{"id":28811,"date":"2023-04-19T13:48:50","date_gmt":"2023-04-19T13:48:50","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=28811"},"modified":"2023-04-19T13:48:56","modified_gmt":"2023-04-19T13:48:56","slug":"decider","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/decider\/","title":{"rendered":"Decider : Process Of Mapping Adversary Behaviors To The MITRE ATT&amp;CK Framework"},"content":{"rendered":"\n<p><strong>Decider <\/strong>is a Web Application That Assists Network Defenders, Analysts, And Researcher In The Process Of Mapping Adversary Behaviors To The MITRE ATT&amp;CK Framework.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Notifications<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Manual installation for Ubuntu &amp; CentOS is much nicer.\n<ul class=\"wp-block-list\">\n<li>Scroll down to <strong>Manual Install<\/strong> for details!<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Will be adding information about hardware requirements soon<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#what-is-it\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">What is it?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#the-short\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Short<\/strong><\/h3>\n\n\n\n<p>A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&amp;CK\u00ae framework.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#the-long\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Long<\/strong><\/h3>\n\n\n\n<p>Decider is a tool to help analysts map adversary behavior to the MITRE ATT&amp;CK framework. Decider makes creating ATT&amp;CK mappings easier to get right by walking users through the mapping process. It does so by asking a series of guided questions about adversary activity to help them arrive at the correct tactic, technique, or subtechnique. Decider has a powerful search and filter functionality that enables users to focus on the parts of ATT&amp;CK that are relevant to their analysis. Decider also has a cart functionality that lets users export results to commonly used formats, such as tables and ATT&amp;CK Navigator\u2122 heatmaps.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#the-screenshots\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Screenshots<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#deciders-question-tree\"><\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Decider&#8217;s Question Tree<\/strong><\/h3>\n\n\n\n<p>(<em>you are here<\/em>)<strong>[Matrix &gt; Tactic]<\/strong> &gt; Technique &gt; SubTechnique<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpkAWVG-mb3CtdbEjyoOAzQzQkUoUAR0Kwp8heRd5eKVC4IdDdQQ1E3qSiUD0ng20FjLjjK4gIip4e06xu-EfMtkk3y5bwBVzA6vWajawWFXMowhbsKyMaZhzCdFLegiWMwr-53twA7SZ1V9PTzklWSUF45R_IsXpW6r0SlKWHueV0uyzfHENPI03G\/s16000\/question-tree-1.0.0.png\" alt=\"\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Decider&#8217;s Full Technique Search<\/strong><\/h3>\n\n\n\n<p>Boolean expressions, prefix-matching, and stemming included.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi1H4zSoWLhpluzWuBwqAKCFU_Zk2FEmUYMnHsvUwUsPNC98iOSWNfft7_FPEjpPAcktfCGymsB5G-PQ0VkcLBMZNPp6nhF56kcNtSTU2Bilm8IFiKpHwbU0kAxiBWKAuSX0lel8G47k29yCVUnXqqIDOE9M-MQyVXoHlTSSBt-4mTXmviMxWGZCyU-\/s16000\/full-search-1.0.0.png\" alt=\"\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Notice<\/strong><\/h3>\n\n\n\n<p>This project makes use of MITRE ATT&amp;CK &#8211; <a href=\"https:\/\/attack.mitre.org\/resources\/terms-of-use\/\">ATT&amp;CK Terms of Use<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#usage\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Usage<\/h2>\n\n\n\n<p><strong>Read the <a href=\"https:\/\/github.com\/cisagov\/decider\/blob\/develop\/docs\/Decider_User_Guide_v1.0.0.pdf\">User Guide<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#installation\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Installation<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#docker\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Docker<\/strong><\/h3>\n\n\n\n<p><strong>Best option for 99% of people<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted has-background\" style=\"background-color:#f4f4f4\"><strong>git clone https:\/\/github.com\/cisagov\/decider.git\ncd decider\ncp .env.docker .env\n\n# if you want HTTPS instead of HTTP\n# - edit .env\n#   + WEB_HTTPS_ON='yes'\n# - populate cert \/ key files\n#   + \/app\/utils\/certs\/decider.key\n#   + \/app\/utils\/certs\/decider.crt\n\n[sudo] docker compose up\n# sudo for Linux only<\/strong><\/pre>\n\n\n\n<p>It is ready when <strong>Starting uWSGI<\/strong> appears<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuPYkkOOWvR-5f1XLCoQjwXUwXo49PRKTKV6BbSh6jkUC1IQkKli3TONHQY9YS_MVs4fWL7T-pd4PoVgTmo8-1zqYw4fYHI3Cq2dsbwqF_AwOb6_5p_kspLH6QQYAmjIdrmn48FPcdGabt-pQxTcVZTkMFV5VJItEoKYWYQseNGmVMu4zhowI0jj4R\/s16000\/docker-started-1.0.0.png\" alt=\"\" \/><\/figure>\n\n\n\n<p><strong>Default Endpoint<\/strong>: <a href=\"http:\/\/localhost:8001\/\">http:\/\/localhost:8001\/<\/a><\/p>\n\n\n\n<p><strong>Default Login<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email: <a href=\"mailto:admin@admin.com\">admin@admin.com<\/a><\/li>\n\n\n\n<li>Password: admin<\/li>\n<\/ul>\n\n\n\n<p><strong>Endpoint Determination<\/strong> (.env vars):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>WEB_HTTPS_ON=''<\/code> -&gt; http:\/\/<code>WEB_IP<\/code>:<code>WEB_PORT<\/code>\/<\/li>\n\n\n\n<li><code>WEB_HTTPS_ON='anything'<\/code> -&gt; https:\/\/<code>WEB_IP<\/code>:<code>WEB_PORT<\/code>\/<\/li>\n<\/ul>\n\n\n\n<p><strong>HTTPS Cert Location<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Write these 2 files before <code>docker compose up<\/code> to set your SSL cert up\n<ul class=\"wp-block-list\">\n<li>\/app\/utils\/certs\/decider.key<\/li>\n\n\n\n<li>\/app\/utils\/certs\/decider.crt<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>If either file is missing, a self-signed cert is generated and used instead<\/li>\n<\/ul>\n\n\n\n<p><strong>DB Persistence Note<\/strong>: Postgres stores its data in a Docker volume to persist the database.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#linux-tested-on\"><\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Linux tested on:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ubuntu Jammy 22.04.2 LTS<\/li>\n\n\n\n<li>Docker Engine\n<ul class=\"wp-block-list\">\n<li>Not Docker Desktop (couldn&#8217;t get nested-virt in my VM)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#windows-tested-on\"><\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Windows tested on:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows 11 Home, version 22H2, build 22621.1344<\/li>\n\n\n\n<li>Home doesn&#8217;t support HyperV\n<ul class=\"wp-block-list\">\n<li>Thus tested on Docker Desktop <a href=\"https:\/\/docs.docker.com\/desktop\/windows\/wsl\/\">via WSL backend<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#macos-m1-tested-on\"><\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>macOS (M1) tested on:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>macOS Ventura 13.2.1 (22D68)<\/li>\n\n\n\n<li>Mac M1 Processor<\/li>\n\n\n\n<li>On Docker Desktop installed via .dmg<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#manual-install\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Manual Install<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#ubuntu-2204\"><\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Ubuntu 22.04<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/github.com\/cisagov\/decider\/blob\/develop\/docs\/install\/Ubuntu_22.04.2.md\">Ubuntu Install Guide<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#centos-7\"><\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>CentOS 7<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/github.com\/cisagov\/decider\/blob\/develop\/docs\/install\/CentOS_7.md\">CentOS Install Guide<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#other-oses\"><\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Other OSes<\/strong><\/h3>\n\n\n\n<p>Read the Ubuntu &amp; CentOS guides and recreate actions according to your platform.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#windows\"><\/a><\/h5>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Windows<\/strong><\/h3>\n\n\n\n<p><code>open()<\/code> in Python uses the system&#8217;s default text encoding<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This is <code>utf-8<\/code> on macOS and Linux<\/li>\n\n\n\n<li>This is <code>windows-1252<\/code> on Windows\n<ul class=\"wp-block-list\">\n<li>This causes issues in reading the jsons for the database build process<\/li>\n\n\n\n<li>Adding <code>encoding='utf-8'<\/code> as an arg in each <code>open()<\/code> <em><strong>may<\/strong><\/em> allow Windows deployment<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cisagov\/decider#macos\"><\/a><\/h5>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>macOS<\/strong><\/h3>\n\n\n\n<p>(M1 users at least) Make sure to (1) install Postgres before (2) installing the pip requirements<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><code>brew install postgresql<\/code><\/li>\n\n\n\n<li><code>pip install -r requirements.txt<\/code><\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/github.com\/cisagov\/decider\" target=\"_blank\" rel=\"noreferrer noopener\">Click Here To Download<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-background\" style=\"background-color:#f4f4f4\"><strong>Please consider&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/kali-linux-tutorials\/\" target=\"_blank\" rel=\"noreferrer noopener\">following and supporting<\/a>&nbsp;us to stay updated with the latest information.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Decider is a Web Application That Assists Network Defenders, Analysts, And Researcher In The Process Of Mapping Adversary Behaviors To The MITRE ATT&amp;CK Framework. Notifications What is it? The Short A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&amp;CK\u00ae framework. The Long Decider [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28894,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[6004,6005,1896,6006,3714],"class_list":["post-28811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-decider","tag-full-technique-search","tag-linux","tag-mitre-attck-framework","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Decider :Web Application That Assist Network Defenders, Analysts<\/title>\n<meta name=\"description\" content=\"Decider is a web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/decider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Decider :Web Application That Assist Network Defenders, Analysts\" \/>\n<meta property=\"og:description\" content=\"Decider is a web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/decider\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-19T13:48:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-19T13:48:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/decider\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/decider\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Decider : Process Of Mapping Adversary Behaviors To The MITRE ATT&amp;CK Framework\",\"datePublished\":\"2023-04-19T13:48:50+00:00\",\"dateModified\":\"2023-04-19T13:48:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/decider\/\"},\"wordCount\":497,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/decider\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png\",\"keywords\":[\"Decider\",\"Full Technique Search\",\"linux\",\"MITRE ATT&amp;CK framework\",\"windows\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/decider\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/decider\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/decider\/\",\"name\":\"Decider :Web Application That Assist Network Defenders, Analysts\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/decider\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/decider\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png\",\"datePublished\":\"2023-04-19T13:48:50+00:00\",\"dateModified\":\"2023-04-19T13:48:56+00:00\",\"description\":\"Decider is a web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/decider\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/decider\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Decider :Web Application That Assist Network Defenders, Analysts","description":"Decider is a web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/decider\/","og_locale":"en_US","og_type":"article","og_title":"Decider :Web Application That Assist Network Defenders, Analysts","og_description":"Decider is a web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors","og_url":"https:\/\/kalilinuxtutorials.com\/decider\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-04-19T13:48:50+00:00","article_modified_time":"2023-04-19T13:48:56+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/decider\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/decider\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Decider : Process Of Mapping Adversary Behaviors To The MITRE ATT&amp;CK Framework","datePublished":"2023-04-19T13:48:50+00:00","dateModified":"2023-04-19T13:48:56+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/decider\/"},"wordCount":497,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/decider\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png","keywords":["Decider","Full Technique Search","linux","MITRE ATT&amp;CK framework","windows"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/decider\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/decider\/","url":"https:\/\/kalilinuxtutorials.com\/decider\/","name":"Decider :Web Application That Assist Network Defenders, Analysts","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/decider\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/decider\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png","datePublished":"2023-04-19T13:48:50+00:00","dateModified":"2023-04-19T13:48:56+00:00","description":"Decider is a web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/decider\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/decider\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYUwC2UuNBg-CYzEaV0bTwoFCa1DJsCN_4qZIM5A8Wx0Ha1WelTaWbehEW2s3ZOrZGiglTbW8khToJt_ghw5yU1XAope7z_tpgQIplVlmwuIQZGCu9iPTREAC7KnE9cbfyfvZhIyNPlnTv2K-5ybkZvlAKoD2Wh-Pp_G-WdmoMP_RuaCLQGM80JHgT\/s728\/kali%20temp(6).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":35282,"url":"https:\/\/kalilinuxtutorials.com\/mitre-attck-evaluations-and-must-have-intelligence-for-security-leaders\/","url_meta":{"origin":28811,"position":0},"title":"MITRE ATT&amp;CK Evaluations And Must-Have Intelligence For Security Leaders","author":"Balaji N","date":"November 25, 2024","format":false,"excerpt":"In today\u2019s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies they employ to protect their organizations. The \u201cMITRE Engenuity ATT&CK\u00a0Evaluations (PDF Guide): Enterprise\u201d stand out as an essential resource for cybersecurity decision makers to navigate this challenge. Unlike other independent\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"MITRE ATT&amp;CK Evaluations","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36850,"url":"https:\/\/kalilinuxtutorials.com\/atomic-red-team\/","url_meta":{"origin":28811,"position":1},"title":"Atomic Red Team : Mastering Threat Simulations For Advanced Security Testing","author":"Varshini","date":"March 5, 2025","format":false,"excerpt":"The Atomic Red Team is an open-source framework designed to help security teams emulate adversarial tactics and techniques in alignment with the MITRE ATT&CK\u00ae framework. Developed by Red Canary, it provides a library of small, portable detection tests, known as \"atomics,\" that can be executed to assess the effectiveness of\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11343,"url":"https:\/\/kalilinuxtutorials.com\/purplesharp\/","url_meta":{"origin":28811,"position":2},"title":"PurpleSharp : C# Adversary Simulation Tool That Executes Adversary Techniques","author":"R K","date":"August 26, 2020","format":false,"excerpt":"PurpleSharp is an open source adversary simulation tool written in C# that executes adversary techniques within Windows Active Directory environments. The resulting telemetry can be leveraged to measure and improve the efficacy of a detection engineering program. PurpleSharp leverages the MITRE ATT&CK Framework and executes different techniques across the attack\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7091,"url":"https:\/\/kalilinuxtutorials.com\/attackdatamap-datasource-assessment\/","url_meta":{"origin":28811,"position":3},"title":"ATTACKdatamap  : A Datasource Assessment On An Event Level To Show Potential Coverage","author":"R K","date":"October 29, 2019","format":false,"excerpt":"ATTACKdatamap is a datasource assessment on an event level to show potential coverage of the \"MITRE ATT&CK\" framework. This tool is developed by me and has no affiliation with \"MITRE\" nor with its great \"ATT&CK\" team, it is developed with the intention to ease the mapping of data sources to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5995,"url":"https:\/\/kalilinuxtutorials.com\/pyattck-python-module-mitre-attck-framework\/","url_meta":{"origin":28811,"position":4},"title":"Pyattck : A Python Module To Interact With The Mitre ATT&#038;CK Framework","author":"R K","date":"July 31, 2019","format":false,"excerpt":"A Python Module to interact with the Mitre ATT&CK Framework. Pyattck\u00a0has the following notable features in it's current release: Retrieve all Tactics, Techniques, Actors, Malware, Tools, and MitigationsAll techniques have suggested mitigations as a propertyFor each class you can access additional information about related data points:ActorTools used by the Actor\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6183,"url":"https:\/\/kalilinuxtutorials.com\/threathunting-splunk-mitre-attck\/","url_meta":{"origin":28811,"position":5},"title":"ThreatHunting : A Splunk App Mapped To MITRE ATT&#038;CK","author":"R K","date":"August 13, 2019","format":false,"excerpt":"ThreatHunting is a Splunk application containing several dashboards and over 120 reports that will facilitate initial hunting indicators to investigate. You obviously need to be ingesting Sysmon data into Splunk, a good configuration can be found\u00a0here Note:\u00a0This application is not a magic bullet, it will require tuning and real investigative\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=28811"}],"version-history":[{"count":8,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28811\/revisions"}],"predecessor-version":[{"id":28921,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28811\/revisions\/28921"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/28894"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=28811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=28811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=28811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}