{"id":1301,"date":"2026-01-02T19:31:00","date_gmt":"2026-01-02T19:31:00","guid":{"rendered":"https:\/\/zombierollz.blog\/?p=1301"},"modified":"2026-01-02T13:31:26","modified_gmt":"2026-01-02T13:31:26","slug":"network-security-essentials","status":"publish","type":"post","link":"https:\/\/zombierollz.blog\/?p=1301","title":{"rendered":"Network Security Essentials"},"content":{"rendered":"\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-5372ed110143c38c68b31a60ba2aa649\">https:\/\/tryhackme.com\/room\/networksecurityessentials<br>Created by: tryhackme, Dex01<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-76c21e311ff4329b5d155959ba250f33\">&#8220;The networks are the backbone of every modern organization.&nbsp; Servers, workstations, applications, and security devices don\u2019t exist in isolation; they are interconnected, forming a single ecosystem. The network perimeter is where this internal ecosystem is segregated from the external Internet, and it is often the first target for attackers.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-44595c2e25a1e64cde4dbacbb4c3868a\">This room is designed to introduce you to the fundamental concepts of network security from a defensive perspective. While our focus will be on the logs and data sources we encounter daily, we&#8217;ll start by building a strong understanding of how networks are structured, why they are important to protect, and why monitoring the perimeter is critical for early attack detection.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"637\" height=\"194\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-121758.png\" alt=\"\" class=\"wp-image-1304\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-121758.png 637w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-121758-300x91.png 300w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-38f1f4d131b4e36558e08ace5ad44dee\">In task 6 and 7, we learn more about the importance of securing the parameter along with using our VM for technical hands on. We are tasked with looking at the logs in the task6 folder.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"803\" height=\"332\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122426.png\" alt=\"\" class=\"wp-image-1305\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122426.png 803w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122426-300x124.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122426-768x318.png 768w\" sizes=\"auto, (max-width: 803px) 100vw, 803px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-a25c85617f3a212acf43410e2b6fbfd1\">&#8220;Examine the firewall logs. Which IP address is performing the port scan?&#8221; We see that it&#8217;s this IP address that has a rapid back to back connection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"461\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122516.png\" alt=\"\" class=\"wp-image-1306\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122516.png 745w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122516-300x186.png 300w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-d4293f890a1c1835450268c09aa8b6e1\">For question, &#8220;In the WAF Logs, which single source IP is responsible for all the blocked web attacks?&#8221;. Scroll to find the blocked requests. You could use grep to make this easier if you wish.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1025\" height=\"827\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122706.png\" alt=\"\" class=\"wp-image-1307\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122706.png 1025w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122706-300x242.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122706-768x620.png 768w\" sizes=\"auto, (max-width: 1025px) 100vw, 1025px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"806\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122739-1024x806.png\" alt=\"\" class=\"wp-image-1308\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122739-1024x806.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122739-300x236.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122739-768x605.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122739.png 1029w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-2f297eca40e76dca452349090f3edaf2\">&#8220;In the VPN logs, how many brute-force attempts failed?&#8221;. In order to obtain this and make it easier for ourselves, we need to focus on the FAILED_AUTH. There are too many to count so lets use grep to do the job for us.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1014\" height=\"533\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122832.png\" alt=\"\" class=\"wp-image-1309\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122832.png 1014w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122832-300x158.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122832-768x404.png 768w\" sizes=\"auto, (max-width: 1014px) 100vw, 1014px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"777\" height=\"65\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122910.png\" alt=\"\" class=\"wp-image-1310\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122910.png 777w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122910-300x25.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122910-768x64.png 768w\" sizes=\"auto, (max-width: 777px) 100vw, 777px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-d256b138e33cf2976a191bb660a0d76d\">For &#8220;Which suspicious IP address was found attempting the brute-force attack against the VPN gateway?&#8221; we already have our answer from the snippet above.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"788\" height=\"87\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122949.png\" alt=\"\" class=\"wp-image-1311\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122949.png 788w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122949-300x33.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2025\/12\/Screenshot-2025-12-31-122949-768x85.png 768w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-6f8d751b4bbc2fa7e0eca26a328838be\">In Task 7, we are given an incident scenario with three sets of logs we are to look into. We can do this either manually through the CLI or through Splunk. I am going to do both and split the answers for the rest of the questions! When doing it the manual way, I suggest typing in the commands instead of copying to get more Linux practice. THM guides us with supplying commands, but when it comes to their given &#8220;redacted,&#8221; you will need to replace that with what you see on your end, for example\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"944\" height=\"675\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060942.png\" alt=\"\" class=\"wp-image-1313\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060942.png 944w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060942-300x215.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060942-768x549.png 768w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"957\" height=\"811\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060824.png\" alt=\"\" class=\"wp-image-1314\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060824.png 957w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060824-300x254.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060824-768x651.png 768w\" sizes=\"auto, (max-width: 957px) 100vw, 957px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-04b65638997824740c37f388bbacddad\">If you use Splunk, ensure that you change the Time range to &#8216;All time&#8217;, as it will not populate any results otherwise. This will be the case in future THM labs regarding Splunk, FYI. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"767\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063232.png\" alt=\"\" class=\"wp-image-1315\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063232.png 940w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063232-300x245.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063232-768x627.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-0fba58feb4a73a44e59f56a9782d81d2\">&#8220;Examine the firewall logs. What external IP performed the most reconnaissance?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"943\" height=\"108\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060116.png\" alt=\"\" class=\"wp-image-1316\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060116.png 943w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060116-300x34.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-060116-768x88.png 768w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-816a22662756d35af50c6e7a077f68ce\">&#8220;In the firewall log, Which internal host was targeted by scans?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"949\" height=\"472\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062251.png\" alt=\"\" class=\"wp-image-1317\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062251.png 949w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062251-300x149.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062251-768x382.png 768w\" sizes=\"auto, (max-width: 949px) 100vw, 949px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-4db5015e455714c3ee7a3ab4b4dc8461\">&#8220;Which username was targeted in VPN logs?&#8221; Ignore the 203 box; it will be the underlined text. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"868\" height=\"108\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062914.png\" alt=\"\" class=\"wp-image-1318\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062914.png 868w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062914-300x37.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062914-768x96.png 768w\" sizes=\"auto, (max-width: 868px) 100vw, 868px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-0cdf373346909c97a13de33cda613851\">&#8220;What internal IP was assigned after successful VPN login?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"263\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-061549.png\" alt=\"\" class=\"wp-image-1319\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-061549.png 950w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-061549-300x83.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-061549-768x213.png 768w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-e7212348089fffd8b3115275257b66ab\">&#8220;Which port was used for lateral SMB attempts?&#8221; <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"938\" height=\"252\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-061807.png\" alt=\"\" class=\"wp-image-1320\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-061807.png 938w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-061807-300x81.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-061807-768x206.png 768w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-953e28e1058b5623994e4ef5179e3136\">&#8220;In the IDS logs, which host beaconed to the C2?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"946\" height=\"460\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062151.png\" alt=\"\" class=\"wp-image-1321\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062151.png 946w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062151-300x146.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-062151-768x373.png 768w\" sizes=\"auto, (max-width: 946px) 100vw, 946px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-ef392efb9b6c5c5d21b8171faaa6f6df\">&#8220;During the investigation, which IP was observed to be associated with C2?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"948\" height=\"664\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063459.png\" alt=\"\" class=\"wp-image-1322\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063459.png 948w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063459-300x210.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063459-768x538.png 768w\" sizes=\"auto, (max-width: 948px) 100vw, 948px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-59abd0ce7c87f4d0c7440e155a76a1a0\">&#8220;Which host showed the exfiltration attempts?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"653\" height=\"336\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063538.png\" alt=\"\" class=\"wp-image-1323\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063538.png 653w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-063538-300x154.png 300w\" sizes=\"auto, (max-width: 653px) 100vw, 653px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/tryhackme.com\/room\/networksecurityessentialsCreated by: tryhackme, Dex01 &#8220;The networks are the backbone of every modern organization.&nbsp; Servers, workstations, applications, and security devices don\u2019t exist in isolation; they are interconnected, forming a single ecosystem. The network perimeter is where this internal ecosystem is segregated from the external Internet, and it is often the first target for attackers. This room [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1301","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/1301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1301"}],"version-history":[{"count":4,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/1301\/revisions"}],"predecessor-version":[{"id":1324,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/1301\/revisions\/1324"}],"wp:attachment":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}