{"id":6206,"date":"2019-08-16T20:33:39","date_gmt":"2019-08-16T15:03:39","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=6206"},"modified":"2019-08-16T20:33:39","modified_gmt":"2019-08-16T15:03:39","slug":"docker-security-playground","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/","title":{"rendered":"Docker Security Playground : A Microservices-Based Framework For The Study Of Network Security &#038; Penetration Test Techniques"},"content":{"rendered":"\n<p><strong>Docker Security Playground <\/strong>is an application that allows you to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Create <strong>network and network security scenarios<\/strong>, in order to understand network protocols,<br>\nrules, and security issues by installing DSP in your PC.<\/li><li>Learn <strong>penetration testing techniques<\/strong> by simulating vulnerability labs scenarios<\/li><li><strong>Manage a set of docker-compose project<\/strong> . Main goal of DSP is to learn\nin penetration testing and network security, but its flexibility allows you the\n<strong>creation<\/strong>, <strong>graphic editing<\/strong> and <strong>managment run \/ stop<\/strong> of all your <strong>docker-compose\nlabs<\/strong>. For more information look at the <a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground\/blob\/master\">Labs Managment<\/a> page.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#dsp-features\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>DSP Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Graphic Editor of docker-compose<\/li><li>Docker Image Management<\/li><li>GIT Integration<\/li><li>DSP Repository with a set of network security scenarios<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/findomain-cross-platform-subdomain-enumerator\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Findomain : Fastest &amp; Cross-Platform Subdomain Enumerator (opens in a new tab)\">Findomain : Fastest &amp; Cross-Platform Subdomain Enumerator<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#how-can-i-share-my-labs-with-the-world-\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>How can I share my labs with the world ?<\/strong><\/p>\n\n\n\n<p>During the installation you can create a local environment that has  not link with git, or you can associate a personal repository the the  application. This is very useful if you want to share your work with  other people.<\/p>\n\n\n\n<p>DSP Repository must have several requirements, so I have created a base  DSP Repo Template that you can use to create your personal repository.<br> So, the easiest way to share labs is the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Fork the DSP_Repo project: <a href=\"https:\/\/github.com\/giper45\/DSP_Repo.git\">https:\/\/github.com\/giper45\/DSP_Repo.git<\/a><\/li><li>During the installation set github directory param to your forked repository.<\/li><li>Now create your labs and share it!<\/li><\/ul>\n\n\n\n<p>It is important that all images that you use should be available to other users, so:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You can publish on docker hub so other users can pull your images in order to use your labs.<\/li><li>You can provide dockerfiles inside the .docker-images directory, so \nusers can use build.sh to build your images and use your repo.<\/li><\/ul>\n\n\n\n<p>If you need a &#8220;private way&#8221; to share labs you should share the \nrepository in other ways, at current time there is no support to share \nprivate repositories.<\/p>\n\n\n\n<p>In DSP you can manage multiple user repositories (Repositories tab)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#prerequisites\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Prerequisites<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Nodejs (v 7 or later)<\/li><li>git<\/li><li>docker<\/li><li>docker-compose<\/li><li>compiler tools (g++, c, c++)<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#installation\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>Install prerequisites and run:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>npm install <\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#troubleshooting-during-installation\"><\/a><\/h3>\n\n\n\n<p><strong>Troubleshooting during installation<\/strong><\/p>\n\n\n\n<p>If you have error regarding <strong>node-pty<\/strong> module, try to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Install build-essentials : (In Ubuntu: apt install -y build-essentials)<\/li><li>Use nodejs LTS (note-pty has some isseus, as shown <a href=\"https:\/\/github.com\/microsoft\/node-pty\/issues\/319\">here<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#update-the-application\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Update the application:<\/strong><\/p>\n\n\n\n<p>When you update the application it is important to update the npm \npackages (The application uses mydockerjs, a npm docker API that I am \ndeveloping during DSP development: <a href=\"https:\/\/www.npmjs.com\/package\/mydockerjs\">https:\/\/www.npmjs.com\/package\/mydockerjs<\/a>)<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>npm run update <\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#start\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Start<\/strong><\/p>\n\n\n\n<p><strong>Run<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>npm start   <\/strong><\/p>\n\n\n\n<p>To start the application. This will launch a server listening on 8080\n (or another if you set have setted ENV variable in index.js file) port \nof your localhost.<\/p>\n\n\n\n<p>Go to you favourite browser and digit localhost:8080. You&#8217;ll be \nredirected on installation page, set parameters and click install.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#documentation\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Documentation<\/strong><\/p>\n\n\n\n<p>For documentation about DSP usage go to Wiki page:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Main Page: <a href=\"http:\/\/gitlab.comics.unina.it\/NS-Thesis\/DockerSecurityPlayground_1\/wikis\/home\">http:\/\/gitlab.comics.unina.it\/NS-Thesis\/DockerSecurityPlayground_1\/wikis\/home<\/a><\/li><li>User Guide<a href=\"http:\/\/gitlab.comics.unina.it\/NS-Thesis\/DockerSecurityPlayground_1\/wikis\/user_guide\">http:\/\/gitlab.comics.unina.it\/NS-Thesis\/DockerSecurityPlayground_1\/wikis\/user_guide<\/a><\/li><li>Docker Wrapper Image: <a href=\"http:\/\/gitlab.comics.unina.it\/NS-Thesis\/DockerSecurityPlayground_1\/wikis\/dsp_wrapper_image\">http:\/\/gitlab.comics.unina.it\/NS-Thesis\/DockerSecurityPlayground_1\/wikis\/dsp_wrapper_image<\/a><\/li><\/ul>\n\n\n\n<p>It is a little outdated, I will update it as possible !<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#docker-wrapper-image\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Docker Wrapper Image<\/strong><\/p>\n\n\n\n<p>DSP implements a label convention called DockerWrapperImage that \nallows you to create images that expose action to execute when a lab is \nrunning.\nLook at the <a href=\"http:\/\/gitlab.comics.unina.it\/NS-Thesis\/DockerSecurityPlayground_1\/wikis\/dsp_wrapper_image\">doc<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#error-debug\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Error Debug<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">MacOS ECONNRESET error:<br><br>events.js:183       <br>       throw er; \/\/ Unhandled &#8216;error&#8217; event       <br>       ^ <br>Error: read ECONNRESET     <br>       at _errnoException (util.js:992:11)     <br>       at TCP.onread (net.js:618:25)<\/p>\n\n\n\n<p>On Mac it seems that there is some problem with some node package, so in order to solve this run:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>MacBook-Pro:DockerSecurityPlayground gaetanoperrone$ npm install ws@3.3.2 &#8211;save-dev &#8211;save-exact <\/strong><\/p>\n\n\n\n<p>Other info here: <a href=\"http:\/\/gitlab.comics.unina.it\/NS-Thesis\/DockerSecurityPlayground_1\/wikis\/docker-operation-errors\">http:\/\/gitlab.comics.unina.it\/NS-Thesis\/DockerSecurityPlayground_1\/wikis\/docker-operation-errors<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground#contributing\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Create your feature branch: <code><strong>git checkout -b my-new-feature<\/strong><\/code><\/li><li>Commit your changes: <code><strong>git commit -am 'Add some feature'<\/strong><\/code><\/li><li>Push to the branch: <code><strong>git push origin my-new-feature<\/strong><\/code><\/li><li>Submit a pull request, we&#8217;ll check<\/li><\/ul>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/giper45\/DockerSecurityPlayground\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Docker Security Playground is an application that allows you to: Create network and network security scenarios, in order to understand network protocols, rules, and security issues by installing DSP in your PC. Learn penetration testing techniques by simulating vulnerability labs scenarios Manage a set of docker-compose project . Main goal of DSP is to learn [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15747,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png","fifu_image_alt":"Docker Security Playground : A Microservices-Based Framework For The Study Of Network Security & Penetration Test Techniques","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[927,2072,2228,2464],"class_list":["post-6206","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-docker-security-playground","tag-microservices-based","tag-network-security","tag-penetration"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Docker Security Playground : Network Security &amp; Penetration Test<\/title>\n<meta name=\"description\" content=\"Docker Security Playground is an application that allows you to create network and network security scenarios, in order to understand network protocols\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Docker Security Playground : Network Security &amp; Penetration Test\" \/>\n<meta property=\"og:description\" content=\"Docker Security Playground is an application that allows you to create network and network security scenarios, in order to understand network protocols\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-16T15:03:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Docker Security Playground : A Microservices-Based Framework For The Study Of Network Security &#038; Penetration Test Techniques\",\"datePublished\":\"2019-08-16T15:03:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/\"},\"wordCount\":650,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png\",\"keywords\":[\"Docker Security Playground\",\"Microservices-Based\",\"network security\",\"Penetration\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/\",\"name\":\"Docker Security Playground : Network Security & Penetration Test\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png\",\"datePublished\":\"2019-08-16T15:03:39+00:00\",\"description\":\"Docker Security Playground is an application that allows you to create network and network security scenarios, in order to understand network protocols\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Docker Security Playground : Network Security & Penetration Test","description":"Docker Security Playground is an application that allows you to create network and network security scenarios, in order to understand network protocols","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/","og_locale":"en_US","og_type":"article","og_title":"Docker Security Playground : Network Security & Penetration Test","og_description":"Docker Security Playground is an application that allows you to create network and network security scenarios, in order to understand network protocols","og_url":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-08-16T15:03:39+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Docker Security Playground : A Microservices-Based Framework For The Study Of Network Security &#038; Penetration Test Techniques","datePublished":"2019-08-16T15:03:39+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/"},"wordCount":650,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png","keywords":["Docker Security Playground","Microservices-Based","network security","Penetration"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/","url":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/","name":"Docker Security Playground : Network Security & Penetration Test","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png","datePublished":"2019-08-16T15:03:39+00:00","description":"Docker Security Playground is an application that allows you to create network and network security scenarios, in order to understand network protocols","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/docker-security-playground\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/docker-security-playground\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-8KWO1JRURiI\/XVVcPlYwfbI\/AAAAAAAAB9c\/0GzqO7_o2EgyMSJcECrsyy7r7uqT6bPlwCLcBGAs\/s1600\/DSP_Example.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32922,"url":"https:\/\/kalilinuxtutorials.com\/vulpes-vulpos\/","url_meta":{"origin":6206,"position":0},"title":"Vulpes\/VulpOS : The Docker-Powered All-in-One Workstation For Penetration Testing And Offsec Labs","author":"Varshini","date":"May 3, 2024","format":false,"excerpt":"All in one Docker-based workstation with hacking tools for Pentesting and offsec Labs by maintained by\u00a0@Fenrir.pro. It is based on\u00a0Alpine Linux, clutter-free, lightweight and actively used for penetration testing assessments, local training sessions, workshops and online classes on\u00a0hack.courses. Why? We deploy on-demain online workstations and needed a hacking-oriented operating system\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhr6nIB-CC7UoctWL7oblw8V_D7jHlPLyCTjtgo-GluCSPR2jVmGbio_053M6Y43bOuSoa6sqULzdrR_4aUN3M0Wak-GH8fv7JNGA9SX4mAXVDqOn7xNeE6xwTpp09B9YirDSk6yIkfHM6jRLGfg7JWLYBbP1Pfbs9PgujwrzZaJwkOcXo31sBmLU-oVTRn\/s16000\/VulpesVulpOS.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhr6nIB-CC7UoctWL7oblw8V_D7jHlPLyCTjtgo-GluCSPR2jVmGbio_053M6Y43bOuSoa6sqULzdrR_4aUN3M0Wak-GH8fv7JNGA9SX4mAXVDqOn7xNeE6xwTpp09B9YirDSk6yIkfHM6jRLGfg7JWLYBbP1Pfbs9PgujwrzZaJwkOcXo31sBmLU-oVTRn\/s16000\/VulpesVulpOS.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhr6nIB-CC7UoctWL7oblw8V_D7jHlPLyCTjtgo-GluCSPR2jVmGbio_053M6Y43bOuSoa6sqULzdrR_4aUN3M0Wak-GH8fv7JNGA9SX4mAXVDqOn7xNeE6xwTpp09B9YirDSk6yIkfHM6jRLGfg7JWLYBbP1Pfbs9PgujwrzZaJwkOcXo31sBmLU-oVTRn\/s16000\/VulpesVulpOS.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhr6nIB-CC7UoctWL7oblw8V_D7jHlPLyCTjtgo-GluCSPR2jVmGbio_053M6Y43bOuSoa6sqULzdrR_4aUN3M0Wak-GH8fv7JNGA9SX4mAXVDqOn7xNeE6xwTpp09B9YirDSk6yIkfHM6jRLGfg7JWLYBbP1Pfbs9PgujwrzZaJwkOcXo31sBmLU-oVTRn\/s16000\/VulpesVulpOS.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhr6nIB-CC7UoctWL7oblw8V_D7jHlPLyCTjtgo-GluCSPR2jVmGbio_053M6Y43bOuSoa6sqULzdrR_4aUN3M0Wak-GH8fv7JNGA9SX4mAXVDqOn7xNeE6xwTpp09B9YirDSk6yIkfHM6jRLGfg7JWLYBbP1Pfbs9PgujwrzZaJwkOcXo31sBmLU-oVTRn\/s16000\/VulpesVulpOS.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhr6nIB-CC7UoctWL7oblw8V_D7jHlPLyCTjtgo-GluCSPR2jVmGbio_053M6Y43bOuSoa6sqULzdrR_4aUN3M0Wak-GH8fv7JNGA9SX4mAXVDqOn7xNeE6xwTpp09B9YirDSk6yIkfHM6jRLGfg7JWLYBbP1Pfbs9PgujwrzZaJwkOcXo31sBmLU-oVTRn\/s16000\/VulpesVulpOS.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37388,"url":"https:\/\/kalilinuxtutorials.com\/nuclei-templates-labs\/","url_meta":{"origin":6206,"position":1},"title":"Nuclei-Templates-Labs : A Hands-On Security Testing Playground","author":"Varshini","date":"April 1, 2025","format":false,"excerpt":"Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to practice vulnerability detection and exploitation in a controlled environment. Developed by ProjectDiscovery, this resource combines containerized vulnerable setups with prebuilt Nuclei templates to provide a safe and practical platform for exploring real-world vulnerabilities. Key Features\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1465,"url":"https:\/\/kalilinuxtutorials.com\/best-hacking-books-tools-resources-2018\/","url_meta":{"origin":6206,"position":2},"title":"Best Hacking Books, Tools &#038; Resources 2018","author":"R K","date":"June 6, 2018","format":false,"excerpt":"The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as read the best hacking books that related subjects, for example, Networking, programming, abuse improvement, web applications, arrange security checking and other IT subjects. A curated rundown\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":32308,"url":"https:\/\/kalilinuxtutorials.com\/awesome-hacking\/","url_meta":{"origin":6206,"position":3},"title":"Awesome Hacking &#8211; An Amazing Project : The Ultimate Resource Guide For Cybersecurity Exploration","author":"Varshini","date":"March 13, 2024","format":false,"excerpt":"A curated list of awesome Hacking. Inspired by\u00a0awesome-machine-learning If you want to contribute to this list (please do), send me a pull request! For a list of free hacking books available for download, go\u00a0here Table Of Contents System Tutorials Tools Docker General Reverse Engineering Tutorials Tools General Web Tools General\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36116,"url":"https:\/\/kalilinuxtutorials.com\/hexhttp\/","url_meta":{"origin":6206,"position":4},"title":"HExHTTP : Web Security Through Advanced HTTP Header Analysis","author":"Varshini","date":"February 5, 2025","format":false,"excerpt":"HExHTTP is a specialized tool designed to test and analyze HTTP headers to identify vulnerabilities and uncover interesting behaviors in web servers. It is particularly useful for security analysts and penetration testers, offering a range of features to explore potential weaknesses in HTTP implementations. Key Features HExHTTP provides several functionalities\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HExHTTP.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HExHTTP.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HExHTTP.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HExHTTP.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HExHTTP.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HExHTTP.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":29757,"url":"https:\/\/kalilinuxtutorials.com\/sysreptor-an-offensive-security-reporting-tool\/","url_meta":{"origin":6206,"position":5},"title":"SysReptor &#8211; An Offensive Security Reporting Tool","author":"Varshini","date":"August 29, 2023","format":false,"excerpt":"SysReptor is a fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. You can create designs based on simple HTML and CSS, write your reports in user-friendly Markdown and convert them to PDF with just a single click, in the cloud or self-hosted!\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipO6QFGlr-aIpeulyaH-zFPoJHXobPMUeiwWyZp37DThmCy4fEFoSkQTDenNHGvt3GvhoCs1byKVj-39k1TAvYUCaYhzrnFCCVEPwz9gy_ndVyW2m3GyZHNKOoj1XSwT_3fIZG8Np-OdhmxUuwtW6lC2aT5F5RRmsXmLVcoY2bVQ2ij-JU4M8EbUSK_Q\/s16000\/SysReptor.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipO6QFGlr-aIpeulyaH-zFPoJHXobPMUeiwWyZp37DThmCy4fEFoSkQTDenNHGvt3GvhoCs1byKVj-39k1TAvYUCaYhzrnFCCVEPwz9gy_ndVyW2m3GyZHNKOoj1XSwT_3fIZG8Np-OdhmxUuwtW6lC2aT5F5RRmsXmLVcoY2bVQ2ij-JU4M8EbUSK_Q\/s16000\/SysReptor.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipO6QFGlr-aIpeulyaH-zFPoJHXobPMUeiwWyZp37DThmCy4fEFoSkQTDenNHGvt3GvhoCs1byKVj-39k1TAvYUCaYhzrnFCCVEPwz9gy_ndVyW2m3GyZHNKOoj1XSwT_3fIZG8Np-OdhmxUuwtW6lC2aT5F5RRmsXmLVcoY2bVQ2ij-JU4M8EbUSK_Q\/s16000\/SysReptor.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipO6QFGlr-aIpeulyaH-zFPoJHXobPMUeiwWyZp37DThmCy4fEFoSkQTDenNHGvt3GvhoCs1byKVj-39k1TAvYUCaYhzrnFCCVEPwz9gy_ndVyW2m3GyZHNKOoj1XSwT_3fIZG8Np-OdhmxUuwtW6lC2aT5F5RRmsXmLVcoY2bVQ2ij-JU4M8EbUSK_Q\/s16000\/SysReptor.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=6206"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6206\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15747"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=6206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=6206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=6206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}