{"id":199,"date":"2019-01-17T04:27:48","date_gmt":"2019-01-17T04:27:48","guid":{"rendered":"https:\/\/mrjsec.co.uk\/blog\/?p=199"},"modified":"2019-01-17T04:27:57","modified_gmt":"2019-01-17T04:27:57","slug":"pepper-minstix-yule-log-analysis","status":"publish","type":"post","link":"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/","title":{"rendered":"<center>Pepper Minstix &#8211; Yule Log Analysis<\/center>"},"content":{"rendered":"\n<p style=\"text-align:center\">We speak to Pepper Minstix, who has been a victim of password spraying!<br>&#8220;We fear that they were successful in accessing one of our Elf Web Access accounts,<br>but we don&#8217;t know which one.<br>Parsing through .evtx files can be tricky, but there&#8217;s a Python script that can help you convert it into XML for easier grep&#8217;ing.&#8221;<\/p>\n\n\n\n<p style=\"text-align:center\">We are given this <a href=\"https:\/\/securityweekly.com\/2017\/07\/21\/tsw11\/\">URL <\/a>for a hint.<\/p>\n\n\n\n<p style=\"text-align:center\">When we open the terminal for Yule Log Analysis were greeted with this.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"570\" height=\"615\" data-attachment-id=\"200\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/capture1-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-1.png?fit=570%2C615&amp;ssl=1\" data-orig-size=\"570,615\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-1.png?fit=570%2C615&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-1.png?resize=570%2C615&#038;ssl=1\" alt=\"\" class=\"wp-image-200\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-1.png?w=570&amp;ssl=1 570w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-1.png?resize=278%2C300&amp;ssl=1 278w\" sizes=\"auto, (max-width: 570px) 100vw, 570px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">&#8220;I am Pepper Minstix, and I&#8217;m looking for your help.<br> Bad guys have us tangled up in pepperminty kelp!<br> &#8220;Password spraying&#8221; is to blame for this our grinchy fate.<br> Should we blame our password policies which users hate?<br><br>Here you&#8217;ll find a weblog filled with failure and success.<br> One successful login there requires your redress.<br> Can you help us figure out which user attacked?<br> Tell us who fell victim, and please handle this with tact.<br><br>Submit the compromised webmail username to <br> &#8220;run to answer&#8221; to complete this challenge.&#8221;<\/p>\n\n\n\n<p style=\"text-align:center\">So, check the logs. Find the one who fell victim and use run to answer to submit the compromised webmail username.<\/p>\n\n\n\n<p style=\"text-align:center\">We have three files &#8220;<a href=\"https:\/\/pastebin.com\/raw\/T3SyXcjT\">evtx_dump. Py<\/a>&#8220;, &#8220;ho-ho-no.evtx&#8221; and &#8220;runtoanswer&#8221; evtx_dump.py is a python script to &#8220;Dump a binary EVTX file into XML&#8221; which is for ho-ho-no.evt which is the weblog filled with failure and success and run to answer where we submit our answer.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"617\" height=\"741\" data-attachment-id=\"201\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/capture2-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-1.png?fit=617%2C741&amp;ssl=1\" data-orig-size=\"617,741\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture2\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-1.png?fit=617%2C741&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-1.png?resize=617%2C741&#038;ssl=1\" alt=\"\" class=\"wp-image-201\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-1.png?w=617&amp;ssl=1 617w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-1.png?resize=250%2C300&amp;ssl=1 250w\" sizes=\"auto, (max-width: 617px) 100vw, 617px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">I am using the command python evtx_dump. Py ho-ho-no.evtx, where given a whole butch of logs.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"926\" height=\"950\" data-attachment-id=\"202\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/capture3-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-1.png?fit=926%2C950&amp;ssl=1\" data-orig-size=\"926,950\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture3\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-1.png?fit=700%2C718&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-1.png?fit=700%2C718&amp;ssl=1\" alt=\"\" class=\"wp-image-202\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-1.png?w=926&amp;ssl=1 926w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-1.png?resize=292%2C300&amp;ssl=1 292w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-1.png?resize=768%2C788&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-1.png?resize=700%2C718&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">I could spend hours going through each event and finding who&#8217;s user was attacked. However, the challenge is to figure out which user was attacked and &#8220;Submit the<br>compromised webmail username to run to answer to complete this challenge.&#8221;<br>Password Spraying: &#8220;Password spraying refers to the attack method that takes a large number of usernames and loops them with a single password.&#8221;<\/p>\n\n\n\n<p style=\"text-align:center\">So, we need to find which username has logged in more than once. I have an idea!<br>First let&#8217;s run python evtx_dump.py ho-ho-no.evtx > log.text this will dump all of ho<br>ho-no.evtx into log.text.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"515\" height=\"104\" data-attachment-id=\"203\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/capture4-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-1.png?fit=515%2C104&amp;ssl=1\" data-orig-size=\"515,104\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture4\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-1.png?fit=515%2C104&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-1.png?resize=515%2C104&#038;ssl=1\" alt=\"\" class=\"wp-image-203\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-1.png?w=515&amp;ssl=1 515w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-1.png?resize=300%2C61&amp;ssl=1 300w\" sizes=\"auto, (max-width: 515px) 100vw, 515px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Now let&#8217;s look at some of the log&#8217;s and find the username prefix, which is &#8220;TargetUserName&#8221;.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"928\" height=\"634\" data-attachment-id=\"204\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/capture5-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-1.png?fit=928%2C634&amp;ssl=1\" data-orig-size=\"928,634\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture5\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-1.png?fit=700%2C478&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-1.png?fit=700%2C478&amp;ssl=1\" alt=\"\" class=\"wp-image-204\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-1.png?w=928&amp;ssl=1 928w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-1.png?resize=300%2C205&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-1.png?resize=768%2C525&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-1.png?resize=700%2C478&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Now we have the prefix; we use grep to find only the TargetUserName parts.<br> grep -r &#8220;TargetUserName&#8221; log.text.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"798\" height=\"967\" data-attachment-id=\"205\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/capture6\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture6.png?fit=798%2C967&amp;ssl=1\" data-orig-size=\"798,967\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture6\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture6.png?fit=700%2C848&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture6.png?fit=700%2C848&amp;ssl=1\" alt=\"\" class=\"wp-image-205\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture6.png?w=798&amp;ssl=1 798w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture6.png?resize=248%2C300&amp;ssl=1 248w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture6.png?resize=768%2C931&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture6.png?resize=700%2C848&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Ok! Now have the Usernames we needed, so let&#8217;s copy them. So in this case, use this <a href=\"https:\/\/www.somacon.com\/p568.php\">website<\/a> to paste them in, and this website makes the following &#8220;Count Duplicates in a List Online Tool.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"897\" height=\"973\" data-attachment-id=\"206\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/capture7\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7.png?fit=897%2C973&amp;ssl=1\" data-orig-size=\"897,973\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture7\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7.png?fit=700%2C759&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7.png?fit=700%2C759&amp;ssl=1\" alt=\"\" class=\"wp-image-206\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7.png?w=897&amp;ssl=1 897w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7.png?resize=277%2C300&amp;ssl=1 277w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7.png?resize=768%2C833&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7.png?resize=700%2C759&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">So the answer is &#8220;minty. candycane&#8221;, why? We&#8217;ll see because of minty candy cane duplicates itself six times! Which means the password spraying looped this username.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"716\" height=\"922\" data-attachment-id=\"207\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/capture8\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8.png?fit=716%2C922&amp;ssl=1\" data-orig-size=\"716,922\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture8\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8.png?fit=700%2C901&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8.png?fit=700%2C901&amp;ssl=1\" alt=\"\" class=\"wp-image-207\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8.png?w=716&amp;ssl=1 716w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8.png?resize=233%2C300&amp;ssl=1 233w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8.png?resize=700%2C901&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Thinking outside the box here!<\/p>\n\n\n\n<p style=\"text-align:center\">References:<br>\nhttps:\/\/www.somacon.com\/p568.php<br>\nhttps:\/\/www.howtoforge.com\/tutorial\/linux-grep-command\/<br>\nhttps:\/\/resources.infosecinstitute.com\/password-spraying\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We speak to Pepper Minstix, who has been a victim of password spraying!&#8220;We fear that they were successful in accessing one of our Elf Web Access accounts,but we don&#8217;t know which one.Parsing through .evtx files&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[10],"tags":[13,14,12],"class_list":["post-199","post","type-post","status-publish","format-standard","hentry","category-kringlecon-2018","tag-13","tag-ctf","tag-kringlecon"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paD3U6-3d","_links":{"self":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts\/199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=199"}],"version-history":[{"count":1,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts\/199\/revisions"}],"predecessor-version":[{"id":208,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts\/199\/revisions\/208"}],"wp:attachment":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}