\"680\" height=\"464\" border=\"0\" \/> Google's Shield Learnings-MADLEETS[\/caption]\n\n--><\/p>\n<p>That is the difference with DNS-based attacks and other types. DNS information, once corrupted, takes hours or even days to repair. It\u2019s surprising to see how this old trick works again and again. The New York Times, Twitter, and Google Malaysia have all fallen prey to it. Some of these attacks are inspired by political agendas and do not discriminate between individual blogger activist websites or more public entities like Twitter.<\/p>\n<p>DDoS attacks make things even more interesting. Access to rented botnets combined with DNS protocol\u2019s ability to amplify the traffic makes it even more lucrative target. Yesterday, Google launched new anti-DDoS service called \u201c\u00a0<a href=\"http:\/\/www.theverge.com\/2013\/10\/21\/4862724\/google-launches-new-anti-ddos-service-called-project-shield\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Project Shield<\/a>.\u201d They said this about it:<\/p>\n<blockquote><p>\u201cThe biggest focus has been on DDoS attacks, a kind of brute-force action that can easily take down a small site without leaving any clues as to the culprits. DDoS has been a persistent problem for small-scale activists on the web, but Google&#8217;s new Project Shield would aim to fix that, offering free DDoS mitigation services to sites serving \u2018media, elections, and human rights related content.\u2019 \u201d<\/p><\/blockquote>\n<p>It reminded me of several incidents where the security researcher&#8217;s private blog was hacked or hit with a DDoS attack and it took many days or weeks for it to resume. And therein lies the complexity and reliance on the core infrastructure that we choose to trust. The efforts required to address something so pervasive need to be handled at many different levels, where everyone does their bit.<\/p>\n<p>The most interesting part of this Google initiative is the digital map of real-time attack traffic data found\u00a0<a href=\"http:\/\/www.digitalattackmap.com\/#anim=1&amp;color=0&amp;country=ALL&amp;time=15999&amp;view=map\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>. It\u2019s amazing to see how the global attack traffic is pictorially depicted with these graphs. As I watched the attack play and saw the port 53 attacks identified.<\/p>\n<p>Maybe our bit in this scary battle against the dark side of the force is in securing DNS infrastructure, and offering best practices for configuring.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may remember Google was in the news not too long ago because its Malaysian site had been hit with a DNS cache-poisoning attack. It came as a big surprise to everyone. One of the threat-research vendors that I was talking to remarked that the Google site hack did come in from one of the [&hellip;]<\/p>\n","protected":false},"author":295,"featured_media":826,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,49,15,36],"class_list":{"0":"post-825","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-mitigate-threats","10":"tag-security","11":"tag-threats","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Google&#039;s Shield Learnings<\/title>\n<meta name=\"description\" content=\"You may remember Google was in the news not too long ago because its Malaysian site had been hit with a DNS cache-poisoning attack. It came as a big surprise to everyone. One of the threat-research vendors that I was talking to remarked that the Google site hack did come in from one of the his company\u2019s sources, but he and his colleagues expected it to be fixed by Google before it got noticed publicly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google&#039;s Shield Learnings\" \/>\n<meta property=\"og:description\" content=\"You may remember Google was in the news not too long ago because its Malaysian site had been hit with a DNS cache-poisoning attack. It came as a big surprise to everyone. One of the threat-research vendors that I was talking to remarked that the Google site hack did come in from one of the his company\u2019s sources, but he and his colleagues expected it to be fixed by Google before it got noticed publicly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-20T06:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNSCompanyBlogPhoto1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/\"},\"author\":{\"name\":\"Infoblox Security\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f422bb7a06be93cb128df08840ca8bf\"},\"headline\":\"Google&#8217;s Shield Learnings\",\"datePublished\":\"2016-12-20T06:00:41+00:00\",\"dateModified\":\"2020-05-06T17:28:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/\"},\"wordCount\":471,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNSCompanyBlogPhoto1.jpg\",\"keywords\":[\"Infoblox\",\"mitigate threats\",\"Security\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/\",\"name\":\"Google's Shield Learnings\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNSCompanyBlogPhoto1.jpg\",\"datePublished\":\"2016-12-20T06:00:41+00:00\",\"dateModified\":\"2020-05-06T17:28:02+00:00\",\"description\":\"You may remember Google was in the news not too long ago because its Malaysian site had been hit with a DNS cache-poisoning attack. It came as a big surprise to everyone. One of the threat-research vendors that I was talking to remarked that the Google site hack did come in from one of the his company\u2019s sources, but he and his colleagues expected it to be fixed by Google before it got noticed publicly.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNSCompanyBlogPhoto1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNSCompanyBlogPhoto1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Google's Shield Learnings\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/googles-shield-learnings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Google&#8217;s Shield Learnings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f422bb7a06be93cb128df08840ca8bf\",\"name\":\"Infoblox Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"caption\":\"Infoblox Security\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/isecurityteam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Google's Shield Learnings","description":"You may remember Google was in the news not too long ago because its Malaysian site had been hit with a DNS cache-poisoning attack. It came as a big surprise to everyone. One of the threat-research vendors that I was talking to remarked that the Google site hack did come in from one of the his company\u2019s sources, but he and his colleagues expected it to be fixed by Google before it got noticed publicly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/","og_locale":"en_US","og_type":"article","og_title":"Google's Shield Learnings","og_description":"You may remember Google was in the news not too long ago because its Malaysian site had been hit with a DNS cache-poisoning attack. It came as a big surprise to everyone. One of the threat-research vendors that I was talking to remarked that the Google site hack did come in from one of the his company\u2019s sources, but he and his colleagues expected it to be fixed by Google before it got noticed publicly.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/","og_site_name":"Infoblox Blog","article_published_time":"2016-12-20T06:00:41+00:00","article_modified_time":"2020-05-06T17:28:02+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNSCompanyBlogPhoto1.jpg","type":"image\/jpeg"}],"author":"Infoblox Security","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/"},"author":{"name":"Infoblox Security","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5f422bb7a06be93cb128df08840ca8bf"},"headline":"Google&#8217;s Shield Learnings","datePublished":"2016-12-20T06:00:41+00:00","dateModified":"2020-05-06T17:28:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/"},"wordCount":471,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNSCompanyBlogPhoto1.jpg","keywords":["Infoblox","mitigate threats","Security","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/","url":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/","name":"Google's Shield Learnings","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNSCompanyBlogPhoto1.jpg","datePublished":"2016-12-20T06:00:41+00:00","dateModified":"2020-05-06T17:28:02+00:00","description":"You may remember Google was in the news not too long ago because its Malaysian site had been hit with a DNS cache-poisoning attack. It came as a big surprise to everyone. One of the threat-research vendors that I was talking to remarked that the Google site hack did come in from one of the his company\u2019s sources, but he and his colleagues expected it to be fixed by Google before it got noticed publicly.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNSCompanyBlogPhoto1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNSCompanyBlogPhoto1.jpg","width":660,"height":454,"caption":"Google's Shield Learnings"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/googles-shield-learnings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Google&#8217;s Shield Learnings"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5f422bb7a06be93cb128df08840ca8bf","name":"Infoblox Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","caption":"Infoblox Security"},"url":"https:\/\/www.infoblox.com\/blog\/author\/isecurityteam\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=825"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/825\/revisions"}],"predecessor-version":[{"id":835,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/825\/revisions\/835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/826"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}