{"id":390,"date":"2020-05-27T23:38:00","date_gmt":"2020-05-27T23:38:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=390"},"modified":"2024-01-09T22:44:38","modified_gmt":"2024-01-09T22:44:38","slug":"passive-dns-stops-phishing-and-secures-your-attack-surface","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/","title":{"rendered":"How Passive DNS can help with Securing your Attack Surface"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">Passive DNS: Active discovery from your organization&#8217;s DNS history<\/h5>\n\n\n\n<p>The traditional Domain Name System (DNS) is a real-time distributed database system where queries to DNS servers and resolvers translates hostnames into IP addresses and vice versa so that humans don\u2019t have to remember IP addresses and specific URLs to see their favorite cat videos. \ud83d\ude38<\/p>\n\n\n\n<p>DNS is the epitome of \u201cquick and dirty\u201d \u2013 it is optimized for quick retrieval in real-time of the nearest server (e.g., so that consumers can find what they are looking for quickly on Amazon and Netflix), and it has no \u201cmemory\u201d in that it doesn\u2019t maintain an historical record of what happened in the past. So, before passive DNS replication (or passive DNS) was presented to the world in 2005, once a DNS record was modified, and after a few hours of DNS propagation, there was no way to recover the old DNS record values.<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1025\" height=\"425\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png\" alt=\"\" class=\"wp-image-392\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png 1025w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph-512x212.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph-768x318.png 768w\" sizes=\"auto, (max-width: 1025px) 100vw, 1025px\" \/><\/figure>\n\n\n\n<p><strong>Figure 1. Example Domains &amp; Subdomains<\/strong><\/p>\n\n\n\n<p>In contrast, passive DNS replication captures DNS queries on the network and stores them for later retrieval, which basically means there is an historical record of DNS communications that can be accessed by security researchers later. This represents a valuable font of information in this era of big data because of what it can tell us about what is being sought and what can be found on the internet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Without a passive DNS record, DNS is really the wild west.<\/h2>\n\n\n\n<p>In passive DNS, DNS queries, IP address lookups, and stats about everything related to the domains, servers and IP addresses involved in the common DNS communications are saved in a database for later analysis. This is what converts the live DNS results into passive DNS data.<\/p>\n\n\n\n<p>The initial intentions for passive DNS were mainly focused on mitigating malware, protecting brands, mitigating phishing and email policy violations, and data recovery and research.<\/p>\n\n\n\n<p>Fifteen years later there are many ways to use passive DNS to do effective attack surface reconnaissance using this historical data, and we are going to discuss five of them here and how it can be utilized for mapping your attack surface.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">1.&nbsp;Discover DNS Domain Historical Data<\/h5>\n\n\n\n<p>By possessing historical DNS Domain data you can analyze old DNS records, check for new values, compare differences, and find possible attack vectors. An attacker with this information (which can be passively sniffed from network traffic) can see where and when your organization has changed.\u00a0Perhaps you added a subsidiary, changed a brand name and orphaned some cloud servers, or simply forgot that data center existed. If these systems are connected to your infrastructure and unsecured, if you don\u2019t know about them and attackers do, the consequences could be costly.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2.&nbsp;Explore and Discover Subdomains<\/h5>\n\n\n\n<p>Have you ever wondered how many subdomains your organization has? Well, attackers do too. And they can use the data from passive DNS to find out. As an example, an organization like Facebook can have over 10,000 subdomains.<\/p>\n\n\n\n<p>By exploring subdomains, a motivated attacker can sometimes find unsecured areas of websites and development platforms, and test and research areas that might map to adjacent, similar areas in the production environment. Perhaps these systems don\u2019t have valuable data within them, but they may guide an attacker into using a cross-site scripting attack against your production server because it\u2019s great granddad precursor is sitting forgotten in a subdomain no one is managing.<\/p>\n\n\n\n<p>Some subdomains may be low value (to you) and entirely unmanaged and forgotten, but they can still be valuable to a remote attacker from a proof of concept and reconnaissance perspective.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">3.&nbsp;Relate WHOIS History to DNS Domain History<\/h5>\n\n\n\n<p>WHOIS is another ancient protocol born of a simpler age when a few trusting academics and scientists were running ARPANET (the precursor to the internet). In 1982 the Internet Engineering Task Force published a protocol for a directory service for ARPANET users. Initially, the directory simply listed the contact information that was requested of anyone transmitting data across the ARPANET.<\/p>\n\n\n\n<p>As the Internet grew, WHOIS began to serve the needs of different stakeholders such as domain name registrants, law enforcement agents, intellectual property and trademark owners, businesses and individual users. WHOIS stores the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system assigned to an organization. In addition to being useful to legitimate users for attack surface mapping, it\u2019s a treasure trove for attackers.<\/p>\n\n\n\n<p>When WHOIS history is correlated with passive DNS records, an attacker can see when an organization changed their WHOIS IP and domain information, who their previous technicians were, identify the administrative and general contact information for the IT organization and discover their name servers\u2014a pretty important set of details that may map to hosting provider, subsidiaries, acquisitions, or disgruntled employees with inside information.<\/p>\n\n\n\n<p>Further finding of associated domains is made easy by combining IP information extracted from the passive DNS database with historical WHOIS database records.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">4.&nbsp;Detect Open Ports<\/h5>\n\n\n\n<p>As we all know, scanning open ports is one of the first steps taken when you\u2019re in the process of performing full reconnaissance and intel gathering research, but it is also a rather noisy and an obvious way to proceed. Any countermeasure designed to detect a port scan should be able to easily identify and mitigate a scanner coming from a dedicated IP.<\/p>\n\n\n\n<p>But with passive DNS, a port scan is not required to detect popular open ports like 21, 22, 80 or 443. For ports like those, and even for the more esoteric protocols and services, there will be Service (SRV) records in the passive DNS database that effectively enumerate exposed ports that are ready for exploitation.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">5.&nbsp;Find Domains from IPs<\/h5>\n\n\n\n<p>As an attacker is mapping an attack surface, they will no doubt identify IPs that may not be definitively associated with a given organization. This could be simply because the IP was never owned by the organization, or it could be owned by the organization and not mapped properly to DNS, or perhaps it was once mapped properly and has since been forgotten. Passive DNS can provide an historical record for the organization&#8217;s DNS queries and whether the IP ever featured in them, giving an attacker and you an idea of the IP\u2019s origins and ownership.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Passive DNS data is a valuable source of security intelligence focused on DNS queries that shows records that allows you to discover domain names used in the past, explore and discover subdomains, relate individuals with IPs and hostnames, detect open ports, track down spoofed domains, and\u00a0<a href=\"\/learn\/attack-surface-discovery.php\">map your attack surface<\/a>\u00a0without resorting to time-consuming manual scanning.<\/p>\n\n\n\n<p>In the coming weeks and months you\u2019ll see more information about the novel ways CyCognito is blending passive DNS replication with Threat Intelligence to not only discover your entire attack surface but detect the paths of least resistance used by attackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how Passive DNS replication can be used for mitigating malware attacks, phishing attack prevention, and securing your attack surface.<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[6,120,119],"class_list":["post-390","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-attack-surface-management","tag-passive-dns","tag-shadow-risk"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Passive DNS can help with Securing your Attack Surface | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Passive DNS can help with Securing your Attack Surface | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how Passive DNS replication can be used for mitigating malware attacks, phishing attack prevention, and securing your attack surface.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-27T23:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-09T22:44:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png\" \/>\n<meta name=\"author\" content=\"Jim Wachhaus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Wachhaus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/\"},\"author\":{\"name\":\"Jim Wachhaus\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\"},\"headline\":\"How Passive DNS can help with Securing your Attack Surface\",\"datePublished\":\"2020-05-27T23:38:00+00:00\",\"dateModified\":\"2024-01-09T22:44:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/\"},\"wordCount\":1156,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png\",\"keywords\":[\"Attack Surface Management\",\"Passive DNS\",\"Shadow Risk\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/\",\"name\":\"How Passive DNS can help with Securing your Attack Surface | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png\",\"datePublished\":\"2020-05-27T23:38:00+00:00\",\"dateModified\":\"2024-01-09T22:44:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png\",\"width\":1025,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Passive DNS can help with Securing your Attack Surface\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\",\"name\":\"Jim Wachhaus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"caption\":\"Jim Wachhaus\"},\"description\":\"Was Director of Technical Product Marketing at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Passive DNS can help with Securing your Attack Surface | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/","og_locale":"en_US","og_type":"article","og_title":"How Passive DNS can help with Securing your Attack Surface | CyCognito Blog","og_description":"Learn how Passive DNS replication can be used for mitigating malware attacks, phishing attack prevention, and securing your attack surface.","og_url":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/","og_site_name":"CyCognito Blog","article_published_time":"2020-05-27T23:38:00+00:00","article_modified_time":"2024-01-09T22:44:38+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png","type":"","width":"","height":""}],"author":"Jim Wachhaus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Wachhaus","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/"},"author":{"name":"Jim Wachhaus","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0"},"headline":"How Passive DNS can help with Securing your Attack Surface","datePublished":"2020-05-27T23:38:00+00:00","dateModified":"2024-01-09T22:44:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/"},"wordCount":1156,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png","keywords":["Attack Surface Management","Passive DNS","Shadow Risk"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/","url":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/","name":"How Passive DNS can help with Securing your Attack Surface | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png","datePublished":"2020-05-27T23:38:00+00:00","dateModified":"2024-01-09T22:44:38+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Root-Graph.png","width":1025,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/passive-dns-stops-phishing-and-secures-your-attack-surface\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Passive DNS can help with Securing your Attack Surface"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0","name":"Jim Wachhaus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","caption":"Jim Wachhaus"},"description":"Was Director of Technical Product Marketing at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=390"}],"version-history":[{"count":3,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/390\/revisions"}],"predecessor-version":[{"id":587,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/390\/revisions\/587"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}