{"id":35274,"date":"2024-11-25T06:00:07","date_gmt":"2024-11-25T06:00:07","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=35274"},"modified":"2024-11-25T06:00:08","modified_gmt":"2024-11-25T06:00:08","slug":"dicomhawk","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/","title":{"rendered":"DICOMHawk &#8211; A Honeypot For Secure DICOM Server Monitoring"},"content":{"rendered":"\n<p>DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions. <\/p>\n\n\n\n<p>Built using Flask and pynetdicom, DICOMHawk offers a streamlined web interface for monitoring and managing DICOM interactions in real-time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Features<\/strong><a href=\"https:\/\/github.com\/gtheodoridis\/DICOMHawk#features\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DICOM Server Simulation<\/strong>: Supports C-ECHO, C-FIND, and C-STORE operations to simulate a realistic DICOM server environment.<\/li>\n\n\n\n<li><strong>Logging<\/strong>: Detailed logging of DICOM associations, DIMSE messages, and event-specific data to track and analyze potential attacks.<\/li>\n\n\n\n<li><strong>Web Interface<\/strong>: A user-friendly web interface to view server status, active associations, and logs.<\/li>\n\n\n\n<li><strong>Custom Handlers<\/strong>: Easily extendable to support additional DICOM services and custom logging or handling requirements.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Getting Started<\/strong><a href=\"https:\/\/github.com\/gtheodoridis\/DICOMHawk#getting-started\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Prerequisites<\/strong><a href=\"https:\/\/github.com\/gtheodoridis\/DICOMHawk#prerequisites\"><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Docker and Docker Compose installed on your machine<\/li>\n\n\n\n<li>DCMTK tools installed on your local machine for testing<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Installation<\/strong><a href=\"https:\/\/github.com\/gtheodoridis\/DICOMHawk#installation\"><\/a><\/h3>\n\n\n\n<p><strong>Clone the repository<\/strong>:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/gtheodoridis\/DICOMHawk.git\ncd dicomhawk<\/code><\/pre>\n\n\n\n<p><strong>Start the services with Docker Compose<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>docker-compose up -d<\/code><\/pre>\n\n\n\n<ol class=\"wp-block-list\">\n<li>This command starts the Flask application and a log server in detached mode. The web interface is accessible on port 5000, and the DICOM server listens on port 11112. Alternatively, port 104 is also applicable for DICOM (ACR-NEMA).<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage<\/strong><a href=\"https:\/\/github.com\/gtheodoridis\/DICOMHawk#usage\"><\/a><\/h2>\n\n\n\n<p><strong>Access the Web Interface<\/strong>:<\/p>\n\n\n\n<p>Open a web browser and go to <code>http:\/\/127.0.0.1:5000<\/code> to access the DICOMHawk web interface. Here, you can monitor server status, view active associations, and check the logs.<\/p>\n\n\n\n<p><strong>Test the DICOM Server<\/strong>:<\/p>\n\n\n\n<p>Use DCMTK tools to interact with the DICOM server.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>C-ECHO (DICOM Echo Test)<\/strong>:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>echoscu 127.0.0.1 11112<\/code><\/pre>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/gtheodoridis\/DICOMHawk\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions. Built using Flask and pynetdicom, DICOMHawk offers a streamlined web interface for monitoring and managing DICOM interactions in real-time. Features Getting Started Prerequisites Installation Clone the repository: Start the services with Docker Compose: Usage Access [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":35280,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25],"tags":[737,6963,6321,6052,6325],"class_list":["post-35274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-tools","tag-cybersecurity","tag-dicomhawk","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DICOMHawk - A Honeypot For Secure DICOM Server Monitoring<\/title>\n<meta name=\"description\" content=\"DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DICOMHawk - A Honeypot For Secure DICOM Server Monitoring\" \/>\n<meta property=\"og:description\" content=\"DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-25T06:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-25T06:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"DICOMHawk &#8211; A Honeypot For Secure DICOM Server Monitoring\",\"datePublished\":\"2024-11-25T06:00:07+00:00\",\"dateModified\":\"2024-11-25T06:00:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/\"},\"wordCount\":229,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp\",\"keywords\":[\"cybersecurity\",\"DICOMHawk\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/\",\"name\":\"DICOMHawk - A Honeypot For Secure DICOM Server Monitoring\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp\",\"datePublished\":\"2024-11-25T06:00:07+00:00\",\"dateModified\":\"2024-11-25T06:00:08+00:00\",\"description\":\"DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DICOMHawk - A Honeypot For Secure DICOM Server Monitoring","description":"DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/","og_locale":"en_US","og_type":"article","og_title":"DICOMHawk - A Honeypot For Secure DICOM Server Monitoring","og_description":"DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.","og_url":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-11-25T06:00:07+00:00","article_modified_time":"2024-11-25T06:00:08+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"DICOMHawk &#8211; A Honeypot For Secure DICOM Server Monitoring","datePublished":"2024-11-25T06:00:07+00:00","dateModified":"2024-11-25T06:00:08+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/"},"wordCount":229,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp","keywords":["cybersecurity","DICOMHawk","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/dicomhawk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/","url":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/","name":"DICOMHawk - A Honeypot For Secure DICOM Server Monitoring","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp","datePublished":"2024-11-25T06:00:07+00:00","dateModified":"2024-11-25T06:00:08+00:00","description":"DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/dicomhawk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/dicomhawk\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkPK-CnOg_CX06oOucYF1MXBR8VJKIeK6riTTXxpnLdrs0IDwCJqtMqvw1Rmuwrh5UOtqKifpCSwNw-g9AlLe0Yw13iIdB7tdWS96Zhm1gAoab2FkxXObzyu8fGRWGjq0KHkYPzoYdc3BP7UYp8r7CS3Bk6h7iBWOYswcdpeVJNa1hY5guClU8YVS6kyNv\/s1600\/DICOMHawk%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":12262,"url":"https:\/\/kalilinuxtutorials.com\/chameleon\/","url_meta":{"origin":35274,"position":0},"title":"Chameleon : Customizable Honeypots For Monitoring Network Traffic","author":"R K","date":"March 14, 2021","format":false,"excerpt":"Chameleon is a customizable honeypots for monitoring network traffic, bots activities and username\\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET and Postgres and MySQL). Grafana Interface NMAP Scan Credentials Monitoring General Features Modular approach (honeypots run as scripts or imported as\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":29730,"url":"https:\/\/kalilinuxtutorials.com\/wireshark-4-0-8\/","url_meta":{"origin":35274,"position":1},"title":"Wireshark 4.0.8 Release: What\u2019s New!","author":"Varshini","date":"August 25, 2023","format":false,"excerpt":"Wireshark released the latest release note for 4.0.8 on its official page regarding bug fixes that have been detected earlier and updated protocol support. A network protocol analyzer, Wireshark captures packets from a network connection, providing insightful network analysis. The end of support for 32-bit Windows files has been planned\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBriiR9zHPgaLU8Qo2Yvi-aKu94EXjfJ0ipCDv9ULQHVonxBDriy1VZH9B5zwxbHE0GiiK-uwrKPa-CkEJ2PS7OFW9yE9-nKw7C8ebBNz9wCv3CBLcdR9Z23IGVEcgM2jBApCDFyphbHtg7nE3K0CFE3xHNc4Nrqs98WRwjzCH9SuAdoSwdmYxy0xDow\/s16000\/Wireshark%20%283%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBriiR9zHPgaLU8Qo2Yvi-aKu94EXjfJ0ipCDv9ULQHVonxBDriy1VZH9B5zwxbHE0GiiK-uwrKPa-CkEJ2PS7OFW9yE9-nKw7C8ebBNz9wCv3CBLcdR9Z23IGVEcgM2jBApCDFyphbHtg7nE3K0CFE3xHNc4Nrqs98WRwjzCH9SuAdoSwdmYxy0xDow\/s16000\/Wireshark%20%283%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBriiR9zHPgaLU8Qo2Yvi-aKu94EXjfJ0ipCDv9ULQHVonxBDriy1VZH9B5zwxbHE0GiiK-uwrKPa-CkEJ2PS7OFW9yE9-nKw7C8ebBNz9wCv3CBLcdR9Z23IGVEcgM2jBApCDFyphbHtg7nE3K0CFE3xHNc4Nrqs98WRwjzCH9SuAdoSwdmYxy0xDow\/s16000\/Wireshark%20%283%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBriiR9zHPgaLU8Qo2Yvi-aKu94EXjfJ0ipCDv9ULQHVonxBDriy1VZH9B5zwxbHE0GiiK-uwrKPa-CkEJ2PS7OFW9yE9-nKw7C8ebBNz9wCv3CBLcdR9Z23IGVEcgM2jBApCDFyphbHtg7nE3K0CFE3xHNc4Nrqs98WRwjzCH9SuAdoSwdmYxy0xDow\/s16000\/Wireshark%20%283%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBriiR9zHPgaLU8Qo2Yvi-aKu94EXjfJ0ipCDv9ULQHVonxBDriy1VZH9B5zwxbHE0GiiK-uwrKPa-CkEJ2PS7OFW9yE9-nKw7C8ebBNz9wCv3CBLcdR9Z23IGVEcgM2jBApCDFyphbHtg7nE3K0CFE3xHNc4Nrqs98WRwjzCH9SuAdoSwdmYxy0xDow\/s16000\/Wireshark%20%283%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBriiR9zHPgaLU8Qo2Yvi-aKu94EXjfJ0ipCDv9ULQHVonxBDriy1VZH9B5zwxbHE0GiiK-uwrKPa-CkEJ2PS7OFW9yE9-nKw7C8ebBNz9wCv3CBLcdR9Z23IGVEcgM2jBApCDFyphbHtg7nE3K0CFE3xHNc4Nrqs98WRwjzCH9SuAdoSwdmYxy0xDow\/s16000\/Wireshark%20%283%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32595,"url":"https:\/\/kalilinuxtutorials.com\/xz-vulnerable-honeypot\/","url_meta":{"origin":35274,"position":2},"title":"XZ-Vulnerable-Honeypot : A New SSH Defense Mechanism With CVE-2024-3094","author":"Varshini","date":"April 2, 2024","format":false,"excerpt":"An innovative SSH honeypot equipped with the XZ backdoor, identified by CVE-2024-3094. Designed to bait and study potential attackers, this tool offers a unique glimpse into the tactics and techniques used by cyber adversaries. By simulating vulnerabilities, it provides invaluable insights into securing networks against sophisticated threats. Installation PLEASE run\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMSQAzHPPyiNCR0e8phyTk8BYpQsh5BagQbmQnGIDnKhqAByFC5fy3Ytay2SuXDGvBNryGhksQMivwiy9Jv4iApGdnnsx5__HAS5UaaXYo9GeFPVePCYSPea202O7VuiWK1xQzozWZFxZMYeSKxBAe9IZHyMxGpoKsmQoSJmUYQI9bcQe78ZGf5jQmNgRx\/s16000\/XZ-Vulnerable-Honeypot%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMSQAzHPPyiNCR0e8phyTk8BYpQsh5BagQbmQnGIDnKhqAByFC5fy3Ytay2SuXDGvBNryGhksQMivwiy9Jv4iApGdnnsx5__HAS5UaaXYo9GeFPVePCYSPea202O7VuiWK1xQzozWZFxZMYeSKxBAe9IZHyMxGpoKsmQoSJmUYQI9bcQe78ZGf5jQmNgRx\/s16000\/XZ-Vulnerable-Honeypot%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMSQAzHPPyiNCR0e8phyTk8BYpQsh5BagQbmQnGIDnKhqAByFC5fy3Ytay2SuXDGvBNryGhksQMivwiy9Jv4iApGdnnsx5__HAS5UaaXYo9GeFPVePCYSPea202O7VuiWK1xQzozWZFxZMYeSKxBAe9IZHyMxGpoKsmQoSJmUYQI9bcQe78ZGf5jQmNgRx\/s16000\/XZ-Vulnerable-Honeypot%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMSQAzHPPyiNCR0e8phyTk8BYpQsh5BagQbmQnGIDnKhqAByFC5fy3Ytay2SuXDGvBNryGhksQMivwiy9Jv4iApGdnnsx5__HAS5UaaXYo9GeFPVePCYSPea202O7VuiWK1xQzozWZFxZMYeSKxBAe9IZHyMxGpoKsmQoSJmUYQI9bcQe78ZGf5jQmNgRx\/s16000\/XZ-Vulnerable-Honeypot%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMSQAzHPPyiNCR0e8phyTk8BYpQsh5BagQbmQnGIDnKhqAByFC5fy3Ytay2SuXDGvBNryGhksQMivwiy9Jv4iApGdnnsx5__HAS5UaaXYo9GeFPVePCYSPea202O7VuiWK1xQzozWZFxZMYeSKxBAe9IZHyMxGpoKsmQoSJmUYQI9bcQe78ZGf5jQmNgRx\/s16000\/XZ-Vulnerable-Honeypot%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMSQAzHPPyiNCR0e8phyTk8BYpQsh5BagQbmQnGIDnKhqAByFC5fy3Ytay2SuXDGvBNryGhksQMivwiy9Jv4iApGdnnsx5__HAS5UaaXYo9GeFPVePCYSPea202O7VuiWK1xQzozWZFxZMYeSKxBAe9IZHyMxGpoKsmQoSJmUYQI9bcQe78ZGf5jQmNgRx\/s16000\/XZ-Vulnerable-Honeypot%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":20848,"url":"https:\/\/kalilinuxtutorials.com\/ad-honeypot-autodeploy\/","url_meta":{"origin":35274,"position":3},"title":"Ad-Honeypot-Autodeploy : Deploy A Small, Intentionally Insecure, Vulnerable Windows Domain For RDP Honeypot Fully Automatically","author":"R K","date":"December 23, 2021","format":false,"excerpt":"Ad-Honeypot-Autodeploy a tool to Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically. Runs on self-hosted virtualization using\u00a0libvirt\u00a0with\u00a0QEMU\/KVM\u00a0(but it can be customized easily for cloud-based solutions). Used for painlessly set up a small Windows Domain from scratch automatically (without user interaction) for the purpose of RDP\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhBrYl4BktWjETplfqDuGryAKJYtTftkqnel_3JuyrenMLXyUzEimVid1OtQ5ebekqxCgIepp_prvwL5D_m3uICCuvxRI2Vih2rIfor5GjImAOiwWjNHt6l6lCMFbZcquIGhJtr_MUDPDtqjmVEI4Eb12o_UZwxc9f3A9SCXtRIksZyV10eunhWBjG9=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhBrYl4BktWjETplfqDuGryAKJYtTftkqnel_3JuyrenMLXyUzEimVid1OtQ5ebekqxCgIepp_prvwL5D_m3uICCuvxRI2Vih2rIfor5GjImAOiwWjNHt6l6lCMFbZcquIGhJtr_MUDPDtqjmVEI4Eb12o_UZwxc9f3A9SCXtRIksZyV10eunhWBjG9=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhBrYl4BktWjETplfqDuGryAKJYtTftkqnel_3JuyrenMLXyUzEimVid1OtQ5ebekqxCgIepp_prvwL5D_m3uICCuvxRI2Vih2rIfor5GjImAOiwWjNHt6l6lCMFbZcquIGhJtr_MUDPDtqjmVEI4Eb12o_UZwxc9f3A9SCXtRIksZyV10eunhWBjG9=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhBrYl4BktWjETplfqDuGryAKJYtTftkqnel_3JuyrenMLXyUzEimVid1OtQ5ebekqxCgIepp_prvwL5D_m3uICCuvxRI2Vih2rIfor5GjImAOiwWjNHt6l6lCMFbZcquIGhJtr_MUDPDtqjmVEI4Eb12o_UZwxc9f3A9SCXtRIksZyV10eunhWBjG9=s728 2x"},"classes":[]},{"id":13348,"url":"https:\/\/kalilinuxtutorials.com\/dystopia\/","url_meta":{"origin":35274,"position":4},"title":"Dystopia : Low To Medium Multithreaded Ubuntu Core Honeypot Coded In Python","author":"R K","date":"June 15, 2021","format":false,"excerpt":"Dystopiais a low to medium Ubuntu Core honeypot coded in Python. Features Optional login promptLogs who connects and what they doCapture session to pcap fileAutomatically download links used by attackersCustomize MOTD, Port, Hostname and how many clients can connect at once (default is unlimited)Geolocation (with ipstack)Save and load configAdd support\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32332,"url":"https:\/\/kalilinuxtutorials.com\/awesome-honeypots\/","url_meta":{"origin":35274,"position":5},"title":"Awesome Honeypots : Guardians Of The Digital Frontier &#8211; A Comprehensive Guide To Cybersecurity Tools","author":"Varshini","date":"March 15, 2024","format":false,"excerpt":"A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and others, with a focus on free and open source projects. There is no pre-established order of items in each category, the order is for contribution. If you want to contribute,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl6TIUyHMIFoX5UJc_H9xcpMPsFg_P2Vf-KNz6MN5gJsQNk8Sb_wuCdEx3JMkXLiYPKuF9niLQNFxghgh-heGKYOwFfn8tXBRzpWC1iUyxvWoC-QN2arsQ8vmn5YC1TNm-23RpXiMrW7MrsKHZBoTWWbyqmyiF_qxHinle0SDuX_JbaVJGkBPl6I7fqiTg\/s16000\/Mali%20GPU%20Kernel%20LPE%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl6TIUyHMIFoX5UJc_H9xcpMPsFg_P2Vf-KNz6MN5gJsQNk8Sb_wuCdEx3JMkXLiYPKuF9niLQNFxghgh-heGKYOwFfn8tXBRzpWC1iUyxvWoC-QN2arsQ8vmn5YC1TNm-23RpXiMrW7MrsKHZBoTWWbyqmyiF_qxHinle0SDuX_JbaVJGkBPl6I7fqiTg\/s16000\/Mali%20GPU%20Kernel%20LPE%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl6TIUyHMIFoX5UJc_H9xcpMPsFg_P2Vf-KNz6MN5gJsQNk8Sb_wuCdEx3JMkXLiYPKuF9niLQNFxghgh-heGKYOwFfn8tXBRzpWC1iUyxvWoC-QN2arsQ8vmn5YC1TNm-23RpXiMrW7MrsKHZBoTWWbyqmyiF_qxHinle0SDuX_JbaVJGkBPl6I7fqiTg\/s16000\/Mali%20GPU%20Kernel%20LPE%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl6TIUyHMIFoX5UJc_H9xcpMPsFg_P2Vf-KNz6MN5gJsQNk8Sb_wuCdEx3JMkXLiYPKuF9niLQNFxghgh-heGKYOwFfn8tXBRzpWC1iUyxvWoC-QN2arsQ8vmn5YC1TNm-23RpXiMrW7MrsKHZBoTWWbyqmyiF_qxHinle0SDuX_JbaVJGkBPl6I7fqiTg\/s16000\/Mali%20GPU%20Kernel%20LPE%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl6TIUyHMIFoX5UJc_H9xcpMPsFg_P2Vf-KNz6MN5gJsQNk8Sb_wuCdEx3JMkXLiYPKuF9niLQNFxghgh-heGKYOwFfn8tXBRzpWC1iUyxvWoC-QN2arsQ8vmn5YC1TNm-23RpXiMrW7MrsKHZBoTWWbyqmyiF_qxHinle0SDuX_JbaVJGkBPl6I7fqiTg\/s16000\/Mali%20GPU%20Kernel%20LPE%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl6TIUyHMIFoX5UJc_H9xcpMPsFg_P2Vf-KNz6MN5gJsQNk8Sb_wuCdEx3JMkXLiYPKuF9niLQNFxghgh-heGKYOwFfn8tXBRzpWC1iUyxvWoC-QN2arsQ8vmn5YC1TNm-23RpXiMrW7MrsKHZBoTWWbyqmyiF_qxHinle0SDuX_JbaVJGkBPl6I7fqiTg\/s16000\/Mali%20GPU%20Kernel%20LPE%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=35274"}],"version-history":[{"count":6,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35274\/revisions"}],"predecessor-version":[{"id":35281,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35274\/revisions\/35281"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/35280"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=35274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=35274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=35274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}