{"id":467,"date":"2008-04-13T03:44:41","date_gmt":"2008-04-13T01:44:41","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/"},"modified":"2008-04-13T03:44:41","modified_gmt":"2008-04-13T01:44:41","slug":"ip-autotuning-in-vista","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/","title":{"rendered":"IP Autotuning in Vista"},"content":{"rendered":"<div class=\"ExternalClassC28442C1E72C4CFDA55EFF20AA099FF5\">\n<p>At any given time, the amount that TCP can send is governed by three factors: the congestion window, the receive window and the number of bytes available to send. Without using TCP window scaling (which is disabled by default in previous versions of Windows), the maximum receive window a receiver can advertise is 64K bytes. Since the congestion window is usually greater than 64K bytes in high-bandwidth\/high-latency networks, the receive window is often the limiting factor if the application is submitting enough data. <\/p>\n<p>&#160;&#160; <\/p>\n<p>In previous versions of Windows, users can work around this problem by setting the TcpWindowSize registry key value. However, TcpWindowSize is a global setting applied to all connections, and it's often hard for users to know the appropriate window size to set. <\/p>\n<p>&#160;&#160; <\/p>\n<p>To address this issue in Windows Vista, Microsoft has implemented TCP auto-tuning. It enables TCP window scaling by default and automatically tunes the TCP receive window size based on the bandwidth delay product (BDP) and the rate at which the application reads data from the connection. With TCP auto-tuning, the developers have seen 1000% (10x) throughput improvements in internal testing over underutilized wide-area network links. <\/p>\n<p>&#160;&#160; <\/p>\n<p>However, this new feature doesn't work with clients, servers and devices that don't support this option. (By default, all of the previous versions of Windows have the option turned off by default), and some OS'es (such as embedded Linux OS'es in wireless routers) don't like the option at all, and tend to trip over the option ...&#160; <\/p>\n<p>&#160;&#160; <\/p>\n<p>Have you ever noticed that your wireless Linksys\/Netgear\/Dlink router stops working after a while, especially when your Vista is copying a vast amount of data thru the wireless router ?&#160;&#160; If you didn't experience this behaviour with older versions of Windows, then you may want to disable IP Autotuning.&#160; To be honest, as long as you don't communicate with other Vista computers or Windows 2008 servers, you wouldn't benefit from it at all...&#160; If you're doing a lot of small transfers, you would even see extra overhead because of the &quot;window size negotiation&quot; process... <\/p>\n<p>&#160;&#160; <\/p>\n<p>&#160;&#160; <\/p>\n<p>So how to your control IP autotuning under Vista ? <\/p>\n<p>&#160;&#160; <\/p>\n<p>To check the current status : <\/p>\n<p>&#160;&#160; <\/p>\n<div>\n<table style=\"background: #cccccc; border-collapse: collapse\" border=\"0\">\n<colgroup>\n<col style=\"width: 370px\" \/><\/colgroup>\n<tbody valign=\"top\">\n<tr>\n<td style=\"border-right: 0.75pt outset; padding-right: 1px; border-top: 0.75pt outset; padding-left: 1px; padding-bottom: 1px; border-left: 0.75pt outset; padding-top: 1px; border-bottom: 0.75pt outset\">\n<p><span style=\"font-size: 10pt; font-family: courier new\">c:\\<strong>netsh interface tcp show global<\/strong><\/span> <\/p>\n<p>&#160;&#160; <\/p>\n<p><span style=\"font-size: 10pt; font-family: courier new\">Querying active state...<\/span> <\/p>\n<p><span style=\"font-size: 10pt; font-family: courier new\">TCP Global Parameters                  <br \/>----------------------------------------------                   <br \/>Receive-Side Scaling State&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160; : enabled                   <br \/>Chimney Offload State&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160; : enabled                   <br \/>Receive Window Auto-Tuning Level&#160;&#160;&#160; : disabled                   <br \/>Add-On Congestion Control Provider&#160; : none                   <br \/>ECN Capability&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160; : disabled                   <br \/>RFC 1323 Timestamps&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160; : disabled<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&#160;&#160; <\/p>\n<p>To disable IP autotuning : <\/p>\n<p>&#160;&#160; <\/p>\n<div>\n<table style=\"background: #cccccc; border-collapse: collapse\" border=\"0\">\n<colgroup>\n<col style=\"width: 426px\" \/><\/colgroup>\n<tbody valign=\"top\">\n<tr>\n<td style=\"border-right: 0.75pt outset; padding-right: 1px; border-top: 0.75pt outset; padding-left: 1px; padding-bottom: 1px; border-left: 0.75pt outset; padding-top: 1px; border-bottom: 0.75pt outset\">\n<p><span style=\"font-size: 10pt; font-family: courier new\">c:\\<strong>netsh interface tcp set global autotuning=disabled<\/strong><\/span> <\/p>\n<p><span style=\"font-size: 10pt; font-family: courier new\">Ok.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&#160;&#160; <\/p>\n<p>To enable IP autotuning (default Vista behaviour) <\/p>\n<p>&#160;&#160; <\/p>\n<div>\n<table style=\"background: #cccccc; border-collapse: collapse\" border=\"0\">\n<colgroup>\n<col style=\"width: 410px\" \/><\/colgroup>\n<tbody valign=\"top\">\n<tr>\n<td style=\"border-right: 0.75pt outset; padding-right: 1px; border-top: 0.75pt outset; padding-left: 1px; padding-bottom: 1px; border-left: 0.75pt outset; padding-top: 1px; border-bottom: 0.75pt outset\">\n<p><span style=\"font-size: 10pt; font-family: courier new\">C:\\<strong>netsh interface tcp set global autotuning=normal<\/strong><\/span> <\/p>\n<p><span style=\"font-size: 10pt; font-family: courier new\">Ok.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&#160; <\/p>\n<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>At any given time, the amount that TCP can send is governed by three factors: the congestion window, the receive window and the number of bytes available to send. Without using TCP window scaling (which is disabled by default in previous versions of Windows), the maximum receive window a receiver can advertise is 64K bytes. &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"IP Autotuning in Vista\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[201],"tags":[3735],"class_list":["post-467","post","type-post","status-publish","format-standard","hentry","category-windows-client-os","tag-juniper-netscreen-screenos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IP Autotuning in Vista - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IP Autotuning in Vista - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"At any given time, the amount that TCP can send is governed by three factors: the congestion window, the receive window and the number of bytes available to send. Without using TCP window scaling (which is disabled by default in previous versions of Windows), the maximum receive window a receiver can advertise is 64K bytes. &hellip; Continue reading &quot;IP Autotuning in Vista&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2008-04-13T01:44:41+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/13\\\/ip-autotuning-in-vista\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/13\\\/ip-autotuning-in-vista\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"IP Autotuning in Vista\",\"datePublished\":\"2008-04-13T01:44:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/13\\\/ip-autotuning-in-vista\\\/\"},\"wordCount\":426,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"juniper netscreen screenos\"],\"articleSection\":[\"Windows Client OS\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/13\\\/ip-autotuning-in-vista\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/13\\\/ip-autotuning-in-vista\\\/\",\"name\":\"IP Autotuning in Vista - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2008-04-13T01:44:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/13\\\/ip-autotuning-in-vista\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/13\\\/ip-autotuning-in-vista\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/13\\\/ip-autotuning-in-vista\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IP Autotuning in Vista\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IP Autotuning in Vista - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/","og_locale":"en_US","og_type":"article","og_title":"IP Autotuning in Vista - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"At any given time, the amount that TCP can send is governed by three factors: the congestion window, the receive window and the number of bytes available to send. Without using TCP window scaling (which is disabled by default in previous versions of Windows), the maximum receive window a receiver can advertise is 64K bytes. &hellip; Continue reading \"IP Autotuning in Vista\"","og_url":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2008-04-13T01:44:41+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"IP Autotuning in Vista","datePublished":"2008-04-13T01:44:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/"},"wordCount":426,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["juniper netscreen screenos"],"articleSection":["Windows Client OS"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/","url":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/","name":"IP Autotuning in Vista - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2008-04-13T01:44:41+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/13\/ip-autotuning-in-vista\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"IP Autotuning in Vista"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":1384,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=467"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/467\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}