{"id":125,"date":"2025-02-14T20:18:52","date_gmt":"2025-02-14T20:18:52","guid":{"rendered":"https:\/\/www.cyberguard6.com\/blog\/?p=125"},"modified":"2025-02-14T21:29:42","modified_gmt":"2025-02-14T21:29:42","slug":"how-base64-encapsulation-hides-malicious-shellcode","status":"publish","type":"post","link":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/","title":{"rendered":"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode"},"content":{"rendered":"<p>Threat actors constantly evolve their obfuscation techniques to evade detection by security tools and analysts. One common technique is encoding payloads in Base64. However, simply decoding the Base64 string often reveals another layer of obfuscation\u2014usually in the form of shellcode, which requires further analysis to uncover its true intent. In this post, we\u2019ll explore why attackers use this method and how tools like CyberChef and scdbg can be used to analyze and reverse malicious shellcode.<\/p>\n<h2>Why Do Threat Actors Use Base64?<\/h2>\n<p>Base64 encoding is not inherently malicious; it\u2019s widely used for data transmission, such as encoding binary files or authentication tokens. However, threat actors leverage Base64 encoding for several reasons:<\/p>\n<ul>\n<li><strong>Evasion of Detection:<\/strong> Many security solutions rely on signature-based detection, and raw shellcode can be flagged by antivirus or endpoint detection and response (EDR) systems. Encoding the payload in Base64 helps bypass these mechanisms.<\/li>\n<li><strong>Bypassing Content Filtering:<\/strong> Some systems block known malware signatures or executables but may allow encoded strings to pass through.<\/li>\n<li><strong>Multi-Layer Obfuscation:<\/strong> Attackers often embed shellcode within multiple layers of encoding (Base64, XOR, AES, etc.), making it harder to analyze.<\/li>\n<\/ul>\n<p>When you decode a Base64-encoded payload, the result is often not plain text but rather another layer of obfuscation\u2014commonly shellcode that requires further analysis.<\/p>\n<h2>Extracting and Analyzing Shellcode<\/h2>\n<p>To properly analyze shellcode hidden within a Base64-encoded payload, we can use a combination of <strong>CyberChef<\/strong> and <strong>scdbg<\/strong>.<\/p>\n<h3>Step 1: Decode Base64 with CyberChef<\/h3>\n<p>CyberChef is an incredibly powerful tool for analyzing encoded or obfuscated data. Here\u2019s how you can use it:<\/p>\n<ol>\n<li>Copy the Base64-encoded payload.<\/li>\n<li>Open <a rel=\"nofollow\" href=\"https:\/\/gchq.github.io\/CyberChef\/\">CyberChef<\/a>.<\/li>\n<li>Drag the \u201cFrom Base64\u201d operation into the recipe.<\/li>\n<li>If the output is further obfuscated (e.g., XOR-encoded or compressed), add the appropriate decryption steps (XOR Brute Force, Inflate, etc.).<\/li>\n<li>Export the decoded binary payload for further analysis.<\/li>\n<\/ol>\n<h3>Step 2: Analyze Shellcode with scdbg<\/h3>\n<p>scdbg (Shellcode Debugger) is a useful tool for analyzing Windows shellcode by emulating its execution in a controlled environment.<\/p>\n<p>To analyze the extracted shellcode:<\/p>\n<ol>\n<li>Save the decoded payload as a raw binary file (e.g., <code>malicious.bin<\/code>).<\/li>\n<li>Run scdbg to emulate execution:\n<pre><code class=\"language-bash\">scdbg -f malicious.bin\r\n<\/code><\/pre>\n<\/li>\n<li>Observe the output for indicators of compromise (IoCs), such as network connections, system API calls, or process injection techniques.<\/li>\n<\/ol>\n<h3>Step 3: Identify and Extract IoCs<\/h3>\n<p>By analyzing scdbg\u2019s output, you can identify key behaviors, such as:<\/p>\n<ul>\n<li><strong>C2 (Command &amp; Control) Communication:<\/strong> Look for suspicious IP addresses or domains.<\/li>\n<li><strong>Windows API Calls:<\/strong> Calls to <code>VirtualAlloc<\/code>, <code>CreateProcess<\/code>, or <code>WinExec<\/code> suggest potential malicious execution.<\/li>\n<li><strong>Process Injection Techniques:<\/strong> If the shellcode attempts to inject into another process, it\u2019s likely part of an advanced attack.<\/li>\n<\/ul>\n<p><em>In the video below, see a demonstration of one of our team members uncovering shell code that was used in the Lockbit 3.0 Ransomware variant.\u00a0<\/em><\/p>\n<div style=\"width: 750px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-125-1\" width=\"750\" height=\"422\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/ShellcodeExtract.mp4?_=1\" \/><a href=\"https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/ShellcodeExtract.mp4\">https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/ShellcodeExtract.mp4<\/a><\/video><\/div>\n<p>&nbsp;<\/p>\n<h4>Conclusion<\/h4>\n<p>Threat actors use Base64 encoding not just to hide their payloads but to add layers of obfuscation, making analysis more challenging. However, by leveraging CyberChef for decoding and scdbg for shellcode analysis, security analysts can efficiently reverse-engineer and detect malicious payloads. Understanding these techniques is crucial for strengthening your threat detection and response capabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors constantly evolve their obfuscation techniques to evade detection by security tools and analysts. One common technique is encoding payloads in Base64. However, simply decoding the Base64 string often reveals another layer of obfuscation\u2014usually in the form of shellcode, which requires further analysis to uncover its true intent. In this post, we\u2019ll explore why&hellip; <a class=\"more-link\" href=\"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/\">Continue reading <span class=\"screen-reader-text\">Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-125","post","type-post","status-publish","format-standard","hentry","category-shellcode","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode<\/title>\n<meta name=\"description\" content=\"Discover how threat actors use Base64 encoding to obfuscate malicious shellcode and learn how to reverse-engineer it using CyberChef and scdbg for effective threat analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode\" \/>\n<meta property=\"og:description\" content=\"Discover how threat actors use Base64 encoding to obfuscate malicious shellcode and learn how to reverse-engineer it using CyberChef and scdbg for effective threat analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberGuard 6 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-14T20:18:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-14T21:29:42+00:00\" \/>\n<meta name=\"author\" content=\"Jason\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/how-base64-encapsulation-hides-malicious-shellcode\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/how-base64-encapsulation-hides-malicious-shellcode\\\/\"},\"author\":{\"name\":\"Jason\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/person\\\/d34605e12eebeb4c509712189ee29ba7\"},\"headline\":\"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode\",\"datePublished\":\"2025-02-14T20:18:52+00:00\",\"dateModified\":\"2025-02-14T21:29:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/how-base64-encapsulation-hides-malicious-shellcode\\\/\"},\"wordCount\":529,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#organization\"},\"articleSection\":[\"shellcode\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/how-base64-encapsulation-hides-malicious-shellcode\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/how-base64-encapsulation-hides-malicious-shellcode\\\/\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/how-base64-encapsulation-hides-malicious-shellcode\\\/\",\"name\":\"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#website\"},\"datePublished\":\"2025-02-14T20:18:52+00:00\",\"dateModified\":\"2025-02-14T21:29:42+00:00\",\"description\":\"Discover how threat actors use Base64 encoding to obfuscate malicious shellcode and learn how to reverse-engineer it using CyberChef and scdbg for effective threat analysis.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/how-base64-encapsulation-hides-malicious-shellcode\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/how-base64-encapsulation-hides-malicious-shellcode\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/how-base64-encapsulation-hides-malicious-shellcode\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/\",\"name\":\"CyberGuard 6 Blog\",\"description\":\"Blogging About Digital Forensics &amp; Incident Response\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#organization\",\"name\":\"CyberGuard 6 Blog\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo.png\",\"width\":717,\"height\":60,\"caption\":\"CyberGuard 6 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/person\\\/d34605e12eebeb4c509712189ee29ba7\",\"name\":\"Jason\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g\",\"caption\":\"Jason\"},\"description\":\"Jason Lapene is a distinguished cybersecurity professional celebrated for his profound expertise and analytical acumen in the field of digital forensics. With a solid academic foundation in Computer Information Systems from Georgia State University and a Master's Degree in Cyber Security from Kennesaw State University, Jason has equipped himself with a comprehensive skill set for tackling complex cyber threats. In addition to his academic credentials, he holds an impressive array of GIAC certifications, including GCFA, GCIH, GSEC, and GSTRT, underscoring his practical and theoretical prowess. With over a decade of experience as a forensic investigator, Jason has honed his skills in various prestigious roles at notable organizations such as Children's Hospital of Atlanta, AT&amp;T, and Rapid7. His specialization in disc forensics, business email compromises, and ransomware investigations and negotiations has made him a sought-after expert in the cybersecurity domain. Jason\u2019s relentless commitment to safeguarding digital environments and his methodical approach to resolving cyber incidents have led to his reputation as a trailblazer in the field, continually advancing the standards of cybersecurity practice.\",\"sameAs\":[\"https:\\\/\\\/www.cyberguard6.com\\\/\"],\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/author\\\/jason\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode","description":"Discover how threat actors use Base64 encoding to obfuscate malicious shellcode and learn how to reverse-engineer it using CyberChef and scdbg for effective threat analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/","og_locale":"en_US","og_type":"article","og_title":"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode","og_description":"Discover how threat actors use Base64 encoding to obfuscate malicious shellcode and learn how to reverse-engineer it using CyberChef and scdbg for effective threat analysis.","og_url":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/","og_site_name":"CyberGuard 6 Blog","article_published_time":"2025-02-14T20:18:52+00:00","article_modified_time":"2025-02-14T21:29:42+00:00","author":"Jason","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/#article","isPartOf":{"@id":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/"},"author":{"name":"Jason","@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/person\/d34605e12eebeb4c509712189ee29ba7"},"headline":"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode","datePublished":"2025-02-14T20:18:52+00:00","dateModified":"2025-02-14T21:29:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/"},"wordCount":529,"commentCount":0,"publisher":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#organization"},"articleSection":["shellcode"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/","url":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/","name":"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode","isPartOf":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#website"},"datePublished":"2025-02-14T20:18:52+00:00","dateModified":"2025-02-14T21:29:42+00:00","description":"Discover how threat actors use Base64 encoding to obfuscate malicious shellcode and learn how to reverse-engineer it using CyberChef and scdbg for effective threat analysis.","breadcrumb":{"@id":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguard6.com\/blog\/how-base64-encapsulation-hides-malicious-shellcode\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguard6.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Unmasking Threat Actors: How Base64 Encapsulation Hides Malicious Shellcode"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguard6.com\/blog\/#website","url":"https:\/\/www.cyberguard6.com\/blog\/","name":"CyberGuard 6 Blog","description":"Blogging About Digital Forensics &amp; Incident Response","publisher":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguard6.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyberguard6.com\/blog\/#organization","name":"CyberGuard 6 Blog","url":"https:\/\/www.cyberguard6.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/logo.png","contentUrl":"https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/logo.png","width":717,"height":60,"caption":"CyberGuard 6 Blog"},"image":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/person\/d34605e12eebeb4c509712189ee29ba7","name":"Jason","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g","caption":"Jason"},"description":"Jason Lapene is a distinguished cybersecurity professional celebrated for his profound expertise and analytical acumen in the field of digital forensics. With a solid academic foundation in Computer Information Systems from Georgia State University and a Master's Degree in Cyber Security from Kennesaw State University, Jason has equipped himself with a comprehensive skill set for tackling complex cyber threats. In addition to his academic credentials, he holds an impressive array of GIAC certifications, including GCFA, GCIH, GSEC, and GSTRT, underscoring his practical and theoretical prowess. With over a decade of experience as a forensic investigator, Jason has honed his skills in various prestigious roles at notable organizations such as Children's Hospital of Atlanta, AT&amp;T, and Rapid7. His specialization in disc forensics, business email compromises, and ransomware investigations and negotiations has made him a sought-after expert in the cybersecurity domain. Jason\u2019s relentless commitment to safeguarding digital environments and his methodical approach to resolving cyber incidents have led to his reputation as a trailblazer in the field, continually advancing the standards of cybersecurity practice.","sameAs":["https:\/\/www.cyberguard6.com\/"],"url":"https:\/\/www.cyberguard6.com\/blog\/author\/jason\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts\/125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts\/125\/revisions"}],"predecessor-version":[{"id":136,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts\/125\/revisions\/136"}],"wp:attachment":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/media?parent=125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/categories?post=125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/tags?post=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}