{"id":6329,"date":"2019-08-28T11:43:28","date_gmt":"2019-08-28T06:13:28","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=6329"},"modified":"2019-08-28T11:43:28","modified_gmt":"2019-08-28T06:13:28","slug":"ail-framework-analysis-information-leak-framework","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/","title":{"rendered":"AIL Framework : Analysis Information Leak Framework"},"content":{"rendered":"\n<p><strong>AIL framework<\/strong> is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. <\/p>\n\n\n\n<p>AIL framework is flexible and can be extended to support other functionalities to mine or process sensitive information (e.g. data leak prevention).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-wy6pSfYg4bM\/XWTpDO7NeVI\/AAAAAAAACL8\/m-fNIts9PDESTaLajSZBOZh7Ui3B6J-ZwCLcBGAs\/s1600\/AIL-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/github.com\/CIRCL\/AIL-framework\/raw\/master\/doc\/screenshots\/webshells.gif?raw=true\" alt=\"\"\/><\/figure>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Modular architecture to handle streams of unstructured or structured information<\/li><li>Default support for external ZMQ feeds, such as provided by CIRCL or other providers<\/li><li>Multiple feed support<\/li><li>Each module can process and reprocess the information already processed by AIL<\/li><li>Detecting and extracting URLs including their geographical location (e.g. IP address location)<\/li><li>Extracting and validating potential leak of credit cards numbers, credentials, &#8230;<\/li><li>Extracting and validating email addresses leaked including DNS MX validation<\/li><li>Module for extracting Tor .onion addresses (to be further processed for analysis)<\/li><li>Keep tracks of duplicates (and diffing between each duplicate found)<\/li><li>Extracting and validating potential hostnames (e.g. to feed Passive DNS systems)<\/li><li>A full-text indexer module to index unstructured information<\/li><li>Statistics on modules and web<\/li><li>Real-time modules manager in terminal<\/li><li>Global sentiment analysis for each providers based on nltk vader module<\/li><li>Terms, Set of terms and Regex tracking and occurrence<\/li><li>Many more modules for extracting phone numbers, credentials and others<\/li><li>Alerting to&nbsp;<a href=\"https:\/\/github.com\/MISP\/MISP\">MISP<\/a>&nbsp;to share found leaks within a threat intelligence platform using&nbsp;<a href=\"https:\/\/www.misp-project.org\/objects.html#_ail_leak\">MISP standard<\/a><\/li><li>Detect and decode encoded file (Base64, hex encoded or your own decoding scheme) and store files<\/li><li>Detect Amazon AWS and Google API keys<\/li><li>Detect Bitcoin address and Bitcoin private keys<\/li><li>Detect private keys, certificate, keys (including SSH, OpenVPN)<\/li><li>Detect IBAN bank accounts<\/li><li>Tagging system with&nbsp;<a href=\"https:\/\/github.com\/MISP\/misp-galaxy\">MISP Galaxy<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/github.com\/MISP\/misp-taxonomies\">MISP Taxonomies<\/a>&nbsp;tags<\/li><li>UI paste submission<\/li><li>Create events on&nbsp;<a href=\"https:\/\/github.com\/MISP\/MISP\">MISP<\/a>&nbsp;and cases on&nbsp;<a href=\"https:\/\/github.com\/TheHive-Project\/TheHive\">The Hive<\/a><\/li><li>Automatic paste export at detection on&nbsp;<a href=\"https:\/\/github.com\/MISP\/MISP\">MISP<\/a>&nbsp;(events) and&nbsp;<a href=\"https:\/\/github.com\/TheHive-Project\/TheHive\">The Hive<\/a>&nbsp;(alerts) on selected tags<\/li><li>Extracted and decoded files can be searched by date range, type of file (mime-type) and encoding discovered<\/li><li>Graph relationships between decoded file (hashes), similar PGP UIDs and addresses of cryptocurrencies<\/li><li>Tor hidden services crawler to crawl and parse output<\/li><li>Tor onion availability is monitored to detect up and down of hidden services<\/li><li>Browser hidden services are screenshot and integrated in the analysed output including a blurring screenshot interface (to avoid &#8220;burning the eyes&#8221; of the security analysis with specific content)<\/li><li>Tor hidden services is part of the standard framework, all the AIL modules are available to the crawled hidden services<\/li><li>Generic web crawler to trigger crawling on demand or at regular interval URL or Tor hidden services<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/covenant-net-command-control-framework\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Covenant : A .NET Command &amp; Control Framework That Aims To Highlight The Attack Surface (opens in a new tab)\">Covenant : A .NET Command &amp; Control Framework That Aims To Highlight The Attack Surface<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/CIRCL\/AIL-framework#installation\"><\/a><strong>Installation<\/strong><\/p>\n\n\n\n<p>Type these command lines for a fully automated installation and start AIL framework:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>git clone https:\/\/github.com\/CIRCL\/AIL-framework.git <br>cd AIL-framework <br>.\/installing_deps.sh <br><br>cd ~\/AIL-framework\/ <br>cd bin\/ <br>.\/LAUNCH.sh -l<\/strong><\/p>\n\n\n\n<p>The default&nbsp;<a href=\"https:\/\/github.com\/CIRCL\/AIL-framework\/blob\/master\/installing_deps.sh\">installing_deps.sh<\/a>&nbsp;is for Debian and Ubuntu based distributions.<\/p>\n\n\n\n<p>There is also a&nbsp;<a href=\"https:\/\/github.com\/CIRCL\/AIL-framework\/blob\/master\/.travis.yml\">Travis file<\/a>&nbsp;used for automating the installation that can be used to build and install AIL on other systems.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Requirement<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Python 3.5+<\/strong><\/li><\/ul>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/CIRCL\/AIL-framework#installation-notes\"><\/a><strong>Installation Notes<\/strong><\/p>\n\n\n\n<p>In order to use AIL combined with&nbsp;<strong>ZFS<\/strong>&nbsp;or&nbsp;<strong>unprivileged LXC<\/strong>&nbsp;it&#8217;s necessary to disable Direct I\/O in&nbsp;<code><strong>$AIL_HOME\/configs\/6382.conf<\/strong><\/code>&nbsp;by changing the value of the directive&nbsp;<code><strong>use_direct_io_for_flush_and_compaction<\/strong><\/code>&nbsp;to&nbsp;<code>false<\/code>.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/CIRCL\/AIL-framework#starting-ail\"><\/a><strong>Starting AIL<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>cd bin\/ <br>.\/LAUNCH -l<\/strong><\/p>\n\n\n\n<p>Eventually you can browse the status of the AIL framework website at the following URL:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>https:\/\/localhost:7000\/ <\/strong><\/p>\n\n\n\n<p>The default credentials for the web interface are located in&nbsp;<code><strong>DEFAULT_PASSWORD<\/strong><\/code>. This file is removed when you change your password.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Research Using AIL<\/strong><\/p>\n\n\n\n<p>If you write academic paper, relying or using AIL, it can be cited with the following BibTeX:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">@inproceedings{mokaddem2018ail,<br>   title={AIL-The design and implementation of an Analysis Information Leak framework},<br>   author={Mokaddem, Sami and Wagener, G{\\&#8217;e}rard and Dulaunoy, Alexandre},<br>   booktitle={2018 IEEE International Conference on Big Data (Big Data)},<br>   pages={5049&#8211;5057},<br>   year={2018},<br>   organization={IEEE}<br> }<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Screenshots<\/strong><\/p>\n\n\n\n<p><strong>Tor Hidden Service Crawler<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-3M3R-FnNxUA\/XWTpEjymVnI\/AAAAAAAACMQ\/OTzHjtIgxpwxCMXdDAD9PidlofRnOBpVwCEwYBhgL\/s1600\/S1creenshots-.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Trending charts<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-Kjw7HQRMFMU\/XWTzGd4gwLI\/AAAAAAAACNY\/oyrxC419b1EI6nRy9tP08oEHzvGGi_oMQCLcBGAs\/s1600\/Screenshots-2.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-qRhcNFUin0w\/XWTpjzBbO1I\/AAAAAAAACMg\/bzOVQjrT0JMMcDwXPZyvPX9oBNCnDuB5ACLcBGAs\/s1600\/Screenshots-3.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Extracted encoded files from pastes<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-Q7UCe61D5Zs\/XWTptgyyOnI\/AAAAAAAACMo\/C6IrwLDnKe0kuA1paZfBwfS0YjHlJe-CgCLcBGAs\/s1600\/Screenshots-4.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-hzaLyTdCaZA\/XWTz2J25WeI\/AAAAAAAACNg\/vktaQTBE6BgdOXDutxPxNm6LAq6WDC7TgCLcBGAs\/s1600\/Screenshots-14.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Browsing<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-KcqPi9PH9mE\/XWTpusk7d8I\/AAAAAAAACMw\/3ISXXndmcOUV5LUgmiZHlUjPleGobrSlQCLcBGAs\/s1600\/Screenshots-5.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Tagging system<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-utx-IiTxak8\/XWTpvDqVKgI\/AAAAAAAACM0\/b1E_zTbr7eQnpR5R50YRnchPqVu_m26KwCLcBGAs\/s1600\/Screenshots-6.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>MISP and The Hive, automatic events and alerts creation<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-wa8NaqjYvNE\/XWTpvi4mq5I\/AAAAAAAACM4\/2gV0__9SVE0-h_MHp3ZKHDkGGDPaUCbRgCLcBGAs\/s1600\/Screenshots-7.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Paste submission<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-mEDMKNJepxA\/XWTpv2HxZ9I\/AAAAAAAACM8\/xOPzA_YFcbMD1-NjXUFR7NQA2EBVSTmSACLcBGAs\/s1600\/Screenshots-8.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Sentiment analysis<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-yy7yvZfbdTA\/XWTpwdiSBKI\/AAAAAAAACNA\/W8Lp-aWUBRYTsyGLfuX7XqC9Ar21pk6pgCLcBGAs\/s1600\/Screenshots-9.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Terms manager and occurence<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-DjnpRcNYxQE\/XWTpFJjoSgI\/AAAAAAAACME\/Ir1DBKf29eMXRWF5yJdchh0_pJoc6vUyQCLcBGAs\/s1600\/Screenshots-10.png\" alt=\"\"\/><\/figure>\n\n\n\n<p style=\"text-align:center\"><strong>Top terms<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-6Esn0jwAlq0\/XWTpIAZI6RI\/AAAAAAAACMM\/dibnqCqMnwUhsS5So2cN0R1DUSBxJDiggCLcBGAs\/s1600\/Screenshots-11.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-SJ4gNF7TvpA\/XWTpIIStV4I\/AAAAAAAACMI\/1u7sR6UjF5UKYjQ2_pdVvDE8jSK8r8axgCLcBGAs\/s1600\/Screenshots-12.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Command line module manager<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-t-nEoNsssoQ\/XWTpX1f2TvI\/AAAAAAAACMU\/tsTnM_GwonIR054GC6uEvBt_jOAVnIZUgCLcBGAs\/s1600\/Screenshots-13.png\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/CIRCL\/AIL-framework\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. AIL framework is flexible and can be extended to support other functionalities to mine or process sensitive information (e.g. data leak prevention). [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15770,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png","fifu_image_alt":"AIL Framework : Analysis Information Leak Framework","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[118,119],"class_list":["post-6329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-ail","tag-ail-framework"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AIL Framework : Analysis Information Leak Framework<\/title>\n<meta name=\"description\" content=\"AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured data sources\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AIL Framework : Analysis Information Leak Framework\" \/>\n<meta property=\"og:description\" content=\"AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured data sources\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-28T06:13:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"AIL Framework : Analysis Information Leak Framework\",\"datePublished\":\"2019-08-28T06:13:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/\"},\"wordCount\":713,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png\",\"keywords\":[\"AIL\",\"AIL Framework\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/\",\"name\":\"AIL Framework : Analysis Information Leak Framework\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png\",\"datePublished\":\"2019-08-28T06:13:28+00:00\",\"description\":\"AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured data sources\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AIL Framework : Analysis Information Leak Framework","description":"AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured data sources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/","og_locale":"en_US","og_type":"article","og_title":"AIL Framework : Analysis Information Leak Framework","og_description":"AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured data sources","og_url":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-08-28T06:13:28+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"AIL Framework : Analysis Information Leak Framework","datePublished":"2019-08-28T06:13:28+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/"},"wordCount":713,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png","keywords":["AIL","AIL Framework"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/","url":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/","name":"AIL Framework : Analysis Information Leak Framework","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png","datePublished":"2019-08-28T06:13:28+00:00","description":"AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured data sources","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/ail-framework-analysis-information-leak-framework\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-hyOVu7ypkI4\/XWT02tF691I\/AAAAAAAACNs\/Eij6MlJo54InKdLDnlz2gExoT83DNQxTACLcBGAs\/s1600\/logo-small%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":31931,"url":"https:\/\/kalilinuxtutorials.com\/chista-open-source-threat-intelligence-framework\/","url_meta":{"origin":6329,"position":0},"title":"Chista | Open Source Threat Intelligence Framework &#8211; Understanding, Predicting, And Defending Against Cyber Threats","author":"Varshini","date":"February 2, 2024","format":false,"excerpt":"In the ever-evolving landscape of cybersecurity threats, staying one step ahead of malicious actors is crucial. Introducing Chista, an open-source Cyber Threat Intelligence (CTI) Framework designed to equip users with the tools and insights needed to understand, predict, and defend against cyber threats. In this article, we'll delve into how\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRbfOAwb2mhiEM_qo9xxrc2c-1FQ7ehiUBAQW9ltwH1wri6z_n6Gkj83EIX0Njl21D-uZsyB6NFUzvoR-c6FD6fudl5ZPNWB9WHlyk0aLICfvMr50mwD_L19_MestWetgAMX6kSOzKWffPyIQsKX1X6JZgYACbPxFNLlsJhzmYAi9dBaB-BLETC9K6IIti\/s16000\/Untitled%20design%20%2815%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":28381,"url":"https:\/\/kalilinuxtutorials.com\/tai-e\/","url_meta":{"origin":6329,"position":1},"title":"Tai-e : A New Efficient Static Analysis Framework For Java","author":"R K","date":"February 17, 2023","format":false,"excerpt":"Tai-e (Chinese: \u592a\u963f; pronunciation: [\u02c8ta\u026a\u0259:]) is a new static analysis framework for Java (please see our technical report for details), which features arguably the \"best\" designs from both the novel ones we proposed and those of classic frameworks such as Soot, WALA, Doop, and SpotBugs. Tai-e is easy-to-learn, easy-to-use, efficient,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMdU1Jv902Tnr8GPvJUSPzF6yXqbr1vFrAEpSvpbCE83mZxaRdXGe734NIsVK_m_tp48RMlQmzfwdZ9euIUyrx915S493VFA0c179L2tCMv7TdGWqDlxn36mlXnYOr6iJsCFfYo5ZskZeS4b4ByCexVhIaUdsTG4yaiK85pyD42y5WFwjK-O_rlRHp\/s16000\/tai-e-logo.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMdU1Jv902Tnr8GPvJUSPzF6yXqbr1vFrAEpSvpbCE83mZxaRdXGe734NIsVK_m_tp48RMlQmzfwdZ9euIUyrx915S493VFA0c179L2tCMv7TdGWqDlxn36mlXnYOr6iJsCFfYo5ZskZeS4b4ByCexVhIaUdsTG4yaiK85pyD42y5WFwjK-O_rlRHp\/s16000\/tai-e-logo.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMdU1Jv902Tnr8GPvJUSPzF6yXqbr1vFrAEpSvpbCE83mZxaRdXGe734NIsVK_m_tp48RMlQmzfwdZ9euIUyrx915S493VFA0c179L2tCMv7TdGWqDlxn36mlXnYOr6iJsCFfYo5ZskZeS4b4ByCexVhIaUdsTG4yaiK85pyD42y5WFwjK-O_rlRHp\/s16000\/tai-e-logo.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMdU1Jv902Tnr8GPvJUSPzF6yXqbr1vFrAEpSvpbCE83mZxaRdXGe734NIsVK_m_tp48RMlQmzfwdZ9euIUyrx915S493VFA0c179L2tCMv7TdGWqDlxn36mlXnYOr6iJsCFfYo5ZskZeS4b4ByCexVhIaUdsTG4yaiK85pyD42y5WFwjK-O_rlRHp\/s16000\/tai-e-logo.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":4446,"url":"https:\/\/kalilinuxtutorials.com\/just-metadata\/","url_meta":{"origin":6329,"position":2},"title":"Just-Metadata : Tool That Gathers &#038; Analyzes Metadata About IP Addresses","author":"R K","date":"April 2, 2019","format":false,"excerpt":"Just-Metadata is a tool that can be used to gather intelligence information passively about a large number of IP addresses, and attempt to extrapolate relationships that might not otherwise be seen. Just-Metadata has \"gather\" modules which are used to gather metadata about IPs loaded into the framework across multiple resources\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6355,"url":"https:\/\/kalilinuxtutorials.com\/nebulousad-automated-credential-auditing-tool\/","url_meta":{"origin":6329,"position":3},"title":"NebulousAD : Automated Credential Auditing Tool","author":"R K","date":"August 30, 2019","format":false,"excerpt":"NebulousAD automated credential auditing tool. I will be adding a wiki, documentation, etc. soon. Features: Will be adding a redact-by-group feature that will not dump hashes or check against the api for accounts in specific groups (such as domain administrators). Installation Simply download the precompiled release (requires no python interpreter),\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6895,"url":"https:\/\/kalilinuxtutorials.com\/decaf-dynamic-executable-code-analysis-framework\/","url_meta":{"origin":6329,"position":4},"title":"DECAF : Dynamic Executable Code Analysis Framework","author":"R K","date":"October 16, 2019","format":false,"excerpt":"DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF. DECAF++, the new version of DECAF, taint analysis is around 2X faster making it\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1184,"url":"https:\/\/kalilinuxtutorials.com\/androl4b-2\/","url_meta":{"origin":6329,"position":5},"title":"Androl4b &#8211; Android Security Virtual Machine","author":"R K","date":"May 6, 2018","format":false,"excerpt":"AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the gathering of most recent framework, tutorials and labs from various security nerds and researchers for reverse engineering and malware analysis. Changes in Androl4b v.3? Tools are updated New tools and lab added Upgraded to Ubuntu mate 17.04\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"Androl4b","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=700%2C400 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=1050%2C600 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-1.png?resize=1400%2C800 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=6329"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6329\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15770"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=6329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=6329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=6329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}