{"id":542,"date":"2015-01-25T06:15:45","date_gmt":"2015-01-25T06:15:45","guid":{"rendered":"https:\/\/www.hackmethod.com\/?p=542"},"modified":"2015-12-06T03:40:05","modified_gmt":"2015-12-06T03:40:05","slug":"building-hack-lab-free-part-2","status":"publish","type":"post","link":"https:\/\/hackmethod.com\/building-hack-lab-free-part-2\/","title":{"rendered":"Building A Hack Lab For Free: Part 2"},"content":{"rendered":"<h1>Overview<\/h1>\n<p>In <a href=\"https:\/\/www.hackmethod.com\/building-hack-lab-free-part-1\/\" target=\"_blank\">Part 1<\/a> of building our virtual Hack Lab we installing Virtual Box and client. In this next installment we will install metasploitable 2 and create a private network between the two virtual machines.<\/p>\n<p><!--more--><\/p>\n<h2>Requirements<\/h2>\n<p><a href=\"https:\/\/www.virtualbox.org\/wiki\/Downloads\" target=\"_blank\">Oracle VM Virtual Box<\/a><br \/>\n<a href=\"https:\/\/www.virtualbox.org\/wiki\/Downloads\" target=\"_blank\">Oracle VM Virtual Box Extension Pack<\/a><br \/>\n<a href=\"http:\/\/sourceforge.net\/projects\/metasploitable\/files\/Metasploitable2\/\" target=\"_blank\">Metasploitable 2<\/a><br \/>\n<a href=\"https:\/\/www.kali.org\/downloads\/\" target=\"_blank\">Kali Linux<\/a><\/p>\n<h2>Setup<\/h2>\n<p>1. Open Virtual Box<\/p>\n<p>2.\u00a0Power on your Kali VM<\/p>\n<p>3. Extract the Metasploitable 2 files to any directory of your choosing.\u00a0The Metasploitable file with a blue icon (.vmdk file) is our pre-configured virtual image.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/110.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"543\" data-permalink=\"https:\/\/hackmethod.com\/building-hack-lab-free-part-2\/1-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/110.png?fit=588%2C148&amp;ssl=1\" data-orig-size=\"588,148\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/110.png?fit=300%2C76&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/110.png?fit=588%2C148&amp;ssl=1\" class=\"alignnone wp-image-543 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/110.png?resize=588%2C148&#038;ssl=1\" alt=\"1\" width=\"588\" height=\"148\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/110.png?w=588&amp;ssl=1 588w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/110.png?resize=300%2C76&amp;ssl=1 300w\" sizes=\"(max-width: 588px) 100vw, 588px\" \/><\/a><\/p>\n<p>4. In virtual box click &#8220;New&#8221; in the top left corner just like our Kali install. You may name this image anything you want. Copy my settings below.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/24.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"544\" data-permalink=\"https:\/\/hackmethod.com\/building-hack-lab-free-part-2\/2-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/24.png?fit=362%2C410&amp;ssl=1\" data-orig-size=\"362,410\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/24.png?fit=265%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/24.png?fit=362%2C410&amp;ssl=1\" class=\"alignnone wp-image-544 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/24.png?resize=362%2C410&#038;ssl=1\" alt=\"2\" width=\"362\" height=\"410\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/24.png?w=362&amp;ssl=1 362w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/24.png?resize=265%2C300&amp;ssl=1 265w\" sizes=\"(max-width: 362px) 100vw, 362px\" \/><\/a><\/p>\n<p>5. Allocate how much memory you wish to give. 512MB is more than enough. We will only be using this machine to scan\/exploit in further exercises. Click next.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/31.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"545\" data-permalink=\"https:\/\/hackmethod.com\/building-hack-lab-free-part-2\/3-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/31.png?fit=362%2C410&amp;ssl=1\" data-orig-size=\"362,410\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"3\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/31.png?fit=265%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/31.png?fit=362%2C410&amp;ssl=1\" class=\"alignnone wp-image-545 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/31.png?resize=362%2C410&#038;ssl=1\" alt=\"3\" width=\"362\" height=\"410\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/31.png?w=362&amp;ssl=1 362w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/31.png?resize=265%2C300&amp;ssl=1 265w\" sizes=\"(max-width: 362px) 100vw, 362px\" \/><\/a><\/p>\n<p>6. Select use an existing virtual hard drive and press the little folder with a green arrow. Navigate to where you extracted Metasploitable and select\u00a0the metasploitable.vdmk file. Click create.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/41.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"546\" data-permalink=\"https:\/\/hackmethod.com\/building-hack-lab-free-part-2\/4-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/41.png?fit=362%2C410&amp;ssl=1\" data-orig-size=\"362,410\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"4\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/41.png?fit=265%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/41.png?fit=362%2C410&amp;ssl=1\" class=\"alignnone wp-image-546 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/41.png?resize=362%2C410&#038;ssl=1\" alt=\"4\" width=\"362\" height=\"410\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/41.png?w=362&amp;ssl=1 362w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/41.png?resize=265%2C300&amp;ssl=1 265w\" sizes=\"(max-width: 362px) 100vw, 362px\" \/><\/a><\/p>\n<p>7. Start your VM by pressing the Start green arrow in Virtual Box. You&#8217;ll be presented with a login screen. The login and password by default is &#8216;msfadmin&#8217;<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/51.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"547\" data-permalink=\"https:\/\/hackmethod.com\/building-hack-lab-free-part-2\/5-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/51.png?fit=732%2C481&amp;ssl=1\" data-orig-size=\"732,481\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"5\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/51.png?fit=300%2C197&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/51.png?fit=732%2C481&amp;ssl=1\" class=\"alignnone wp-image-547 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/51.png?resize=732%2C481&#038;ssl=1\" alt=\"5\" width=\"732\" height=\"481\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/51.png?w=732&amp;ssl=1 732w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/51.png?resize=600%2C394&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/51.png?resize=300%2C197&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/51.png?resize=730%2C480&amp;ssl=1 730w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><\/a><\/p>\n<p><strong>Note:<\/strong>\u00a0\u00a0At this point you have your two machines and they are NAT or network address translatable to your primary computer. We wish to isolate our lab from our home network while practicing to prevent anything we&#8217;re doing from extending to our main home network.<\/p>\n<p>8. In virtual box click settings -&gt;network-&gt; adapter 1. Make your settings match mine. Do this for your Kali and Metasploitable VMs.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"701\" data-permalink=\"https:\/\/hackmethod.com\/building-hack-lab-free-part-2\/capture\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?fit=780%2C583&amp;ssl=1\" data-orig-size=\"780,583\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?fit=300%2C224&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?fit=780%2C583&amp;ssl=1\" class=\" size-full wp-image-701 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?resize=780%2C583&#038;ssl=1\" alt=\"Capture\" width=\"780\" height=\"583\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?w=780&amp;ssl=1 780w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?resize=600%2C448&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?resize=300%2C224&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?resize=356%2C267&amp;ssl=1 356w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture.png?resize=730%2C546&amp;ssl=1 730w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/a><\/p>\n<p>9. Your two machines are now connected to a separate VM only network, virtual box is controlling this network through a virtual DHCP service. Now you need to configure each VM to obtain a IP address via DHCP. Edit your &#8216;\/etc\/network\/interfaces&#8217; file by typing in the command &#8216;sudo nano \/etc\/network\/interfaces&#8217;. \u00a0Use the arrow keys to move around and when you&#8217;re done with your edits press ctrl+x. Save and overwrite your file.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture2.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"703\" data-permalink=\"https:\/\/hackmethod.com\/building-hack-lab-free-part-2\/capture-3\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture2.png?fit=737%2C496&amp;ssl=1\" data-orig-size=\"737,496\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture2.png?fit=300%2C202&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture2.png?fit=737%2C496&amp;ssl=1\" class=\" size-full wp-image-703 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture2.png?resize=737%2C496&#038;ssl=1\" alt=\"Capture\" width=\"737\" height=\"496\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture2.png?w=737&amp;ssl=1 737w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture2.png?resize=600%2C404&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture2.png?resize=300%2C202&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/Capture2.png?resize=730%2C491&amp;ssl=1 730w\" sizes=\"(max-width: 737px) 100vw, 737px\" \/><\/a><\/p>\n<p>Note:\u00a0If you want to statically assign your IP addresses you may do so as well. Just look up Debian network settings in google. Both metasploitable and kali are Debian distros.<\/p>\n<p>10. After you make your edits to your interfaces file you&#8217;ll need to restart your network service\u00a0with the command &#8216;sudo \/etc\/init.d\/networking restart&#8217;. After your service restarts you should have obtained an IP address via DHCP as verified by typing the command &#8216;ifconfig -a&#8217;<\/p>\n<p>11. If you configured everything correctly you should now be able to ping your Kali VM from your metasploitable VM and vice versa.<\/p>\n<h2>Bonus<\/h2>\n<p>I highly recommend updating and installing Virtual Box Guest Additions at this point. Guest additions will allow you to drag and drop from your host to your VM, preserve your copy and pastes and also pass USB devices from your host to your VM.<\/p>\n<p>BlackMoreOps has a great write-up on how to do this <a href=\"http:\/\/www.blackmoreops.com\/2014\/06\/10\/correct-way-install-virtualbox-guest-additions-packages-kali-linux\/\" target=\"_blank\">here<\/a>.<\/p>\n<h2>Wrap-up<\/h2>\n<p>Congratulations! You now have a very simple\u00a0hack lab set-up. You can add other VM&#8217;s to your lab if you wish. Non-updated versions of Windows 98 (No service packs) are also fun to toy with. As I discussed before Metasploitable is a vulnerable *nix machine. At this point you can leave it running and begin trying to attack it. If you don&#8217;t know where to begin, don&#8217;t worry. We&#8217;ll show you how. If you wish to get a jump start I recommend the book\u00a0[easyazon_link asin=&#8221;159327288X&#8221; locale=&#8221;US&#8221; new_window=&#8221;default&#8221; nofollow=&#8221;default&#8221; tag=&#8221;hackm01-20&#8243;]Metasploit: The Penetration Tester&#8217;s Guide[\/easyazon_link]. It has several tutorials on how to begin with metasploit and is a pretty good reference.<\/p>\n<p>&nbsp;<\/p>\n<p>NOTE: It is ILLEGAL to attack a network when\u00a0you do not have express permission in writing to do so. Use ONLY your wireless network unless you want to go to jail.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview In Part 1 of building our virtual Hack Lab we installing Virtual Box and client. In this next installment we will install metasploitable 2 and create a private network between the two virtual machines.<\/p>\n","protected":false},"author":1,"featured_media":550,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[49],"tags":[56,55,46],"class_list":["post-542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials","tag-hacklab","tag-software","tag-tutorials"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/01\/kali-wp-june-2014_1920x1080_B1.png?fit=1920%2C1080&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5zY4D-8K","_links":{"self":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/comments?post=542"}],"version-history":[{"count":16,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/542\/revisions"}],"predecessor-version":[{"id":1226,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/542\/revisions\/1226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media\/550"}],"wp:attachment":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media?parent=542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/categories?post=542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/tags?post=542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}