{"id":33675,"date":"2024-07-05T06:12:36","date_gmt":"2024-07-05T06:12:36","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=33675"},"modified":"2024-07-05T06:12:37","modified_gmt":"2024-07-05T06:12:37","slug":"dolost","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/dolost\/","title":{"rendered":"DOLOST &#8211; Harnessing Cyber Deception For Strategic Security Deployments"},"content":{"rendered":"\n<p>Explore the cutting-edge framework &#8216;DOLOST,&#8217; designed to innovate the field of cyber deception. <\/p>\n\n\n\n<p>This tool automates the deployment of decoys and deceptive environments, enhancing security strategies. <\/p>\n\n\n\n<p>Learn how DOLOST not only creates but also meticulously designs these operations to outsmart and trap potential threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Table Of Contents<\/strong><a href=\"https:\/\/github.com\/Base4Security\/DOLOS-T?tab=readme-ov-file#table-of-contents\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>About<\/li>\n\n\n\n<li>Installation<\/li>\n\n\n\n<li>Usage<\/li>\n\n\n\n<li>Examples<\/li>\n\n\n\n<li>Contributing<\/li>\n\n\n\n<li>License<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About<\/strong><a href=\"https:\/\/github.com\/Base4Security\/DOLOS-T?tab=readme-ov-file#about\"><\/a><\/h2>\n\n\n\n<p>DOLOST is a framework designed to automate the creation and deployment of decoys and deceptive environments in the context of cyber deception operations. <\/p>\n\n\n\n<p>It also guides the design of deception operations with a deep understanding of engagement strategies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation<\/strong><a href=\"https:\/\/github.com\/Base4Security\/DOLOS-T?tab=readme-ov-file#installation\"><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Ensure Python and Docker are Installed:<\/strong>Make sure you have Python 3.7 or later installed on your system and Docker installed on your Decoy&#8217;s host (it could be the same system you are using right now, just keep it in mind for when you configure DOLOST). You can download and install Python from the official <a href=\"https:\/\/www.docker.com\/get-started\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Python <\/a>website and Docker from the official Docker website.<\/li>\n\n\n\n<li><strong>Install DOLOST Using pip:<\/strong>Run the following command to install the project:<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code># Python 3.7+ required\n$ python3 -m venv .venv\n$ source .venv\/bin\/activate\n$ pip install DOLOST<\/code><\/pre>\n\n\n\n<p>3. <strong>Final Checks:<\/strong>Ensure that all required dependencies are installed without any errors. <\/p>\n\n\n\n<p>If you encounter any issues during the installation process, refer to the error messages for troubleshooting steps.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage<\/strong><a href=\"https:\/\/github.com\/Base4Security\/DOLOS-T?tab=readme-ov-file#usage\"><\/a><\/h2>\n\n\n\n<p>To use the framework you need to start it with a first definition of the Docker client to connect with.<\/p>\n\n\n\n<p>Here you have an example for DOLOST execution:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>import DOLOST\n\n# Available Docker Client configuration:\n# - from_env: Will try to use the current environment configuration to reach dockerd.\n# - tcp: Will use the provided host and port to reach dockerd.\n# - tcp_ssl: Will use the provided host and port + the SSL certificates to reach dockerd using TCP+SSL.\n# - socket: Will use the provided socket path to reach dockerd.\n\n# For more detailed information, refer to \"Configuring Docker Client\" in the Documentation.\n\ndc = {'from_env': True}\n\n# Available Verbosity Levels:\n# - TRACE: Provides detailed tracing information.\n# - DEBUG: Displays debug messages for troubleshooting.\n# - INFO: Provides general information about the execution.\n# - WARN: Displays warnings for potential issues.\n# - ERROR: Indicates errors that occurred during execution.\n\n# Note: Each verbosity level includes all levels above it. For example,\n# setting verbosity to DEBUG will also display INFO, WARN, and ERROR messages.\n\nverbosity = \"INFO\"\n    \nif __name__ == \"__main__\":\n\tDOLOST.start(verbosity=verbosity, docker_client=dc)<\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore the cutting-edge framework &#8216;DOLOST,&#8217; designed to innovate the field of cyber deception. This tool automates the deployment of decoys and deceptive environments, enhancing security strategies. Learn how DOLOST not only creates but also meticulously designs these operations to outsmart and trap potential threats. Table Of Contents About DOLOST is a framework designed to automate [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":33679,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6827,6321,6052,6325],"class_list":["post-33675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-dolost","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DOLOST - Harnessing Cyber Deception For Strategic Security<\/title>\n<meta name=\"description\" content=\"xplore the cutting-edge framework &#039;DOLOST,&#039; designed to innovate the field of cyber deception. This tool automates the deployment of decoys\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/dolost\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DOLOST - Harnessing Cyber Deception For Strategic Security\" \/>\n<meta property=\"og:description\" content=\"xplore the cutting-edge framework &#039;DOLOST,&#039; designed to innovate the field of cyber deception. This tool automates the deployment of decoys\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/dolost\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-05T06:12:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-05T06:12:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dolost\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dolost\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"DOLOST &#8211; Harnessing Cyber Deception For Strategic Security Deployments\",\"datePublished\":\"2024-07-05T06:12:36+00:00\",\"dateModified\":\"2024-07-05T06:12:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dolost\/\"},\"wordCount\":236,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dolost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp\",\"keywords\":[\"cybersecurity\",\"DOLOST\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/dolost\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dolost\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/dolost\/\",\"name\":\"DOLOST - Harnessing Cyber Deception For Strategic Security\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dolost\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dolost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp\",\"datePublished\":\"2024-07-05T06:12:36+00:00\",\"dateModified\":\"2024-07-05T06:12:37+00:00\",\"description\":\"xplore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception. This tool automates the deployment of decoys\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/dolost\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dolost\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DOLOST - Harnessing Cyber Deception For Strategic Security","description":"xplore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception. This tool automates the deployment of decoys","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/dolost\/","og_locale":"en_US","og_type":"article","og_title":"DOLOST - Harnessing Cyber Deception For Strategic Security","og_description":"xplore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception. This tool automates the deployment of decoys","og_url":"https:\/\/kalilinuxtutorials.com\/dolost\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-07-05T06:12:36+00:00","article_modified_time":"2024-07-05T06:12:37+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/dolost\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/dolost\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"DOLOST &#8211; Harnessing Cyber Deception For Strategic Security Deployments","datePublished":"2024-07-05T06:12:36+00:00","dateModified":"2024-07-05T06:12:37+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dolost\/"},"wordCount":236,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dolost\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp","keywords":["cybersecurity","DOLOST","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/dolost\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/dolost\/","url":"https:\/\/kalilinuxtutorials.com\/dolost\/","name":"DOLOST - Harnessing Cyber Deception For Strategic Security","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dolost\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dolost\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp","datePublished":"2024-07-05T06:12:36+00:00","dateModified":"2024-07-05T06:12:37+00:00","description":"xplore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception. This tool automates the deployment of decoys","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/dolost\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/dolost\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":33855,"url":"https:\/\/kalilinuxtutorials.com\/certiception\/","url_meta":{"origin":33675,"position":0},"title":"Certiception &#8211; Reinventing Network Security With Deceptive Active Directory Certificate Services","author":"Varshini","date":"July 16, 2024","format":false,"excerpt":"Certiception is a honeypot for Active Directory Certificate Services (ADCS), designed to trap attackers with a realistic and attractive bait that triggers highly relevant alerts. Developed by the\u00a0SRLabs\u00a0Red Team, Certiception creates a vulnerable-looking certificate template in your ADCS environment, sets up restrictions to prevent exploitation, and supports in setting up\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtsDXJPKkEKFL1Mehdm9BcZRhop-p-omNNZuHU32zqqEu-Yft3cAtd7jbNOSfoku76Gi3ScbadT0dlQ1yWK_sWSH0Hx1KReaiqXOOq7n8D5965rM8z5i_rP3GqEyAPHobs4ITFkzsf9K4ZpYvsYBWCGoLv6Gln6AiCkFORzeRj1S5nylJSTANL96JatKiu\/s16000\/Certiception%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtsDXJPKkEKFL1Mehdm9BcZRhop-p-omNNZuHU32zqqEu-Yft3cAtd7jbNOSfoku76Gi3ScbadT0dlQ1yWK_sWSH0Hx1KReaiqXOOq7n8D5965rM8z5i_rP3GqEyAPHobs4ITFkzsf9K4ZpYvsYBWCGoLv6Gln6AiCkFORzeRj1S5nylJSTANL96JatKiu\/s16000\/Certiception%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtsDXJPKkEKFL1Mehdm9BcZRhop-p-omNNZuHU32zqqEu-Yft3cAtd7jbNOSfoku76Gi3ScbadT0dlQ1yWK_sWSH0Hx1KReaiqXOOq7n8D5965rM8z5i_rP3GqEyAPHobs4ITFkzsf9K4ZpYvsYBWCGoLv6Gln6AiCkFORzeRj1S5nylJSTANL96JatKiu\/s16000\/Certiception%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtsDXJPKkEKFL1Mehdm9BcZRhop-p-omNNZuHU32zqqEu-Yft3cAtd7jbNOSfoku76Gi3ScbadT0dlQ1yWK_sWSH0Hx1KReaiqXOOq7n8D5965rM8z5i_rP3GqEyAPHobs4ITFkzsf9K4ZpYvsYBWCGoLv6Gln6AiCkFORzeRj1S5nylJSTANL96JatKiu\/s16000\/Certiception%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtsDXJPKkEKFL1Mehdm9BcZRhop-p-omNNZuHU32zqqEu-Yft3cAtd7jbNOSfoku76Gi3ScbadT0dlQ1yWK_sWSH0Hx1KReaiqXOOq7n8D5965rM8z5i_rP3GqEyAPHobs4ITFkzsf9K4ZpYvsYBWCGoLv6Gln6AiCkFORzeRj1S5nylJSTANL96JatKiu\/s16000\/Certiception%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtsDXJPKkEKFL1Mehdm9BcZRhop-p-omNNZuHU32zqqEu-Yft3cAtd7jbNOSfoku76Gi3ScbadT0dlQ1yWK_sWSH0Hx1KReaiqXOOq7n8D5965rM8z5i_rP3GqEyAPHobs4ITFkzsf9K4ZpYvsYBWCGoLv6Gln6AiCkFORzeRj1S5nylJSTANL96JatKiu\/s16000\/Certiception%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34002,"url":"https:\/\/kalilinuxtutorials.com\/clay\/","url_meta":{"origin":33675,"position":1},"title":"CLay &#8211; Enhancing Web Security hrough Deceptive Reverse Proxies","author":"Varshini","date":"July 26, 2024","format":false,"excerpt":"CLay offers a unique and powerful feature that goes beyond traditional security measures. CLay takes deception to a new level by mimicking the appearance of a website with information from a different framework. The primary objective is to mislead and deceive potential attackers, leading them to gather false information about\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5_oZGx9SHR06lJAwReiot8Gvl1iLT_0VH2w7PPqQP1fgUD1cfyIrU-ILjioUlQtZvTPUuZR-zEjqh6oRjryd57VjH4qrB-VaTOUHiLFtlni44iSsoen6I8cnvgSis9biTpCqCRLqA_rq7OYYNBTleucsTR_ZNLqvekk90ufITKeX3D7N-TO8LOJkjCsWd\/s16000\/CLay%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5_oZGx9SHR06lJAwReiot8Gvl1iLT_0VH2w7PPqQP1fgUD1cfyIrU-ILjioUlQtZvTPUuZR-zEjqh6oRjryd57VjH4qrB-VaTOUHiLFtlni44iSsoen6I8cnvgSis9biTpCqCRLqA_rq7OYYNBTleucsTR_ZNLqvekk90ufITKeX3D7N-TO8LOJkjCsWd\/s16000\/CLay%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5_oZGx9SHR06lJAwReiot8Gvl1iLT_0VH2w7PPqQP1fgUD1cfyIrU-ILjioUlQtZvTPUuZR-zEjqh6oRjryd57VjH4qrB-VaTOUHiLFtlni44iSsoen6I8cnvgSis9biTpCqCRLqA_rq7OYYNBTleucsTR_ZNLqvekk90ufITKeX3D7N-TO8LOJkjCsWd\/s16000\/CLay%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5_oZGx9SHR06lJAwReiot8Gvl1iLT_0VH2w7PPqQP1fgUD1cfyIrU-ILjioUlQtZvTPUuZR-zEjqh6oRjryd57VjH4qrB-VaTOUHiLFtlni44iSsoen6I8cnvgSis9biTpCqCRLqA_rq7OYYNBTleucsTR_ZNLqvekk90ufITKeX3D7N-TO8LOJkjCsWd\/s16000\/CLay%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5_oZGx9SHR06lJAwReiot8Gvl1iLT_0VH2w7PPqQP1fgUD1cfyIrU-ILjioUlQtZvTPUuZR-zEjqh6oRjryd57VjH4qrB-VaTOUHiLFtlni44iSsoen6I8cnvgSis9biTpCqCRLqA_rq7OYYNBTleucsTR_ZNLqvekk90ufITKeX3D7N-TO8LOJkjCsWd\/s16000\/CLay%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5_oZGx9SHR06lJAwReiot8Gvl1iLT_0VH2w7PPqQP1fgUD1cfyIrU-ILjioUlQtZvTPUuZR-zEjqh6oRjryd57VjH4qrB-VaTOUHiLFtlni44iSsoen6I8cnvgSis9biTpCqCRLqA_rq7OYYNBTleucsTR_ZNLqvekk90ufITKeX3D7N-TO8LOJkjCsWd\/s16000\/CLay%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33755,"url":"https:\/\/kalilinuxtutorials.com\/sinon\/","url_meta":{"origin":33675,"position":2},"title":"Sinon &#8211; Modular Windows Burn-In Automation With Generative AI For Deception","author":"Varshini","date":"July 10, 2024","format":false,"excerpt":"Sinon is a modular tool for automatic burn-in of Windows-based deception hosts that aims to reduce the difficulty of orchestrating deception hosts at scale whilst enabling diversity and randomness through generative capabilities. It has been created as a proof-of-concept and is not intended for production deception environments. It would likely\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhbtd7p_Z9GEYwFprpyhk83eJD8qbwHsyo9rpP49iOmighe5Do8sxXpU-ROtgIOyzO-aDdh0WEJGja99qo5ecmNHtRTWTO3y9TmUSezu0V02cAI-MNSKRU9DhpO4mWnwQ8EkP0divmD5GzCzDPDI90Mejf8NqntIh8OdSCl70sKB6dAgMkzW1rXFSJOc9KY\/s16000\/Sinon%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhbtd7p_Z9GEYwFprpyhk83eJD8qbwHsyo9rpP49iOmighe5Do8sxXpU-ROtgIOyzO-aDdh0WEJGja99qo5ecmNHtRTWTO3y9TmUSezu0V02cAI-MNSKRU9DhpO4mWnwQ8EkP0divmD5GzCzDPDI90Mejf8NqntIh8OdSCl70sKB6dAgMkzW1rXFSJOc9KY\/s16000\/Sinon%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhbtd7p_Z9GEYwFprpyhk83eJD8qbwHsyo9rpP49iOmighe5Do8sxXpU-ROtgIOyzO-aDdh0WEJGja99qo5ecmNHtRTWTO3y9TmUSezu0V02cAI-MNSKRU9DhpO4mWnwQ8EkP0divmD5GzCzDPDI90Mejf8NqntIh8OdSCl70sKB6dAgMkzW1rXFSJOc9KY\/s16000\/Sinon%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhbtd7p_Z9GEYwFprpyhk83eJD8qbwHsyo9rpP49iOmighe5Do8sxXpU-ROtgIOyzO-aDdh0WEJGja99qo5ecmNHtRTWTO3y9TmUSezu0V02cAI-MNSKRU9DhpO4mWnwQ8EkP0divmD5GzCzDPDI90Mejf8NqntIh8OdSCl70sKB6dAgMkzW1rXFSJOc9KY\/s16000\/Sinon%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhbtd7p_Z9GEYwFprpyhk83eJD8qbwHsyo9rpP49iOmighe5Do8sxXpU-ROtgIOyzO-aDdh0WEJGja99qo5ecmNHtRTWTO3y9TmUSezu0V02cAI-MNSKRU9DhpO4mWnwQ8EkP0divmD5GzCzDPDI90Mejf8NqntIh8OdSCl70sKB6dAgMkzW1rXFSJOc9KY\/s16000\/Sinon%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhbtd7p_Z9GEYwFprpyhk83eJD8qbwHsyo9rpP49iOmighe5Do8sxXpU-ROtgIOyzO-aDdh0WEJGja99qo5ecmNHtRTWTO3y9TmUSezu0V02cAI-MNSKRU9DhpO4mWnwQ8EkP0divmD5GzCzDPDI90Mejf8NqntIh8OdSCl70sKB6dAgMkzW1rXFSJOc9KY\/s16000\/Sinon%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":26607,"url":"https:\/\/kalilinuxtutorials.com\/5-reasons-why-you-should-choose-a-career-in-cybersecurity\/","url_meta":{"origin":33675,"position":3},"title":"5 Reasons Why You Should Choose a Career in Cybersecurity","author":"Kaladmin","date":"August 16, 2022","format":false,"excerpt":"While technology introduces many solutions for online data transfer and management, it also gives rise to risks associated with data security, which is why the ratio of cyber attacks is increasing day by day. To combat this issue, the IT world needs more cyber security experts able to prevent and\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-BX7ecnk-X8e1MgtHJ0i83zEPxC4U6r4q6VWpncANUGEsKb9Yng-U1ARE7MJzSPr0bBZGnVD3Axftp39bGkK2tXXYpbInY531XknaAeOte5mfk7TtY3_giQqIobTomf-i1BQkfrnOyCoCXaSWQ5FbxEU5WrQ1Q2W-sJaXkn1PO9MA8C05tNvZQ0Lofw\/s16000\/cybe%20sec%20careersss.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-BX7ecnk-X8e1MgtHJ0i83zEPxC4U6r4q6VWpncANUGEsKb9Yng-U1ARE7MJzSPr0bBZGnVD3Axftp39bGkK2tXXYpbInY531XknaAeOte5mfk7TtY3_giQqIobTomf-i1BQkfrnOyCoCXaSWQ5FbxEU5WrQ1Q2W-sJaXkn1PO9MA8C05tNvZQ0Lofw\/s16000\/cybe%20sec%20careersss.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-BX7ecnk-X8e1MgtHJ0i83zEPxC4U6r4q6VWpncANUGEsKb9Yng-U1ARE7MJzSPr0bBZGnVD3Axftp39bGkK2tXXYpbInY531XknaAeOte5mfk7TtY3_giQqIobTomf-i1BQkfrnOyCoCXaSWQ5FbxEU5WrQ1Q2W-sJaXkn1PO9MA8C05tNvZQ0Lofw\/s16000\/cybe%20sec%20careersss.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-BX7ecnk-X8e1MgtHJ0i83zEPxC4U6r4q6VWpncANUGEsKb9Yng-U1ARE7MJzSPr0bBZGnVD3Axftp39bGkK2tXXYpbInY531XknaAeOte5mfk7TtY3_giQqIobTomf-i1BQkfrnOyCoCXaSWQ5FbxEU5WrQ1Q2W-sJaXkn1PO9MA8C05tNvZQ0Lofw\/s16000\/cybe%20sec%20careersss.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-BX7ecnk-X8e1MgtHJ0i83zEPxC4U6r4q6VWpncANUGEsKb9Yng-U1ARE7MJzSPr0bBZGnVD3Axftp39bGkK2tXXYpbInY531XknaAeOte5mfk7TtY3_giQqIobTomf-i1BQkfrnOyCoCXaSWQ5FbxEU5WrQ1Q2W-sJaXkn1PO9MA8C05tNvZQ0Lofw\/s16000\/cybe%20sec%20careersss.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":1901,"url":"https:\/\/kalilinuxtutorials.com\/dejavu-open-source-framework\/","url_meta":{"origin":33675,"position":4},"title":"Dejavu &#8211; Open Source Deception Framework","author":"R K","date":"July 13, 2018","format":false,"excerpt":"DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve network defense and can be a useful arsenal for blue teams to detect attacks at very early stage of cyber kill chain. But the challenge we have seen is deploying,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/07\/1.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":12255,"url":"https:\/\/kalilinuxtutorials.com\/5-best-online-cyber-security-courses\/","url_meta":{"origin":33675,"position":5},"title":"5 Best Online Cyber Security Courses","author":"Balaji N","date":"March 1, 2021","format":false,"excerpt":"Over the years, technology has advanced and evolved, with more enterprises moving to online platforms. However, with this evolution, the rate of cybercrimes has shot up more than ever before. There is now an increased need for people and enterprises to tighten cybersecurity measures and protect themselves from these crimes.\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"5 Best Online Cyber Security Courses","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-hQf6_UlpAz8\/YEpAlGoXA1I\/AAAAAAAAMGQ\/7g77O27aFlIlcvHYZPfL7JdS5tBzV7jRQCLcBGAsYHQ\/s16000\/courses%2Bcybersecurity.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-hQf6_UlpAz8\/YEpAlGoXA1I\/AAAAAAAAMGQ\/7g77O27aFlIlcvHYZPfL7JdS5tBzV7jRQCLcBGAsYHQ\/s16000\/courses%2Bcybersecurity.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-hQf6_UlpAz8\/YEpAlGoXA1I\/AAAAAAAAMGQ\/7g77O27aFlIlcvHYZPfL7JdS5tBzV7jRQCLcBGAsYHQ\/s16000\/courses%2Bcybersecurity.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-hQf6_UlpAz8\/YEpAlGoXA1I\/AAAAAAAAMGQ\/7g77O27aFlIlcvHYZPfL7JdS5tBzV7jRQCLcBGAsYHQ\/s16000\/courses%2Bcybersecurity.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=33675"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33675\/revisions"}],"predecessor-version":[{"id":33690,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33675\/revisions\/33690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/33679"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=33675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=33675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=33675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}