{"id":14947,"date":"2021-07-23T20:08:35","date_gmt":"2021-07-23T14:38:35","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=14947"},"modified":"2021-07-23T20:08:35","modified_gmt":"2021-07-23T14:38:35","slug":"artif","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/artif\/","title":{"rendered":"ARTIF : An Advanced Real Time Threat Intelligence Framework To Identify Threats And Malicious Web Traffic On The Basis Of IP Reputation And Historical Data."},"content":{"rendered":"\n<p><strong>ARTIF<\/strong> is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP to identify threats and malicious web traffic on the basis of IP reputation and historical data. It also performs automatic enrichment and threat scoring by collecting, processing and correlating observables based on different factors.<\/p>\n\n\n\n<p>Key features of ARTIF includes:-<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Scoring System: Enriches IP addresses with threat metadata including a threat score which can act as a threshold value for security teams to take action on.<\/li><li>Containerized: ARTIF is deployed using containers and hence provides ease for deployment.<\/li><li>Modular Architecture: The project is plugin-based and can be extended easily by just modifying threat feeds in MISP. There would be no downtime to the actual service as these would be in-line update.<\/li><li>Alerting: Extended feature providng seamless integration with slack for active alerting. It also provides better attack profiling and visualization.<\/li><\/ul>\n\n\n\n<p>Some use Cases:-<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Threat Detection<\/li><li>Logging and Monitoring<\/li><li>User profiling<\/li><li>Alerting automation<\/li><\/ul>\n\n\n\n<p>Why use ARTIF? It is real time Threat Intel Framework that can help identify malicious IPs even though they are not present in the MISP. This helps organizations to set up first layer of defense by providing transparency over malicious web traffic reaching their servers.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>By default 52 configured open source threat feeds with a database of 0.7M IP addresses.<\/li><li>Has latency of ~ 180 ms &gt; 10x faster than commercial products.<\/li><li>Historical IPs are stored for analysis and used in scoring on the basis of past records and patterns.<\/li><li>Adds score to each IP in addition to other metadata.<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Pre-Requisites<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>What is MISP and how to install?<\/li><\/ul>\n\n\n\n<p>Taken from MISP :&nbsp;<em>MISP is an open source software solution for collecting, storing, distributing and sharing cyber security indicators and threats about cyber security incidents analysis and malware analysis. MISP is designed by and for incident analysts, security and ICT professionals or malware reversers to support their day-to-day operations to share structured information efficiently.<\/em><\/p>\n\n\n\n<p>MISP can be installed using source code or their pre-built AWS images. More information about MISP installation can be found at their website.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>We need to have subscription to maxmind in order to populate meta-data for the IP. To add your sub key edit docker-compose.yaml<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>maxmind:<br>image: maxmindinc\/geoipupdate<br>environment:<br>GEOIPUPDATE_ACCOUNT_ID: xxxxx<br>GEOIPUPDATE_LICENSE_KEY: xxxxxxxxxxxxxx<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Installation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Clone the repository using git or download the zip file<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>git clone https:\/\/github.com\/CRED-CLUB\/ARTIF\/<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Build the docker by changing the working directory to the ARTIF folder and start the docker containers for it.<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>sudo docker-compose build<br>sudo docker-compose up<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li>Setup MISP and visit the MISP dashboard and get the MISP key. Now edit the config.yaml and add the MISP_KEY and the MISP_URL values. Here MISP_KEY will be your API key for MISP and MISP_URL will be the URL where MISP is hosted.<\/li><\/ol>\n\n\n\n<p>Below is a config example.yaml for your reference. Simply replace the corresponding values with your values.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>credentials:<br>MISP_URL: &#8220;https:\/\/127.0.0.1&#8221;<br>MISP_KEY: &#8220;qwertyuiopasdfghjk&#8221;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Now run the below command with the full absolute path to update_check.py file with -s argument<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 \/home\/user\/ARTIF\/ip_rep\/feed_ingestor\/update_check.py -s<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Now run the same command without -s argument.<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 \/home\/user\/ARTIF\/ip_rep\/feed_ingestor\/update_check.py<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Add the crontab using Django&#8217;s inbuilt support by running the below command<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 manage.py crontab add<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Start the Django server from the ip_rep directory.<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 manage.py runserver<\/strong><\/p>\n\n\n\n<p>This will open the port 8000 which can be used to get the metadata for the IP addresses. You can now try getting the threat score for any particular IP.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>curl 127.0.0.1:8000\/ip\/?ip=x.x.x.x<\/strong><\/p>\n\n\n\n<p>The output being<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">{&#8220;is_IoC&#8221;: false, &#8220;is_Active&#8221;: false, &#8220;metadata&#8221;: {&#8220;asn&#8221;: &#8220;AS165**&#8221;, &#8220;country&#8221;: &#8220;XXX&#8221;, &#8220;org&#8221;: &#8220;XXX&#8221;}, &#8220;score&#8221;: 80.14671726301682, &#8220;description&#8221;: &#8220;XXX&#8221;, &#8220;blacklists&#8221;: &#8220;&#8221;, &#8220;type&#8221;: &#8220;&#8221;, &#8220;historical&#8221;:false, verdict&#8221;: &#8220;No action needed&#8221;}<\/p>\n\n\n\n<p>The score represents a lower risk for the IP as the threat score is high. The higher the score the lesser the non-malicious IP it is.<\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>Note:<\/strong>&nbsp;Instance with 8GB RAM is recommended for ARTIF installation.<\/p>\n\n\n\n<p>Setting up docker containers<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-YIoMDP_tEx4\/YPaWxWbZEaI\/AAAAAAAAKIc\/0jmXIZsrGlclXO2f50YMouai4Xb6dHaMACLcBGAsYHQ\/s920\/docker.gif\" alt=\"\"\/><\/figure>\n\n\n\n<p>Starting ARTIF<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-eqrZnFHo_6o\/YPaYEzL7VzI\/AAAAAAAAKIk\/N1VBYjCLSEoScd8uWISIzKuD0w6LbxipACLcBGAsYHQ\/s920\/artif_in.gif\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Adding Custom Feeds<\/strong><\/p>\n\n\n\n<p>ARTIF supports synchronization with MISP. It syncs MISP feeds, picking the most recent config from settings.yaml and all the new events modified from MISP are reflected in settings.yaml. To add new IP, just login to MISP and click on add feed page. Once the IP is added, the cronjob will pick it up according to its schedule and will be processed automatically.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/CRED-CLUB\/ARTIF#technical-details\"><\/a><strong>Technical Details<\/strong><\/p>\n\n\n\n<p>ARTIF being a threat framework, is highly useful for visibility inside organization traffic. It is completely written in python and collects intelligence on an IP from various feeds. It then sends this data to a correlation engine which generates a threat score where historical data is also one of the factors taken into account for threat score calculation.<\/p>\n\n\n\n<p>Every time a new IP hits the service a celery worker is assigned the task to update its score in the database by coordinating with the correlation engine, which in turn gathers data from multiple sources. To ensure that the data isn\u2019t stale (default \u2018stale time\u2019 value is 24hrs), we run a worker for each IP in the database which hasn\u2019t been updated for the past \u2018stale time\u2019. As with all the other parameters this value is configurable too. Since the threat score calculation is the key to all of this, we\u2019ve laid a lot of emphasis on it. Apart from the well-known threat feeds such as MISP, Cortex, Alien Vault, VirusTotal, and popular blacklist of IPs, we can also add custom feeds according to business and security use case, where customer loyalty can also be used as a parameter for threat score calculation.<\/p>\n\n\n\n<p>For ease of configuration, ARTIF needs the following input to run itself:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Feeds in MISP instance<\/li><li>A MISP key for communicating with the MISP instance<\/li><li>A MISP URL to connect to MISP instance using the MISP key<\/li><\/ul>\n\n\n\n<p>Upon running, the data is processed and stored on a MongoDB container. MongoDB container contains 3 important databases which stores information about the IP in the feed as well as its metadata for eg. country\/ASN, Org, etc. If the IP is not found in the database that means it\u2019s a new IP reaching the server and whose information is not present in MISP. We then calculate a risk score for the particular IP using an algorithm and various other parameters like geolocation, ASN and Org. More information about the scoring engine can be found&nbsp;here.<\/p>\n\n\n\n<p>ARTIF has additional functionality to keep track of old feeds. The default configuration replenishes the latest feeds every 24 hrs. After 24 hrs the old feed is moved to another collection and the latest ones are added. For ease of operation, we have added a field called \u201chistorical\u201d in the output which tells if the IP was historically bad. A false value indicates that IP has been recently added to the feeds while a True value suggests that IP was already present in older feeds and hence its a historically malicious IP.<\/p>\n\n\n\n<p>All the historical IP will be removed from database after 7 days by default.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-5f1AyXhRNXI\/YPaYZvR53eI\/AAAAAAAAKIs\/VQ1T45JIrdg0Eti955G2mgOdb9vULzBqwCLcBGAsYHQ\/s1490\/arch.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage\/Examples<\/strong><\/p>\n\n\n\n<p>You need to invoke ARTIF using update_check.py which is the backbone for ARTIF.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">ubuntu@localhost:~\/ARTIF\/ip_rep\/feed_ingestor$ python3 \/home\/user\/ARTIF\/ip_rep\/feed_ingestor\/update_check.py -h<br>usage: update_check.py [-h] [-s [S]] -k [KEY] -m MISP<br>IP reputation program<br>optional arguments:<br>-h, &#8211;help show this help message and exit<br>-s [S] Required only for the first run<\/p>\n\n\n\n<p>You can also look at the cron job by running the below command &#8211;<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 manage.py crontab show<\/strong><\/p>\n\n\n\n<p>This will auto-update the feed. By default every 24 hrs it will check the MISP for the latest feed and replenish the DB with new IP from feeds. IPs older than 7 days are also removed by the scheduler.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/CRED-CLUB\/ARTIF#adding-custom-feeds\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP to identify threats and malicious web traffic on the basis of IP reputation and historical data. It also performs automatic enrichment and threat scoring by collecting, processing and correlating observables based on different factors. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16975,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png","fifu_image_alt":"ARTIF : An Advanced Real Time Threat Intelligence Framework To Identify Threats And Malicious Web Traffic On The Basis Of IP Reputation And Historical Data.","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[241,1519,1591,1679,1994,3366],"class_list":["post-14947","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-artif","tag-historical-data","tag-identify","tag-ip-reputation","tag-malicious-web-traffic","tag-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ARTIF : Advanced Real Time Threat Intelligence Framework<\/title>\n<meta name=\"description\" content=\"ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP .\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/artif\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ARTIF : Advanced Real Time Threat Intelligence Framework\" \/>\n<meta property=\"og:description\" content=\"ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/artif\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-23T14:38:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/artif\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/artif\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"ARTIF : An Advanced Real Time Threat Intelligence Framework To Identify Threats And Malicious Web Traffic On The Basis Of IP Reputation And Historical Data.\",\"datePublished\":\"2021-07-23T14:38:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/artif\/\"},\"wordCount\":1337,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/artif\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png\",\"keywords\":[\"ARTIF\",\"Historical Data\",\"Identify\",\"IP Reputation\",\"Malicious Web Traffic\",\"Threats\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/artif\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/artif\/\",\"name\":\"ARTIF : Advanced Real Time Threat Intelligence Framework\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/artif\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/artif\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png\",\"datePublished\":\"2021-07-23T14:38:35+00:00\",\"description\":\"ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP .\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/artif\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/artif\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ARTIF : Advanced Real Time Threat Intelligence Framework","description":"ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP .","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/artif\/","og_locale":"en_US","og_type":"article","og_title":"ARTIF : Advanced Real Time Threat Intelligence Framework","og_description":"ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP .","og_url":"https:\/\/kalilinuxtutorials.com\/artif\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-07-23T14:38:35+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/artif\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/artif\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"ARTIF : An Advanced Real Time Threat Intelligence Framework To Identify Threats And Malicious Web Traffic On The Basis Of IP Reputation And Historical Data.","datePublished":"2021-07-23T14:38:35+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/artif\/"},"wordCount":1337,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/artif\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png","keywords":["ARTIF","Historical Data","Identify","IP Reputation","Malicious Web Traffic","Threats"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/artif\/","url":"https:\/\/kalilinuxtutorials.com\/artif\/","name":"ARTIF : Advanced Real Time Threat Intelligence Framework","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/artif\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/artif\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png","datePublished":"2021-07-23T14:38:35+00:00","description":"ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP .","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/artif\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/artif\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-Mi4ggB0-BGk\/YPae3UerxwI\/AAAAAAAAKI0\/xvEV4HzEh88zhDBMMOxDX05LESG7umD2ACLcBGAsYHQ\/s731\/logo%2B%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32281,"url":"https:\/\/kalilinuxtutorials.com\/awesome-malware-analysis\/","url_meta":{"origin":14947,"position":0},"title":"Awesome Malware Analysis &#8211; The Ultimate Resource For Tools, Techniques, And Insights","author":"Varshini","date":"March 12, 2024","format":false,"excerpt":"A curated list of awesome malware analysis tools and resources. Inspired by\u00a0awesome-python\u00a0and\u00a0awesome-php. Malware Collection Anonymizers Honeypots Malware Corpora Open Source Threat Intelligence Tools Other Resources Detection and Classification Online Scanners and Sandboxes Domain Analysis Browser Malware Documents and Shellcode File Carving Deobfuscation Debugging and Reverse Engineering Network Memory Forensics Windows\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37071,"url":"https:\/\/kalilinuxtutorials.com\/c2intelfeeds\/","url_meta":{"origin":14947,"position":1},"title":"C2IntelFeeds: Real-Time C2 Infrastructure Tracking for Threat Intelligence","author":"0xSnow","date":"March 14, 2025","format":false,"excerpt":"What is C2IntelFeeds? C2IntelFeeds is an open-source intelligence project that provides real-time Command and Control (C2) infrastructure data. Using data from Censys and custom detection signatures, it identifies and tracks malicious C2 servers, domains, and IP addresses that threat actors use for cyberattacks. By leveraging these feeds, security teams can\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/C2IntelFeeds-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/C2IntelFeeds-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/C2IntelFeeds-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/C2IntelFeeds-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/C2IntelFeeds-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/C2IntelFeeds-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":810,"url":"https:\/\/kalilinuxtutorials.com\/a-beginners-guide-to-siem\/","url_meta":{"origin":14947,"position":2},"title":"What is SIEM? Complete Guide to Security Information and Event Management","author":"0xSnow","date":"September 10, 2025","format":false,"excerpt":"Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus tools. They require complete visibility into their IT environment, covering user activities, endpoint logs, application events, and network traffic. This is where SIEM (Security Information and Event Management) comes in. A SIEM solution collects, normalizes,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"what is siem?","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2022\/12\/what-is-siem.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2022\/12\/what-is-siem.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2022\/12\/what-is-siem.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2022\/12\/what-is-siem.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2022\/12\/what-is-siem.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2022\/12\/what-is-siem.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7688,"url":"https:\/\/kalilinuxtutorials.com\/rttm\/","url_meta":{"origin":14947,"position":3},"title":"RTTM : Real Time Threat Monitoring Tool","author":"R K","date":"December 14, 2019","format":false,"excerpt":"Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the company goes unnoticed until it becomes viral in public. Thus causing monetary\/reputation damage. This is where RTTM comes into action. RTTM (Real Time Threat Monitoring Tool) is a tool\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":38443,"url":"https:\/\/kalilinuxtutorials.com\/how-web-application-firewall-waf-works\/","url_meta":{"origin":14947,"position":4},"title":"How Web Application Firewalls (WAFs) Work","author":"0xSnow","date":"November 3, 2025","format":false,"excerpt":"General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as a protective layer between web users and web servers. It filters, monitors, and analyzes HTTP and HTTPS traffic to ensure that only safe requests reach the web application. Think of it as a security guard\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhomSEBDAFZOZMWRfQAu44EJATu5mmKuv2x0XfGuqR6v_845VIMVBu9dcwJKaZ8eo5TudynP5te1eZ_xiB6nIpWRQi8L-jt2a3jHw_nRJBUZubj6mQCrwWPkPjePTGd6kWqqjoCFwINrBm_b0-QIY5GIQ4GPwTYCir_g_ILhb4kitSK-rJSaJN3o06b3Lw\/s1728\/How%20Web%20Application%20Firewall%20%28WAF%29%20Works.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhomSEBDAFZOZMWRfQAu44EJATu5mmKuv2x0XfGuqR6v_845VIMVBu9dcwJKaZ8eo5TudynP5te1eZ_xiB6nIpWRQi8L-jt2a3jHw_nRJBUZubj6mQCrwWPkPjePTGd6kWqqjoCFwINrBm_b0-QIY5GIQ4GPwTYCir_g_ILhb4kitSK-rJSaJN3o06b3Lw\/s1728\/How%20Web%20Application%20Firewall%20%28WAF%29%20Works.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhomSEBDAFZOZMWRfQAu44EJATu5mmKuv2x0XfGuqR6v_845VIMVBu9dcwJKaZ8eo5TudynP5te1eZ_xiB6nIpWRQi8L-jt2a3jHw_nRJBUZubj6mQCrwWPkPjePTGd6kWqqjoCFwINrBm_b0-QIY5GIQ4GPwTYCir_g_ILhb4kitSK-rJSaJN3o06b3Lw\/s1728\/How%20Web%20Application%20Firewall%20%28WAF%29%20Works.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhomSEBDAFZOZMWRfQAu44EJATu5mmKuv2x0XfGuqR6v_845VIMVBu9dcwJKaZ8eo5TudynP5te1eZ_xiB6nIpWRQi8L-jt2a3jHw_nRJBUZubj6mQCrwWPkPjePTGd6kWqqjoCFwINrBm_b0-QIY5GIQ4GPwTYCir_g_ILhb4kitSK-rJSaJN3o06b3Lw\/s1728\/How%20Web%20Application%20Firewall%20%28WAF%29%20Works.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhomSEBDAFZOZMWRfQAu44EJATu5mmKuv2x0XfGuqR6v_845VIMVBu9dcwJKaZ8eo5TudynP5te1eZ_xiB6nIpWRQi8L-jt2a3jHw_nRJBUZubj6mQCrwWPkPjePTGd6kWqqjoCFwINrBm_b0-QIY5GIQ4GPwTYCir_g_ILhb4kitSK-rJSaJN3o06b3Lw\/s1728\/How%20Web%20Application%20Firewall%20%28WAF%29%20Works.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhomSEBDAFZOZMWRfQAu44EJATu5mmKuv2x0XfGuqR6v_845VIMVBu9dcwJKaZ8eo5TudynP5te1eZ_xiB6nIpWRQi8L-jt2a3jHw_nRJBUZubj6mQCrwWPkPjePTGd6kWqqjoCFwINrBm_b0-QIY5GIQ4GPwTYCir_g_ILhb4kitSK-rJSaJN3o06b3Lw\/s1728\/How%20Web%20Application%20Firewall%20%28WAF%29%20Works.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31931,"url":"https:\/\/kalilinuxtutorials.com\/chista-open-source-threat-intelligence-framework\/","url_meta":{"origin":14947,"position":5},"title":"Chista | Open Source Threat Intelligence Framework &#8211; Understanding, Predicting, And Defending Against Cyber Threats","author":"Varshini","date":"February 2, 2024","format":false,"excerpt":"In the ever-evolving landscape of cybersecurity threats, staying one step ahead of malicious actors is crucial. Introducing Chista, an open-source Cyber Threat Intelligence (CTI) Framework designed to equip users with the tools and insights needed to understand, predict, and defend against cyber threats. In this article, we'll delve into how\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/14947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=14947"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/14947\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16975"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=14947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=14947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=14947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}