{"id":932,"date":"2025-12-24T14:20:18","date_gmt":"2025-12-24T06:20:18","guid":{"rendered":"https:\/\/www.52runoob.com\/?p=932"},"modified":"2025-12-24T14:20:18","modified_gmt":"2025-12-24T06:20:18","slug":"%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e5%ba%94%e6%80%a5%e5%93%8d%e5%ba%94%ef%bc%9a%e8%87%aa%e5%8a%a8%e5%8c%96%e6%8e%92%e6%9f%a5%e8%84%9a%e6%9c%ac%e5%ae%9e%e6%88%98","status":"publish","type":"post","link":"https:\/\/www.52runoob.com\/index.php\/2025\/12\/24\/%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e5%ba%94%e6%80%a5%e5%93%8d%e5%ba%94%ef%bc%9a%e8%87%aa%e5%8a%a8%e5%8c%96%e6%8e%92%e6%9f%a5%e8%84%9a%e6%9c%ac%e5%ae%9e%e6%88%98\/","title":{"rendered":"\u7f51\u7edc\u5b89\u5168\u5e94\u6025\u54cd\u5e94\uff1a\u81ea\u52a8\u5316\u6392\u67e5\u811a\u672c\u5b9e\u6218"},"content":{"rendered":"\n<p>\u5728\u7f51\u7edc\u5b89\u5168\u5e94\u6025\u54cd\u5e94\uff08Incident Response\uff09\u4e2d\uff0c\u73b0\u573a\u73af\u5883\u5f80\u5f80\u590d\u6742\u4e14\u53d7\u9650\u3002\u5b89\u5168\u5de5\u7a0b\u5e08\u9700\u8981\u5728\u4e0d\u7834\u574f\u73b0\u573a\u8bc1\u636e\u7684\u524d\u63d0\u4e0b\uff0c\u5feb\u901f\u6536\u96c6\u7cfb\u7edf\u72b6\u6001\u3001\u5206\u6790\u65e5\u5fd7\u5e76\u5b9a\u4f4d\u6076\u610f\u6587\u4ef6\u3002<\/p>\n\n\n\n<p>\u867d\u7136\u6709\u8bb8\u591a\u6210\u719f\u7684 EDR \u548c\u5546\u4e1a\u5de5\u5177\uff0c\u4f46\u5728\u7d27\u6025\u60c5\u51b5\u4e0b\uff0c\u8f7b\u91cf\u7ea7\u3001\u53ef\u5b9a\u5236\u7684 Python \u6216 Shell \u811a\u672c\u5f80\u5f80\u662f\u6700\u597d\u7528\u7684\u201c\u745e\u58eb\u519b\u5200\u201d\u3002\u672c\u6587\u63d0\u4f9b\u4e09\u4e2a\u5e94\u6025\u54cd\u5e94\u4e2d\u6700\u5e38\u7528\u7684\u5b9e\u6218\u811a\u672c\u793a\u4f8b\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u573a\u666f\u4e00\uff1a\u7cfb\u7edf\u4fe1\u606f\u201c\u5feb\u7167\u201d\u6536\u96c6 (System Info Collector)<\/h2>\n\n\n\n<p><strong>\u76ee\u6807<\/strong>\uff1a\u5feb\u901f\u83b7\u53d6\u5f53\u524d\u7cfb\u7edf\u7684\u8fdb\u7a0b\u5217\u8868\u3001\u7f51\u7edc\u8fde\u63a5\u3001\u7528\u6237\u4fe1\u606f\u548c\u8ba1\u5212\u4efb\u52a1\uff0c\u7528\u4e8e\u540e\u7eed\u79bb\u7ebf\u5206\u6790\u3002 <strong>\u7279\u70b9<\/strong>\uff1a\u4f7f\u7528 Python \u6807\u51c6\u5e93 <code>subprocess<\/code>\uff0c\u65e0\u9700\u5b89\u88c5 <code>psutil<\/code>\uff0c\u517c\u5bb9\u6027\u5f3a\u3002<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nimport subprocess\nimport os\nimport datetime\n\ndef run_command(cmd, description):\n    print(f&quot;&#x5B;*] \u6b63\u5728\u6536\u96c6: {description}...&quot;)\n    try:\n        # \u4f7f\u7528 shell=True \u5141\u8bb8\u4f7f\u7528\u7ba1\u9053\u7b26\uff0c\u4f46\u9700\u6ce8\u610f\u5b89\u5168\u98ce\u9669\uff08\u6b64\u5904\u4e3a\u5185\u90e8\u5de5\u5177\uff0c\u76f8\u5bf9\u53ef\u63a7\uff09\n        result = subprocess.check_output(cmd, shell=True, stderr=subprocess.STDOUT)\n        return f&quot;\\n=== {description} ===\\n&quot; + result.decode(&#039;utf-8&#039;, errors=&#039;ignore&#039;)\n    except subprocess.CalledProcessError as e:\n        return f&quot;\\n=== {description} (ERROR) ===\\n&quot; + str(e.output)\n\ndef collect_linux_info():\n    report = f&quot;\u7cfb\u7edf\u4fe1\u606f\u6536\u96c6\u62a5\u544a - \u65f6\u95f4: {datetime.datetime.now()}\\n&quot;\n    \n    # 1. \u5f53\u524d\u767b\u5f55\u7528\u6237\n    report += run_command(&quot;w&quot;, &quot;\u5f53\u524d\u767b\u5f55\u7528\u6237&quot;)\n    \n    # 2. \u5f02\u5e38\u7f51\u7edc\u8fde\u63a5 (\u5173\u6ce8 ESTABLISHED \u548c LISTEN)\n    # -p: \u663e\u793a\u8fdb\u7a0bPID, -n: \u4e0d\u89e3\u6790\u57df\u540d (\u52a0\u901f)\n    report += run_command(&quot;netstat -antlp&quot;, &quot;\u7f51\u7edc\u8fde\u63a5\u4e0e\u5bf9\u5e94\u8fdb\u7a0b&quot;)\n    \n    # 3. \u8fdb\u7a0b\u5217\u8868 (\u6309 CPU\/\u5185\u5b58\u6392\u5e8f)\n    report += run_command(&quot;ps -aux --sort=-pcpu | head -20&quot;, &quot;Top 20 CPU \u5360\u7528\u8fdb\u7a0b&quot;)\n    \n    # 4. \u68c0\u67e5\u5b9a\u65f6\u4efb\u52a1\n    report += run_command(&quot;cat \/etc\/crontab&quot;, &quot;\u7cfb\u7edf\u7ea7 Crontab&quot;)\n    report += run_command(&quot;ls -la \/var\/spool\/cron\/&quot;, &quot;\u7528\u6237\u7ea7 Crontab \u76ee\u5f55&quot;)\n    \n    # 5. \u68c0\u67e5\u6700\u8fd1\u4fee\u6539\u7684\u654f\u611f\u6587\u4ef6 (\u5982 \/etc\/passwd, \/etc\/shadow)\n    # \u67e5\u627e 7 \u5929\u5185\u4fee\u6539\u8fc7\u7684 \/etc \u4e0b\u7684\u6587\u4ef6\n    report += run_command(&quot;find \/etc -type f -mtime -7 2&gt;\/dev\/null&quot;, &quot;\u6700\u8fd17\u5929\u4fee\u6539\u7684\u914d\u7f6e&quot;)\n\n    # \u4fdd\u5b58\u62a5\u544a\n    filename = f&quot;ir_report_{datetime.datetime.now().strftime(&#039;%Y%m%d_%H%M%S&#039;)}.txt&quot;\n    with open(filename, &quot;w&quot;) as f:\n        f.write(report)\n    print(f&quot;\\n&#x5B;+] \u6536\u96c6\u5b8c\u6210\uff0c\u62a5\u544a\u5df2\u4fdd\u5b58\u81f3: {filename}&quot;)\n\nif __name__ == &quot;__main__&quot;:\n    if os.name == &#039;posix&#039;:\n        collect_linux_info()\n    else:\n        print(&quot;\u6b64\u793a\u4f8b\u811a\u672c\u4e3b\u8981\u9488\u5bf9 Linux \u73af\u5883\uff0cWindows \u5efa\u8bae\u4f7f\u7528 PowerShell \u6216 WMIC\u3002&quot;)\n\n<\/pre><\/div>\n\n\n<h2 class=\"wp-block-heading\">\u573a\u666f\u4e8c\uff1aWeb \u65e5\u5fd7\u653b\u51fb\u7279\u5f81\u5206\u6790 (Log Analyzer)<\/h2>\n\n\n\n<p><strong>\u76ee\u6807<\/strong>\uff1a\u4ece\u6d77\u91cf\u7684 Web \u8bbf\u95ee\u65e5\u5fd7\uff08Apache\/Nginx\uff09\u4e2d\u7b5b\u9009\u51fa SQL \u6ce8\u5165\u3001XSS \u6216 Webshell \u8fde\u63a5\u7684\u75d5\u8ff9\u3002 <strong>\u7279\u70b9<\/strong>\uff1a\u57fa\u4e8e\u6b63\u5219\u5339\u914d\uff0c\u5feb\u901f\u5b9a\u4f4d\u653b\u51fb\u6e90 IP\u3002<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nimport re\nimport sys\n\n# \u5b9a\u4e49\u5e38\u89c1\u7684\u653b\u51fb\u7279\u5f81\u6b63\u5219\nATTACK_PATTERNS = {\n    &#039;SQL_Injection&#039;: r&quot;(union.*select|select.*from|information_schema|waitfor.*delay|sleep\\()&quot;,\n    &#039;XSS&#039;: r&quot;(&amp;lt;script&gt;|alert\\(|javascript:|onerror=)&quot;,\n    &#039;Webshell_Connect&#039;: r&quot;(cmd=|eval\\(|whoami|exec\\(|system\\()&quot;,\n    &#039;Directory_Traversal&#039;: r&quot;(\\.\\.\/\\.\\.\/|\/etc\/passwd|c:\\\\windows)&quot;,\n    &#039;Struts2_RCE&#039;: r&quot;(org\\.apache\\.struts2|ognl)&quot;\n}\n\ndef analyze_log(log_file):\n    print(f&quot;&#x5B;*] \u5f00\u59cb\u5206\u6790\u65e5\u5fd7\u6587\u4ef6: {log_file}&quot;)\n    \n    suspicious_count = 0\n    ip_stats = {}\n    \n    try:\n        with open(log_file, &#039;r&#039;, encoding=&#039;utf-8&#039;, errors=&#039;ignore&#039;) as f:\n            for line in f:\n                # \u7b80\u5355\u7684 Nginx\/Apache \u65e5\u5fd7\u89e3\u7801\n                # \u5047\u8bbe\u683c\u5f0f: IP - - &#x5B;Date] &quot;Request&quot; Status Bytes ...\n                # \u8fd9\u91cc\u53ea\u505a\u7b80\u5355\u7684\u5168\u6587\u5339\u914d\uff0c\u5b9e\u9645\u573a\u666f\u53ef\u7cbe\u7ec6\u5316\u89e3\u6790\n                \n                is_suspicious = False\n                for attack_type, pattern in ATTACK_PATTERNS.items():\n                    if re.search(pattern, line, re.IGNORECASE):\n                        print(f&quot;&#x5B;!] \u53d1\u73b0\u7591\u4f3c {attack_type} \u653b\u51fb:&quot;)\n                        print(f&quot;    {line.strip()&#x5B;:200]}...&quot;) # \u53ea\u6253\u5370\u524d200\u5b57\u7b26\n                        is_suspicious = True\n                        suspicious_count += 1\n                        break # \u4e00\u884c\u53ea\u62a5\u4e00\u6b21\n                \n                if is_suspicious:\n                    # \u5c1d\u8bd5\u63d0\u53d6 IP (\u7b80\u5355\u6b63\u5219\uff0c\u5339\u914d\u884c\u9996 IP)\n                    ip_match = re.match(r&quot;(\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3})&quot;, line)\n                    if ip_match:\n                        ip = ip_match.group(1)\n                        ip_stats&#x5B;ip] = ip_stats.get(ip, 0) + 1\n\n    except FileNotFoundError:\n        print(&quot;&#x5B;-] \u9519\u8bef\uff1a\u627e\u4e0d\u5230\u65e5\u5fd7\u6587\u4ef6\u3002&quot;)\n        return\n\n    print(f&quot;\\n&#x5B;*] \u5206\u6790\u7ed3\u675f\u3002\u5171\u53d1\u73b0 {suspicious_count} \u6761\u53ef\u7591\u8bb0\u5f55\u3002&quot;)\n    if ip_stats:\n        print(&quot;\\n&#x5B;+] \u53ef\u7591 IP TOP 5:&quot;)\n        sorted_ips = sorted(ip_stats.items(), key=lambda x: x&#x5B;1], reverse=True)&#x5B;:5]\n        for ip, count in sorted_ips:\n            print(f&quot;    IP: {ip} - \u89e6\u53d1\u6b21\u6570: {count}&quot;)\n\nif __name__ == &quot;__main__&quot;:\n    # \u4f7f\u7528\u65b9\u5f0f: python log_analyzer.py \/var\/log\/nginx\/access.log\n    if len(sys.argv) &amp;lt; 2:\n        print(&quot;Usage: python log_analyzer.py &amp;lt;logfile_path&gt;&quot;)\n    else:\n        analyze_log(sys.argv&#x5B;1])\n\n<\/pre><\/div>\n\n\n<h2 class=\"wp-block-heading\">\u573a\u666f\u4e09\uff1aWebshell \u4e0e\u53d8\u52a8\u6587\u4ef6\u626b\u63cf (File Scanner)<\/h2>\n\n\n\n<p><strong>\u76ee\u6807<\/strong>\uff1a\u626b\u63cf Web \u76ee\u5f55\uff0c\u627e\u51fa\u6700\u8fd1\u88ab\u4fee\u6539\u7684\u6587\u4ef6\uff08\u53ef\u80fd\u662f\u653b\u51fb\u8005\u4e0a\u4f20\u7684\u9a6c\uff09\u4ee5\u53ca\u5305\u542b\u5371\u9669\u51fd\u6570\u7684\u6587\u4ef6\u3002 <strong>\u7279\u70b9<\/strong>\uff1a\u7ed3\u5408\u65f6\u95f4\u6233\u548c\u6587\u4ef6\u5185\u5bb9\u7279\u5f81\u3002<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nimport os\nimport time\n\n# \u914d\u7f6e\u626b\u63cf\u76ee\u5f55\u548c\u654f\u611f\u6269\u5c55\u540d\nSCAN_DIR = &quot;\/var\/www\/html&quot;  # \u4fee\u6539\u4e3a\u5b9e\u9645 Web \u6839\u76ee\u5f55\nEXTENSIONS = &#x5B;&#039;.php&#039;, &#039;.jsp&#039;, &#039;.asp&#039;, &#039;.aspx&#039;]\n\n# \u5371\u9669\u51fd\u6570\u7279\u5f81 (PHP\u793a\u4f8b)\nWEBSHELL_SIGNATURES = &#x5B;\n    b&#039;eval($_POST&#039;, \n    b&#039;system($_GET&#039;, \n    b&#039;shell_exec&#039;, \n    b&#039;base64_decode&#039;, \n    b&#039;assert(&#039;\n]\n\ndef scan_files(directory):\n    print(f&quot;&#x5B;*] \u5f00\u59cb\u626b\u63cf\u76ee\u5f55: {directory}&quot;)\n    print(f&quot;&#x5B;*] \u67e5\u627e\u6700\u8fd1 24 \u5c0f\u65f6\u5185\u4fee\u6539\u8fc7\u7684\u811a\u672c\u6587\u4ef6...&quot;)\n    \n    now = time.time()\n    one_day_ago = now - (24 * 60 * 60)\n    \n    for root, dirs, files in os.walk(directory):\n        for filename in files:\n            filepath = os.path.join(root, filename)\n            _, ext = os.path.splitext(filename)\n            \n            if ext.lower() not in EXTENSIONS:\n                continue\n            \n            try:\n                # 1. \u68c0\u67e5\u6587\u4ef6\u4fee\u6539\u65f6\u95f4 (mtime)\n                file_stats = os.stat(filepath)\n                mtime = file_stats.st_mtime\n                \n                if mtime &gt; one_day_ago:\n                    print(f&quot;&#x5B;Time] \u6700\u8fd1\u4fee\u6539: {filepath} (\u65f6\u95f4: {time.ctime(mtime)})&quot;)\n                \n                # 2. \u68c0\u67e5\u6587\u4ef6\u5185\u5bb9\u7279\u5f81\n                with open(filepath, &#039;rb&#039;) as f:\n                    content = f.read()\n                    for sig in WEBSHELL_SIGNATURES:\n                        if sig in content:\n                            print(f&quot;&#x5B;Danger] \u53d1\u73b0\u5371\u9669\u7279\u5f81 &#039;{sig.decode()}&#039;: {filepath}&quot;)\n                            break\n                            \n            except Exception as e:\n                print(f&quot;&#x5B;-] \u65e0\u6cd5\u8bfb\u53d6\u6587\u4ef6: {filepath} - {e}&quot;)\n\nif __name__ == &quot;__main__&quot;:\n    if os.path.exists(SCAN_DIR):\n        scan_files(SCAN_DIR)\n    else:\n        print(f&quot;&#x5B;-] \u76ee\u5f55\u4e0d\u5b58\u5728: {SCAN_DIR}&quot;)\n\n<\/pre><\/div>\n\n\n<h2 class=\"wp-block-heading\">\u5e94\u6025\u54cd\u5e94\u5de5\u5177\u7bb1\u63a8\u8350<\/h2>\n\n\n\n<p>\u9664\u4e86\u4e0a\u8ff0\u81ea\u7f16\u811a\u672c\uff0c\u4ee5\u4e0b\u73b0\u6210\u5de5\u5177\u4e5f\u662f\u5e94\u6025\u54cd\u5e94\u7684\u6807\u51c6\u914d\u7f6e\uff1a<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Sysinternals Suite (Windows)<\/strong>:\n<ul class=\"wp-block-list\">\n<li><code>Process Explorer<\/code>: \u67e5\u770b\u8fdb\u7a0b\u5c42\u7ea7\u3001\u52a0\u8f7d\u7684 DLL\u3002<\/li>\n\n\n\n<li><code>Autoruns<\/code>: \u6700\u5168\u7684\u542f\u52a8\u9879\u68c0\u67e5\u5de5\u5177\u3002<\/li>\n\n\n\n<li><code>TCPView<\/code>: \u5b9e\u65f6\u67e5\u770b\u7aef\u53e3\u8fde\u63a5\u3002<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>BusyBox (Linux)<\/strong>:\n<ul class=\"wp-block-list\">\n<li>\u5982\u679c\u7cfb\u7edf\u547d\u4ee4\uff08\u5982 <code>ls<\/code>, <code>ps<\/code>\uff09\u88ab\u690d\u5165 rootkit \u66ff\u6362\u4e86\uff0c\u4e0a\u4f20\u4e00\u4e2a\u9759\u6001\u7f16\u8bd1\u7684 busybox \u53ef\u4ee5\u4f7f\u7528\u5e72\u51c0\u7684\u6307\u4ee4\u96c6\u3002<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>GScan \/ Chkrootkit \/ Rkhunter<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Linux \u81ea\u52a8\u5316\u6392\u67e5\u811a\u672c\uff0c\u80fd\u81ea\u52a8\u68c0\u6d4b rootkit \u548c\u5e38\u89c1\u7684\u540e\u95e8\u914d\u7f6e\u3002<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Wireshark \/ Tcpdump<\/strong>:\n<ul class=\"wp-block-list\">\n<li>\u5168\u6d41\u91cf\u6293\u5305\u5206\u6790\uff0c\u7528\u4e8e\u6355\u6349 C2\uff08Command &amp; Control\uff09\u901a\u4fe1\u6d41\u91cf\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">\u7ed3\u8bed<\/h2>\n\n\n\n<p>\u5de5\u5177\u53ea\u662f\u8f85\u52a9\uff0c\u6838\u5fc3\u5728\u4e8e<strong>\u5206\u6790\u601d\u8def<\/strong>\u3002\u5728\u6267\u884c\u4e0a\u8ff0\u811a\u672c\u65f6\uff0c\u8bf7\u52a1\u5fc5\u6ce8\u610f\uff1a<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>\u6700\u5c0f\u5316\u5f71\u54cd<\/strong>\uff1a\u4e0d\u8981\u5728\u4e1a\u52a1\u9ad8\u5cf0\u671f\u8fd0\u884c\u9ad8\u8d1f\u8f7d\u626b\u63cf\u3002<\/li>\n\n\n\n<li><strong>\u8bc1\u636e\u4fdd\u5168<\/strong>\uff1a\u4efb\u4f55\u64cd\u4f5c\u524d\uff0c\u6700\u597d\u5bf9\u5173\u952e\u65e5\u5fd7\u548c\u6587\u4ef6\u8fdb\u884c\u54c8\u5e0c\u5907\u4efd\u3002<\/li>\n\n\n\n<li><strong>\u9694\u79bb\u4f18\u5148<\/strong>\uff1a\u786e\u8ba4\u4e3b\u673a\u53d7\u9677\u540e\uff0c\u7b2c\u4e00\u65f6\u95f4\u65ad\u7f51\uff08\u7269\u7406\u62d4\u7ebf\u6216\u865a\u62df\u9694\u79bb\uff09\u662f\u9632\u6b62\u6269\u6563\u7684\u6700\u6709\u6548\u624b\u6bb5\u3002<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u5728\u7f51\u7edc\u5b89\u5168\u5e94\u6025\u54cd\u5e94\uff08Incident Response\uff09\u4e2d\uff0c\u73b0\u573a\u73af\u5883\u5f80\u5f80\u590d\u6742\u4e14\u53d7&#8230; <a class=\"more-link\" href=\"https:\/\/www.52runoob.com\/index.php\/2025\/12\/24\/%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e5%ba%94%e6%80%a5%e5%93%8d%e5%ba%94%ef%bc%9a%e8%87%aa%e5%8a%a8%e5%8c%96%e6%8e%92%e6%9f%a5%e8%84%9a%e6%9c%ac%e5%ae%9e%e6%88%98\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-932","post","type-post","status-publish","format-standard","hentry","category-12"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/posts\/932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/comments?post=932"}],"version-history":[{"count":1,"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/posts\/932\/revisions"}],"predecessor-version":[{"id":933,"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/posts\/932\/revisions\/933"}],"wp:attachment":[{"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/media?parent=932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/categories?post=932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.52runoob.com\/index.php\/wp-json\/wp\/v2\/tags?post=932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}