{"id":807,"date":"2015-02-22T19:41:59","date_gmt":"2015-02-22T19:41:59","guid":{"rendered":"https:\/\/www.hackmethod.com\/?p=807"},"modified":"2022-06-03T05:39:11","modified_gmt":"2022-06-03T05:39:11","slug":"overthewire-bandit-21","status":"publish","type":"post","link":"https:\/\/hackmethod.com\/overthewire-bandit-21\/","title":{"rendered":"OvertheWire &#8211; Bandit 21"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.7.5&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<strong>Recap of Level 20<\/strong>: earned about file permissions and running executables.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/overthewire.org\/wargames\/bandit\/bandit21.html\"><strong>Bandit Level 21<\/strong><\/a><\/p>\n<h4><strong>Objective:<\/strong><\/h4>\n<p>Find the password to the next level<\/p>\n<h4><strong>Intel Given:<\/strong><\/h4>\n<ul>\n<li>There is a setuid binary in the home directory that does the following: it makes a connection to localhost on the port you specify as a command line argument. It then reads a line of text from the connection and compares it to the password in the previous level (bandit20).<\/li>\n<li>If the password is correct, it will transmit the password for the next level (bandit21).<strong>NOTE:<\/strong> To beat this level, you need to login twice: once to run the setuid command, and once to start a network daemon to which the setuid will connect.<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<h4><strong>How to:<\/strong><\/h4>\n<p>So by reading our gathered intel we\u2019ve determined that we have a binary in the home directory\u00a0that connects to a port, let\u2019s run it without any arguments and see if it has any more info.<img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"808\" data-permalink=\"https:\/\/hackmethod.com\/overthewire-bandit-21\/bandit21\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21-e1424633768368.png?fit=705%2C91&amp;ssl=1\" data-orig-size=\"705,91\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bandit21\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21-e1424633768368.png?fit=300%2C39&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21-e1424633768368.png?fit=705%2C91&amp;ssl=1\" class=\"aligncenter wp-image-808 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21-e1424633768368.png?resize=705%2C91&#038;ssl=1\" alt=\"bandit 21\" width=\"705\" height=\"91\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21-e1424633768368.png?w=705&amp;ssl=1 705w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21-e1424633768368.png?resize=600%2C77&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21-e1424633768368.png?resize=300%2C39&amp;ssl=1 300w\" sizes=\"(max-width: 705px) 100vw, 705px\" \/><\/p>\n<p>It appears to say pretty much what our intel did, that we have to connect to a port, send the current level password to it, and then it will send the password to the next level back. So now the problem is finding a way for us to listen to a port without setting up an entire service that we don\u2019t need.\u00a0 If you remember a few lessons ago we talked about nc and it\u2019s many uses. One of them is being able to go create a simple connection to pass data between two hosts on a port.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.1.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"809\" data-permalink=\"https:\/\/hackmethod.com\/overthewire-bandit-21\/bandit21-1\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.1.png?fit=265%2C36&amp;ssl=1\" data-orig-size=\"265,36\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bandit21.1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.1.png?fit=265%2C36&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.1.png?fit=265%2C36&amp;ssl=1\" class=\" size-full wp-image-809 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.1.png?resize=265%2C36&#038;ssl=1\" alt=\"bandit 21\" width=\"265\" height=\"36\" \/><\/a>Where -l is the option for listening mode and 1025 being the first port outside of the well known 1024. Now lets see what happens when we connect to that port with another session, please note that the sessions have to be running simultaneously of this to work.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.2-e1424633965300.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"810\" data-permalink=\"https:\/\/hackmethod.com\/overthewire-bandit-21\/bandit21-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.2-e1424633965300.png?fit=312%2C55&amp;ssl=1\" data-orig-size=\"312,55\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bandit21.2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.2-e1424633965300.png?fit=300%2C53&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.2-e1424633965300.png?fit=312%2C55&amp;ssl=1\" class=\" size-full wp-image-810 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.2-e1424633965300.png?resize=312%2C55&#038;ssl=1\" alt=\"bandit 21\" width=\"312\" height=\"55\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.2-e1424633965300.png?w=312&amp;ssl=1 312w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.2-e1424633965300.png?resize=300%2C53&amp;ssl=1 300w\" sizes=\"(max-width: 312px) 100vw, 312px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.3-e1424633995389.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"811\" data-permalink=\"https:\/\/hackmethod.com\/overthewire-bandit-21\/bandit21-3\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.3-e1424633995389.png?fit=256%2C74&amp;ssl=1\" data-orig-size=\"256,74\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bandit21.3\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.3-e1424633995389.png?fit=256%2C74&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.3-e1424633995389.png?fit=256%2C74&amp;ssl=1\" class=\" size-full wp-image-811 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.3-e1424633995389.png?resize=256%2C74&#038;ssl=1\" alt=\"bandit 21\" width=\"256\" height=\"74\" \/><\/a><\/p>\n<p>As we the text in under one of our prompts we see that it appears on the other one. This means that our ports can hear each other. So let\u2019s set one up and try and connect with the binary file that has been created for us.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.4.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"812\" data-permalink=\"https:\/\/hackmethod.com\/overthewire-bandit-21\/bandit21-4\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.4.png?fit=297%2C57&amp;ssl=1\" data-orig-size=\"297,57\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bandit21.4\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.4.png?fit=297%2C57&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.4.png?fit=297%2C57&amp;ssl=1\" class=\" size-full wp-image-812 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.4.png?resize=297%2C57&#038;ssl=1\" alt=\"bandit 21\" width=\"297\" height=\"57\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.5.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"813\" data-permalink=\"https:\/\/hackmethod.com\/overthewire-bandit-21\/bandit21-5\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.5.png?fit=335%2C63&amp;ssl=1\" data-orig-size=\"335,63\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bandit21.5\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.5.png?fit=300%2C56&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.5.png?fit=335%2C63&amp;ssl=1\" class=\" size-full wp-image-813 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.5.png?resize=335%2C63&#038;ssl=1\" alt=\"bandit 21\" width=\"335\" height=\"63\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.5.png?w=335&amp;ssl=1 335w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.5.png?resize=300%2C56&amp;ssl=1 300w\" sizes=\"(max-width: 335px) 100vw, 335px\" \/><\/a><\/p>\n<p>We entered the level to the current password under the listening port to send it to the binary file, and it sent us back a password! It looks like we\u2019ve got it!<\/p>\n<h4><strong>Conclusion:<\/strong><\/h4>\n<p>We learned how to setup nc to listen to ports and how to establish simple data transfer using it.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.7.5&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.7.5&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_image src=&#8221;https:\/\/hackmethod.com\/wp-content\/uploads\/2020\/12\/Previous.png&#8221; _builder_version=&#8221;4.7.5&#8243; _module_preset=&#8221;default&#8221; alt=&#8221;Previous Level&#8221; title_text=&#8221;Previous&#8221; url=&#8221;https:\/\/hackmethod.com\/overthewire-bandit-20&#8243; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column _builder_version=&#8221;4.7.5&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_image src=&#8221;https:\/\/hackmethod.com\/wp-content\/uploads\/2020\/12\/Next.png&#8221; _builder_version=&#8221;4.7.5&#8243; _module_preset=&#8221;default&#8221; alt=&#8221;Next Level&#8221; title_text=&#8221;Next&#8221; url=&#8221;https:\/\/hackmethod.com\/overthewire-bandit-22&#8243; align=&#8221;right&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recap of Level 20: earned about file permissions and running executables. &nbsp; Bandit Level 21 Objective: Find the password to the next level Intel Given: There is a setuid binary in the home directory that does the following: it makes a connection to localhost on the port you specify as a command line argument. It [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":808,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<strong><a href=\"https:\/\/www.hackmethod.com\/overthewire-bandit-20\/\" target=\"_blank\">Recap of Last\u00a0Lesson<\/a>: <\/strong>Learned about file permissions and running executables.\r\n\r\n<a href=\"http:\/\/overthewire.org\/wargames\/bandit\/bandit21.html\"><strong>Bandit Level 21<\/strong><\/a>\r\n\r\n<strong>Objective<\/strong>\r\n\r\nFind the password to the next level\r\n\r\n<strong>Intel Given<\/strong>\r\n<ul>\r\n\t<li>There is a setuid binary in the home directory that does the following: it makes a connection to localhost on the port you specify as a command line argument. It then reads a line of text from the connection and compares it to the password in the previous level (bandit20).<\/li>\r\n\t<li>If the password is correct, it will transmit the password for the next level (bandit21).<strong>NOTE:<\/strong> To beat this level, you need to login twice: once to run the setuid command, and once to start a network daemon to which the setuid will connect.<\/li>\r\n<\/ul>\r\n<!--more-->\r\n\r\n<strong>How to<\/strong>\r\n\r\nSo by reading our gathered intel we\u2019ve determined that we have a binary in the home directory\u00a0that connects to a port, let\u2019s run it without any arguments and see if it has any more info.<img class=\"aligncenter wp-image-808 size-full\" src=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21-e1424633768368.png\" alt=\"bandit 21\" width=\"705\" height=\"91\" \/>\r\n\r\nIt appears to say pretty much what our intel did, that we have to connect to a port, send the current level password to it, and then it will send the password to the next level back. So now the problem is finding a way for us to listen to a port without setting up an entire service that we don\u2019t need.\u00a0 If you remember a few lessons ago we talked about nc and it\u2019s many uses. One of them is being able to go create a simple connection to pass data between two hosts on a port.\r\n\r\n<a href=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.1.png\"><img class=\" size-full wp-image-809 aligncenter\" src=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.1.png\" alt=\"bandit 21\" width=\"265\" height=\"36\" \/><\/a>Where -l is the option for listening mode and 1025 being the first port outside of the well known 1024. Now lets see what happens when we connect to that port with another session, please note that the sessions have to be running simultaneously of this to work.\r\n\r\n<a href=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.2-e1424633965300.png\"><img class=\" size-full wp-image-810 aligncenter\" src=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.2-e1424633965300.png\" alt=\"bandit 21\" width=\"312\" height=\"55\" \/><\/a>\r\n\r\n<a href=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.3-e1424633995389.png\"><img class=\" size-full wp-image-811 aligncenter\" src=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.3-e1424633995389.png\" alt=\"bandit 21\" width=\"256\" height=\"74\" \/><\/a>\r\n\r\nAs we the text in under one of our prompts we see that it appears on the other one. This means that our ports can hear each other. So let\u2019s set one up and try and connect with the binary file that has been created for us.\r\n\r\n<a href=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.4.png\"><img class=\" size-full wp-image-812 aligncenter\" src=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.4.png\" alt=\"bandit 21\" width=\"297\" height=\"57\" \/><\/a>\r\n\r\n<a href=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.5.png\"><img class=\" size-full wp-image-813 aligncenter\" src=\"https:\/\/www.hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21.5.png\" alt=\"bandit 21\" width=\"335\" height=\"63\" \/><\/a>\r\n\r\nWe entered the level to the current password under the listening port to send it to the binary file, and it sent us back a password! It looks like we\u2019ve got it!\r\n\r\n<strong>Conclusion<\/strong>\r\n\r\nWe learned how to setup nc to listen to ports and how to establish simple data transfer using it.","_et_gb_content_width":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[52,44,49],"tags":[43,45,46],"class_list":["post-807","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking","category-overthewire","category-tutorials","tag-bandit","tag-overthewire","tag-tutorials"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/02\/bandit21-e1424633768368.png?fit=705%2C91&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5zY4D-d1","_links":{"self":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/comments?post=807"}],"version-history":[{"count":7,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/807\/revisions"}],"predecessor-version":[{"id":27566,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/807\/revisions\/27566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media\/808"}],"wp:attachment":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media?parent=807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/categories?post=807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/tags?post=807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}