{"id":34719,"date":"2025-08-20T15:32:48","date_gmt":"2025-08-20T15:32:48","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=34719"},"modified":"2025-08-20T15:35:20","modified_gmt":"2025-08-20T15:35:20","slug":"seamlesspass","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/","title":{"rendered":"SeamlessPass: Using Kerberos Tickets to Access Microsoft 365"},"content":{"rendered":"\n<p><strong>SeamlessPass<\/strong> is a specialized tool designed to leverage on-premises <strong>Active Directory Kerberos tickets<\/strong> to obtain access tokens for Microsoft 365 services. This approach is primarily relevant for <strong>hybrid environments<\/strong> where organizations use both on-premises Active Directory and cloud-based Microsoft 365 (Azure AD) accounts.<\/p>\n\n\n\n<p>It is often used alongside <strong>ROADTools<\/strong>, a set of tools for exploring and testing Microsoft 365 access, making it a valuable resource for penetration testers and security teams assessing hybrid environments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why SeamlessPass Matters in 2025<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hybrid environments:<\/strong> Organizations with both on-premises AD and Microsoft 365 can still encounter scenarios where Kerberos-based token methods are relevant.<\/li>\n\n\n\n<li><strong>Security testing:<\/strong> Red teams use SeamlessPass together with <strong>ROADTools<\/strong> to simulate attacks and assess security controls.<\/li>\n\n\n\n<li><strong>Understanding legacy integration:<\/strong> Knowing older authentication methods helps security teams migrate safely to modern protocols like OAuth 2.0 and OpenID Connect.<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>\u26a0\ufe0f Note: For purely cloud-based environments, Microsoft now recommends modern authentication protocols. Kerberos ticket methods are mostly niche, advanced use cases.<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Installation<\/h2>\n\n\n\n<p>You can install SeamlessPass via <strong>PyPI<\/strong> or directly from the source code.<\/p>\n\n\n\n<p><strong>Using PyPI:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>pip install seamlesspass<\/code><\/pre>\n\n\n\n<p><strong>From Source:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/Malcrove\/SeamlessPass.git\ncd SeamlessPass\npip install .\n# Or install requirements separately\npip install -r requirements.txt\npython run.py<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Basic Usage<\/h2>\n\n\n\n<p>After installation, use the <code>seamlesspass<\/code> command to interact with Microsoft 365:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>seamlesspass &#91;-t tenant domain] &#91;-r resource URI] &#91;-c client_id] ...<\/code><\/pre>\n\n\n\n<p><strong>Common options:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>-t\/-tenant<\/code> \u2013 Your Microsoft 365 tenant domain (e.g., example.com)<\/li>\n\n\n\n<li><code>-r\/-resource<\/code> \u2013 Target cloud service URI (default: <code>https:\/\/graph.windows.net<\/code>)<\/li>\n\n\n\n<li><code>-d\/-domain<\/code> \u2013 Local Active Directory domain<\/li>\n\n\n\n<li><code>-dc\/-dc-ip<\/code> \u2013 Domain controller IP or hostname<\/li>\n\n\n\n<li><code>-u\/-username<\/code> &amp; <code>-p\/-password<\/code> \u2013 Credentials (or hashed credentials for testing)<\/li>\n\n\n\n<li><code>-tgt<\/code> \/ <code>-tgs<\/code> \u2013 Base64-encoded Kerberos tickets<\/li>\n<\/ul>\n\n\n\n<p><strong>Integration with ROADTools:<\/strong><br>SeamlessPass tokens can be exported and used with <strong>ROADTools<\/strong> to further explore Microsoft 365 access, test permissions, and simulate attack paths in hybrid environments. This combination is especially valuable for <strong>security assessments<\/strong> and <strong>penetration testing<\/strong>.<\/p>\n\n\n\n<p>Example usage in a hybrid environment:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>seamlesspass -tenant corp.com -domain corp.local -dc dc.corp.local -tgt &lt;base64_encoded_TGT><\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">2025 Updates &amp; Microsoft 365 Changes<\/h2>\n\n\n\n<p>Microsoft Entra Seamless SSO has evolved with modern authentication protocols. Key points:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hybrid AD + Microsoft 365 setups may still require Kerberos-based token access.<\/li>\n\n\n\n<li>Modern cloud-only environments rely on OAuth 2.0, OpenID Connect, and Microsoft Entra policies.<\/li>\n\n\n\n<li>Combining SeamlessPass with <strong>ROADTools<\/strong> is a current best practice for hybrid environment testing.<\/li>\n\n\n\n<li>Always consult the latest Microsoft documentation for compliance and security best practices: <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/hybrid\/how-to-connect-sso\">Microsoft Entra Seamless SSO<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SeamlessPass<\/strong>, combined with <strong>ROADTools<\/strong>, remains relevant for hybrid AD environments and security testing.<\/li>\n\n\n\n<li>For cloud-only environments, Microsoft\u2019s modern authentication methods are recommended.<\/li>\n\n\n\n<li>Understanding legacy methods helps secure migrations and audits.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>By keeping hybrid authentication knowledge up-to-date, security teams can safely manage both on-premises and cloud Microsoft 365 accounts in 2025.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>SeamlessPass is a specialized tool designed to leverage on-premises Active Directory Kerberos tickets to obtain access tokens for Microsoft 365 services. This approach is primarily relevant for hybrid environments where organizations use both on-premises Active Directory and cloud-based Microsoft 365 (Azure AD) accounts. It is often used alongside ROADTools, a set of tools for exploring [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":34724,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25],"tags":[737,6321,6052,6325,6919],"class_list":["post-34719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-seamlesspass"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SeamlessPass - Bridging Kerberos Authentication With<\/title>\n<meta name=\"description\" content=\"SeamlessPass is a tool designed to obtain Microsoft 365 access tokens using on-premises Active Directory Kerberos tickets for organizations\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SeamlessPass - Bridging Kerberos Authentication With\" \/>\n<meta property=\"og:description\" content=\"SeamlessPass is a tool designed to obtain Microsoft 365 access tokens using on-premises Active Directory Kerberos tickets for organizations\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-20T15:32:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-20T15:35:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"SeamlessPass: Using Kerberos Tickets to Access Microsoft 365\",\"datePublished\":\"2025-08-20T15:32:48+00:00\",\"dateModified\":\"2025-08-20T15:35:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/\"},\"wordCount\":360,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"SeamlessPass\"],\"articleSection\":[\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/\",\"name\":\"SeamlessPass - Bridging Kerberos Authentication With\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp\",\"datePublished\":\"2025-08-20T15:32:48+00:00\",\"dateModified\":\"2025-08-20T15:35:20+00:00\",\"description\":\"SeamlessPass is a tool designed to obtain Microsoft 365 access tokens using on-premises Active Directory Kerberos tickets for organizations\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SeamlessPass - Bridging Kerberos Authentication With","description":"SeamlessPass is a tool designed to obtain Microsoft 365 access tokens using on-premises Active Directory Kerberos tickets for organizations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/","og_locale":"en_US","og_type":"article","og_title":"SeamlessPass - Bridging Kerberos Authentication With","og_description":"SeamlessPass is a tool designed to obtain Microsoft 365 access tokens using on-premises Active Directory Kerberos tickets for organizations","og_url":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-08-20T15:32:48+00:00","article_modified_time":"2025-08-20T15:35:20+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"SeamlessPass: Using Kerberos Tickets to Access Microsoft 365","datePublished":"2025-08-20T15:32:48+00:00","dateModified":"2025-08-20T15:35:20+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/"},"wordCount":360,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","SeamlessPass"],"articleSection":["Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/seamlesspass\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/","url":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/","name":"SeamlessPass - Bridging Kerberos Authentication With","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp","datePublished":"2025-08-20T15:32:48+00:00","dateModified":"2025-08-20T15:35:20+00:00","description":"SeamlessPass is a tool designed to obtain Microsoft 365 access tokens using on-premises Active Directory Kerberos tickets for organizations","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/seamlesspass\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/seamlesspass\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2FftobpSUkezRJbtAVZ_4Yxcj0WlNI5Lpn1qjkkB7Sv4myImPqgSgpKgM4ev-nOKlqSHDfzWPSb0XBfCUaY0kofx7oj-1epqPYofZCcweiVoh8_dOk_2ALqAyvI-EZ0Fl2SfNdJ8pOpqXd7E5c4KzhWc-ISzGuOstXlsvRktSQ8IiUF_GkXC1qW50UBWT\/s16000\/SeamlessPass%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36826,"url":"https:\/\/kalilinuxtutorials.com\/graphrunner\/","url_meta":{"origin":34719,"position":0},"title":"GraphRunner : The Dual-Use Toolset For Microsoft 365 Security","author":"Varshini","date":"March 4, 2025","format":false,"excerpt":"GraphRunner is a powerful post-exploitation toolset designed for interacting with the Microsoft Graph API, enabling red teams and attackers to perform reconnaissance, persistence, and data exfiltration from Microsoft Entra ID (Azure AD) accounts. Developed by Beau Bullock and Steve Borosh of Black Hills Information Security, GraphRunner provides a streamlined approach\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/GraphRunner-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/GraphRunner-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/GraphRunner-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/GraphRunner-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/GraphRunner-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/GraphRunner-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31276,"url":"https:\/\/kalilinuxtutorials.com\/awesome-bec\/","url_meta":{"origin":34719,"position":1},"title":"Awesome-BEC &#8211; Unveiling A Comprehensive Resource For Business Email Compromise Investigations","author":"Varshini","date":"November 14, 2023","format":false,"excerpt":"A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains a persistent and costly threat. This article explores Awesome-BEC, a curated repository of invaluable attack and defensive information, tools, and research dedicated to combating BEC attacks. Discover the wealth of\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":37125,"url":"https:\/\/kalilinuxtutorials.com\/krbrelayex\/","url_meta":{"origin":34719,"position":2},"title":"KrbRelayEx : Mastering Kerberos Ticket Relay Attacks In Active Directory Environments","author":"Varshini","date":"March 19, 2025","format":false,"excerpt":"KrbRelayEx is a sophisticated tool designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ tickets. It is particularly useful in scenarios where an attacker seeks to exploit vulnerabilities in Active Directory environments, especially those related to DNS manipulation and Kerberos authentication. Key Features Of KrbRelayEx Kerberos AP-REQ Ticket Relay:\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/KrbRelayEx.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/KrbRelayEx.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/KrbRelayEx.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/KrbRelayEx.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/KrbRelayEx.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/KrbRelayEx.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36223,"url":"https:\/\/kalilinuxtutorials.com\/hackthebox-ad-machines\/","url_meta":{"origin":34719,"position":3},"title":"HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"HackTheBox (HTB) offers a range of Active Directory (AD) machines designed to help cybersecurity enthusiasts and professionals practice enumeration, exploitation, and attack techniques on AD environments. These machines vary in difficulty, providing challenges for both beginners and advanced users. Below is an overview of tools commonly used for tackling AD\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36028,"url":"https:\/\/kalilinuxtutorials.com\/microsoft-analyzer-suite-v1-2-0\/","url_meta":{"origin":34719,"position":4},"title":"Microsoft-Analyzer-Suite v1.2.0 : Enhanced Data Analysis Tools For Microsoft 365 And Entra ID","author":"Varshini","date":"February 3, 2025","format":false,"excerpt":"The Microsoft-Analyzer-Suite v1.2.0 is a powerful collection of PowerShell scripts designed for analyzing data from Microsoft 365 and Microsoft Entra ID. Released on January 20, 2025, this latest version introduces several new features and updates, enhancing its capabilities for IT administrators and cybersecurity professionals. Key Features In v1.2.0 New Analyzers:\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Microsoft-Analyzer-Suite-v1.2.0.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Microsoft-Analyzer-Suite-v1.2.0.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Microsoft-Analyzer-Suite-v1.2.0.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Microsoft-Analyzer-Suite-v1.2.0.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Microsoft-Analyzer-Suite-v1.2.0.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Microsoft-Analyzer-Suite-v1.2.0.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":30488,"url":"https:\/\/kalilinuxtutorials.com\/azure-ad\/","url_meta":{"origin":34719,"position":5},"title":"Azure AD Attack &amp; Defense Playbook","author":"Varshini","date":"September 27, 2023","format":false,"excerpt":"This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected. All of the included scenarios, insights and comments are based on experiences from the contributors during their attack simulations, hands-on or real-world scenarios. It should be considered a\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=34719"}],"version-history":[{"count":5,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34719\/revisions"}],"predecessor-version":[{"id":37559,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34719\/revisions\/37559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/34724"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=34719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=34719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=34719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}