{"id":9365,"date":"2019-02-10T00:43:11","date_gmt":"2019-02-10T00:43:11","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/?p=9365"},"modified":"2019-02-10T02:20:23","modified_gmt":"2019-02-10T02:20:23","slug":"getting-started-with-nikto-vulnerability-scanner-linux-hint","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2019\/02\/10\/getting-started-with-nikto-vulnerability-scanner-linux-hint\/","title":{"rendered":"Getting started with Nikto vulnerability scanner \u2013 Linux Hint"},"content":{"rendered":"<h3><strong>Installing Nikto:<\/strong><\/h3>\n<p>In this case I\u2019m using a Debian system, you can download Nikto for Debian at\u00a0<a href=\"https:\/\/packages.debian.org\/jessie\/all\/nikto\/download\">https:\/\/packages.debian.org\/jessie\/all\/nikto\/download<\/a>\u00a0. In case your system returns dependency errors\u00a0 when executing \u201c<strong>dpkg -i &lt;packagename&gt;<\/strong>\u201d (as explained at\u00a0<a href=\"https:\/\/linuxhint.com\/uninstall-debian-packages\/\">https:\/\/linuxhint.com\/uninstall-debian-packages\/<\/a>) execute the command \u201c<strong>apt \u2013fix-broken install<\/strong>\u201d and you\u2019ll get it installed.<\/p>\n<div class=\"Bxl0mTrz\"><\/div>\n<h3><strong>Getting started with Nikto:<\/strong><span id=\"ezoic-pub-ad-placeholder-141\" class=\"ezoic-adpicker-ad\"><\/span><\/h3>\n<p>Like with any Linux package you can always throw a \u201cman nikto\u201d to learn all parameters. The first parameter we\u2019ll use, and which is mandatory, is\u00a0<strong>-host\u00a0<\/strong>(or\u00a0<strong>-h<\/strong>)to specify the target. In this case I decided to use as target a very old unmaintained website which may throw interesting results:<\/p>\n<div class=\"jI29cE23\"><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36383\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/1-11.png\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/1-11.png 754w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/1-11-300x163.png 300w\" alt=\"\" width=\"754\" height=\"409\" \/><\/p>\n<p>As with any scanner we receive basic information useful in a footprinting process but additionally we can see within the first results Nikto already discovered a possible vulnerability exposing the website to Clickjacking attacks.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/2-13.png\" \/><\/p>\n<p>The website has no redirection to www so I launched the scan again.<\/p>\n<p>You can see they are using an old Apache version under CentOS and several possible vulnerabilities like OSVDB-877, OSVDB-3092, OSVDB-3268, OSVDB-3233, in the past we could search in the\u00a0<a href=\"http:\/\/www.osvdb.org\/\">http:\/\/www.osvdb.org<\/a>\u00a0database but it is offline now, therefore we\u2019ll need to base the vulnerability on the information Nikto provides or to google it, in this case we would google Cross Site Tracing attacks.<\/p>\n<p>Let\u2019s combine Nikto with Nmap, so we can see what ports a Webserver has open before using Nikto, ill throw a basic Nmap scan against the same target to check if it has additional ports open.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36385\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/3-11.png\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/3-11.png 754w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/3-11-300x163.png 300w\" alt=\"\" width=\"754\" height=\"409\" \/><\/p>\n<p class=\"Normal1\"><span lang=\"EN\">The interesting here may be the port 5060 used for VOIP, the port seems associated with known vulnerabilities\u00a0<a href=\"https:\/\/www.speedguide.net\/port.php?port=5060\">according to this source<\/a>, through Nikto it is unlikely to give important results but let\u2019s try it.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36386\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/4-10.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/4-10.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/4-10-300x110.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/4-10-768x281.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/4-10-1024x374.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/4-10-810x296.png 810w\" alt=\"\" width=\"1140\" height=\"416\" \/><\/p>\n<p>Where<\/p>\n<p>-p =\u00a0 specifies the port.<\/p>\n<p>-h = specifies the host<\/p>\n<p>-useproxy = to scan using a proxy and avoid the target to see our IP.<\/p>\n<p>In contrast with the scan we launched before now Nikto found a XML file linking us to a blog article explaining the vulnerability the file may represent. It is recommendable to run Nmap against a target before using Nikto to target open ports.<\/p>\n<p>It is important to highlight Nikto results will differ according to the parameters and data we use, even against the same target, for example, if you use the target\u2019s domain name or the target\u2019s IP or change the port. Let\u2019s see if we can find a third different result on the same target:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36387\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/5-11.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/5-11.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/5-11-300x139.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/5-11-768x357.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/5-11-1024x476.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/5-11-810x377.png 810w\" alt=\"\" width=\"1140\" height=\"530\" \/><\/p>\n<p>The result is very similar in this case, despite more errors were reported (21 vs 18 the first scan), possibly due redirection issues.<\/p>\n<h3><strong>Multiple port scanning with Nikto:<\/strong><\/h3>\n<p>If we run Nmap to discover a site has multiple ports open we can scan all them in a single Nikto session by separating ports with coma as shown below:<\/p>\n<p>I run:<\/p>\n<div class=\"codecolorer-container bash default\">\n<div class=\"bash codecolorer\"><span class=\"kw2\">nmap<\/span>\u00a0proz.com<br \/>\nnikto\u00a0<span class=\"re5\">-h<\/span>\u00a0proz.com\u00a0<span class=\"re5\">-p<\/span>\u00a0<span class=\"nu0\">80<\/span>,<span class=\"nu0\">111<\/span>,<span class=\"nu0\">443<\/span>,<span class=\"nu0\">5666<\/span><\/div>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36388\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/6-9.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/6-9.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/6-9-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/6-9-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/6-9-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/6-9-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36389\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/7-9.png\" sizes=\"auto, (max-width: 1366px) 100vw, 1366px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/7-9.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/7-9-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/7-9-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/7-9-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/7-9-810x440.png 810w\" alt=\"\" width=\"1366\" height=\"742\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36390\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/8-9.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/8-9.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/8-9-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/8-9-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/8-9-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/8-9-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36391\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/9-9.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/9-9.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/9-9-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/9-9-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/9-9-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/9-9-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36392\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/10-8.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/10-8.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/10-8-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/10-8-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/10-8-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/10-8-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36393\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/11-8.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/11-8.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/11-8-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/11-8-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/11-8-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/11-8-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><span id=\"ezoic-pub-ad-placeholder-160\" class=\"ezoic-adpicker-ad\"><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36394\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/12-5.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/12-5.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/12-5-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/12-5-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/12-5-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/12-5-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36395\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/13-5.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/13-5.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/13-5-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/13-5-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/13-5-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/13-5-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36396\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/14-5.png\" sizes=\"auto, (max-width: 1366px) 100vw, 1366px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/14-5.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/14-5-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/14-5-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/14-5-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/14-5-810x440.png 810w\" alt=\"\" width=\"1366\" height=\"742\" \/><\/p>\n<p>As you see after getting all open ports by Nmap I threw a Nikto scan, it automatically discards ports which are not running web applications. By adding all ports Nikto discovered multiple vulnerabilities including very sensitive directories holding possible credentials, SQL Injection and XSS vulnerabilities, brute force possibilities among a lot more of opportunities to exploit the server.<\/p>\n<p>To reproduce Nikto results with complete results just run:<\/p>\n<div class=\"codecolorer-container bash default\">\n<div class=\"bash codecolorer\"><span class=\"st0\">&#8220;nikto -h proz.com -p 80,111,443,5666&#8221;<\/span><\/div>\n<\/div>\n<h3><strong>Using Nikto plugins:<\/strong><\/h3>\n<p>\u201c<strong>Nikto\u00a0 -list-plugins<\/strong>\u201d will display a list of additional plugins which may help to scan a target or confirm a vulnerability reported by Nikto.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36397\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/15-5.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/15-5.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/15-5-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/15-5-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/15-5-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/15-5-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><\/p>\n<p>Let\u2019s verify if the results above showing XSS vulnerabilities are not a false positive.<br \/>\nRun:<\/p>\n<div class=\"codecolorer-container bash default\">\n<div class=\"bash codecolorer\">nikto\u00a0<span class=\"re5\">-h<\/span>\u00a0proz.com\u00a0<span class=\"re5\">-Plugins<\/span>\u00a0<span class=\"st0\">&#8220;apache_expect_xss(verbose,debug)&#8221;<\/span><\/div>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36398\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/16-5.png\" sizes=\"auto, (max-width: 1366px) 100vw, 1366px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/16-5.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/16-5-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/16-5-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/16-5-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/16-5-810x440.png 810w\" alt=\"\" width=\"1366\" height=\"742\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36399\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/17-3.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/17-3.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/17-3-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/17-3-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/17-3-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/17-3-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36400\" src=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/18-2.png\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" srcset=\"https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/18-2.png 1140w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/18-2-300x163.png 300w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/18-2-768x417.png 768w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/18-2-1024x556.png 1024w, https:\/\/linuxhint.com\/wp-content\/uploads\/2019\/02\/18-2-810x440.png 810w\" alt=\"\" width=\"1140\" height=\"619\" \/><\/p>\n<p><span id=\"ezoic-pub-ad-placeholder-140\" class=\"ezoic-adpicker-ad\"><\/span><\/p>\n<p class=\"Normal1\"><span lang=\"EN\">As we see in this case Nikto informs \u201c\u2018message\u2019 =&gt; \u2018Expectation Failed\u201d discarding the XSS vulnerability, if it was your server you could use different plugins to discard or confirm the rest of vulnerabilities.<\/span><\/p>\n<h4><strong>Conclusion:<\/strong><\/h4>\n<p>Nikto is a very light vulnerabilities scanner for web servers, it is useful if you have no time to deal with heavy scanners like Nexpose or Nessus, despite this, if you have time to analyze your target I would recommend a more complete scanner like Nexpose, Nessus, OpenVAS or Nmap, some of which we already analyzed at LinuxHint simply because they are not limited to web servers and all aspects deserve to be deeply checked in order to protect a server.<\/p>\n<p><a href=\"https:\/\/linuxhint.com\/nikto_vulnerability_scanner\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Installing Nikto: In this case I\u2019m using a Debian system, you can download Nikto for Debian at\u00a0https:\/\/packages.debian.org\/jessie\/all\/nikto\/download\u00a0. In case your system returns dependency errors\u00a0 when executing \u201cdpkg -i &lt;packagename&gt;\u201d (as explained at\u00a0https:\/\/linuxhint.com\/uninstall-debian-packages\/) execute the command \u201capt \u2013fix-broken install\u201d and you\u2019ll get it installed. Getting started with Nikto: Like with any Linux package you can always &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2019\/02\/10\/getting-started-with-nikto-vulnerability-scanner-linux-hint\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Getting started with Nikto vulnerability scanner \u2013 Linux Hint&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9365","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/9365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=9365"}],"version-history":[{"count":2,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/9365\/revisions"}],"predecessor-version":[{"id":9367,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/9365\/revisions\/9367"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=9365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=9365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=9365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}