{"id":9186,"date":"2012-05-24T12:21:13","date_gmt":"2012-05-24T10:21:13","guid":{"rendered":"https:\/\/www.corelan.be\/?p=9186"},"modified":"2012-05-24T12:21:13","modified_gmt":"2012-05-24T10:21:13","slug":"hitb2012ams-day-1-one-flew-over-the-cuckoos-nest","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/","title":{"rendered":"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest"},"content":{"rendered":"<h3>One Flew Over The Cuckoos Nest - Automated Malware Analysis<\/h3>\n<p><a href=\"https:\/\/twitter.com\/botherder\">Claudio Guarnieri<\/a>, senior researcher at iSight Partner, and part of the Shadowserver Foundation and the HoneyPot project. \u00a0He works with malware on a daily basis, maintains malwr.com and is the main developer of the Cuckoo Sandbox, which is also the main topic of his talk.<\/p>\n<p>Claudio explains that there are some other people involved with the Cuckoo sandbox development and wants to make sure those guys receive proper credits for their work as well, even if they are not in the room. \u00a0Big thumbs up to Dario Fernandes and Alessandro Tanasi<\/p>\n<p>Manual analysis of malware takes a lot of time. You might have to to deal with unpacking routines, polymorphic code, and all kinds of other time consuming tasks. Multiply that with the number of malware to analyze, it's clear that automation is needed.<\/p>\n<p>Claudio explains that he wanted to write his own tools because the available commercial tools were expensive and don't necessarily do what he wants them to do. \u00a0There are some cons about automation too - some parts of malware code might not get reached, it might be hard to detect the environment, and so on.<\/p>\n<p>To prepare for an automated malware analysis, you'll need to set your expectations right. \u00a0The analysis environment needs to be designed properly and you need a good way to gather data, Claudio explains. \u00a0 You need to ask yourself if you need a sandbox in the first place. \u00a0What do you expect to achieve? What info is going to be most relevant and who is going to use the results? \u00a0What do you want to analyze ? \u00a0 file formats ? \u00a0What version ? What app ? \u00a0Browsers ? \u00a0Do you want it to communicate with the outside or not ? \u00a0There's plenty of questions you should ask yourself in order to perform a good analysis.<\/p>\n<p>Based on those questions and requirements, Claudio decided to write the Cuckoo sandbox. \u00a0It uses virtualization, open source, started as a Google Summer of Code project (in 2010) and heavily based on python code. \u00a0Recently, it won the first round of the Rapid7 Magnificent7 contest.<\/p>\n<p>It generates Win32 function call trace, dropped files, screenshots, network traffic dumps and comprehensive reports. Claudio continues by explaining some of the major components of the Cuckoo sandbox : the scheduler, the analyzer and how API's get hooked.<\/p>\n<p>Scheduler<\/p>\n<ul>\n<li>Main component<\/li>\n<li>Dispatches pending tasks<\/li>\n<li>100% python<\/li>\n<\/ul>\n<p>Analyzer<\/p>\n<ul>\n<li>instruments the guest<\/li>\n<li>runs the malware<\/li>\n<li>100% python<\/li>\n<\/ul>\n<p>Monitor<\/p>\n<ul>\n<li>DLL using chook to install hooks in API's (used to replace WIndows Detours, because that was easily detected by malware).<\/li>\n<\/ul>\n<p>Images say more than words, so Claudio decides to use a series of demos to showcase how Cuckoo works, what type of analysis you can perform and what the analysis output contains (network dumps, dropped files, reports, etc).<\/p>\n<p>Because Cuckoo is really based on python code, you can write your own specific scripts \u2026 the sky is the limit. \u00a0By default, Cuckoo uses VirtualBox, but you can easily change it to use VMWare or other tools. \u00a0 All of the VM management is part of python classes, so you can simply write your own.<\/p>\n<p>Cuckoo also includes \"signatures\", implemented as python classes. \u00a0You can use them to look for patterns or specific events, assign a description and severity level, and are used to give context to the reports (to make them readable by non-malware experts). It can also be used to receive alerts. \u00a0He showed 2 examples; one that monitors the execution of an exe file, and a second one that tries to detect if a PDF file is trying to load embedded Flash content.<\/p>\n<p>The possibilities are massive and I bet he can go on for hours showing what you can do with the framework. So,\u00a0If you haven't played with it, grab a copy and try it out. \u00a0All you need is a box running VirtualBox, a Windows guest machine and you can start analyzing malware with ease.<\/p>\n<p>Finally, Claudio explains that they plan on making it easier for people to contribute, and reaches out to the community to help out. \u00a0Future plans for the Cuckoo Sandbox include a web based interface, improved windows analysis, support for other OSes (Mac OS X ?), and support for native machines. \u00a0He also mentioned they have plans to allow people to submit malware analysis results to malwr.com and use it as a community resource.<\/p>\n<p>Impressive stuff.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One Flew Over The Cuckoos Nest - Automated Malware Analysis Claudio Guarnieri, senior researcher at iSight Partner, and part of the Shadowserver Foundation and the HoneyPot project. \u00a0He works with malware on a daily basis, maintains malwr.com and is the main developer of the Cuckoo Sandbox, which is also the main topic of his talk. &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[2775,2761,2583,2019,1978,1883,261],"class_list":["post-9186","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-hitb","tag-sandbox","tag-malware","tag-rapid7","tag-python","tag-exploits","tag-corelan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"One Flew Over The Cuckoos Nest - Automated Malware Analysis Claudio Guarnieri, senior researcher at iSight Partner, and part of the Shadowserver Foundation and the HoneyPot project. \u00a0He works with malware on a daily basis, maintains malwr.com and is the main developer of the Cuckoo Sandbox, which is also the main topic of his talk. &hellip; Continue reading &quot;HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-24T10:21:13+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest\",\"datePublished\":\"2012-05-24T10:21:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\\\/\"},\"wordCount\":739,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"hitb\",\"sandbox\",\"malware\",\"rapid7\",\"python\",\"Exploits\",\"corelan\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\\\/\",\"name\":\"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2012-05-24T10:21:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HITB2012AMS Day 1 &#8211; One Flew Over The Cuckoos Nest\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/","og_locale":"en_US","og_type":"article","og_title":"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"One Flew Over The Cuckoos Nest - Automated Malware Analysis Claudio Guarnieri, senior researcher at iSight Partner, and part of the Shadowserver Foundation and the HoneyPot project. \u00a0He works with malware on a daily basis, maintains malwr.com and is the main developer of the Cuckoo Sandbox, which is also the main topic of his talk. &hellip; Continue reading \"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest\"","og_url":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2012-05-24T10:21:13+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest","datePublished":"2012-05-24T10:21:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/"},"wordCount":739,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["hitb","sandbox","malware","rapid7","python","Exploits","corelan"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/","url":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/","name":"HITB2012AMS Day 1 - One Flew Over The Cuckoos Nest - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2012-05-24T10:21:13+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-one-flew-over-the-cuckoos-nest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"HITB2012AMS Day 1 &#8211; One Flew Over The Cuckoos Nest"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":2390,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=9186"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9186\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=9186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=9186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=9186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}