{"id":201279,"date":"2026-04-09T09:13:22","date_gmt":"2026-04-09T09:13:22","guid":{"rendered":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/"},"modified":"2026-04-09T09:13:22","modified_gmt":"2026-04-09T09:13:22","slug":"from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained","status":"publish","type":"post","link":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/","title":{"rendered":"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking &#038; RSA Explained"},"content":{"rendered":"<div class=\"youtubomatic-video-container\"><iframe loading=\"lazy\" width=\"580\" height=\"380\" src=\"https:\/\/www.youtube.com\/embed\/AMT85m2zjM4?autoplay=1&#038;controls=1&#038;hl=en\" frameborder=\"0\" allowfullscreen><\/iframe><\/div>\n<p>This video is part of the From 0 to Root \u2013 Capture The Flag (CTF) training series and provides an in-depth exploration of cryptography concepts and practical cryptanalysis techniques commonly encountered in CTF competitions and real-world cybersecurity problem-solving.<\/p>\n<p>In this session, learners explore symmetric cryptography, symbolic ciphers, hashing techniques, and public-key cryptography, with a strong emphasis on cipher identification, decoding strategies, and hands-on workflows. The lecture balances theoretical foundations with practical demonstrations using online tools, command-line utilities, and basic scripting, helping learners approach cryptography challenges methodically rather than through guesswork.<\/p>\n<p>The session begins with a review of symmetric encryption concepts and an introduction to symbolic ciphers, where symbols, images, or labels are used instead of traditional alphabets. Learners are guided through techniques for identifying symbolic ciphers using online references, cipher lists, challenge hints, and even reverse image search for image-based encodings. Practical examples include handling multi-layered encodings such as repeated Base64 and understanding how challenge descriptions often provide subtle clues about the cipher used.<\/p>\n<p>A structured cipher identification and decoding methodology is emphasized throughout the lecture, highlighting the importance of identifying the cipher type before attempting decryption. Learners see how online cipher identifiers and multi-cipher decoders are used, how layered encodings are approached, and how ciphertext patterns can be matched with known cipher families. Realistic CTF examples such as Twin Hex, Music Cipher, SMS Cipher, and rotation-based ciphers are analyzed to demonstrate this process.<\/p>\n<p>The session then covers hash functions and hash cracking, explaining the concept of one-way encryption and common hash types such as MD5. Learners are shown how to identify hash types using hash identifier tools and follow a practical cracking workflow that includes preparing hash files, selecting appropriate wordlists, and cracking hashes using John the Ripper. The limitations and success factors of hash cracking are also discussed to set realistic expectations.<\/p>\n<p>In the final section, learners are introduced to public-key cryptography and RSA, including the difference between public and private keys. Practical demonstrations using OpenSSL show how RSA key pairs are generated, how data is encrypted with a public key, and how it is decrypted with a private key. The session also explains RSA fundamentals such as prime numbers, modulus, Euler\u2019s totient function, public and private exponents, and modular arithmetic, followed by examples of using online RSA calculators and Python scripts to solve weak or misconfigured RSA challenges commonly found in CTFs.<\/p>\n<p>Key learning points emphasized include the critical importance of cipher identification before decryption, the creative nature of symbolic ciphers, the prevalence of multi-layer encoding in CTF challenges, and the dependency of hash cracking success on correct identification and wordlists. Learners also gain insight into how weak RSA implementations can be exploited and why combining tools, scripting, and theoretical knowledge significantly improves cryptanalysis efficiency.<\/p>\n<p>This video is ideal for CTF participants solving cryptography challenges, students learning applied cryptography, beginners transitioning from basic to intermediate crypto problems, and learners preparing for advanced cryptanalysis topics.<\/p>\n<p>Course Title: From 0 to Root \u2013 Capture The Flag (CTF)<br \/>\nOrganized By: Cyber Security Club, Dhaka International University<br \/>\nLevel: Beginner to Intermediate<br \/>\nMode: Online<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This video is part of the From 0 to Root \u2013 Capture The Flag (CTF) training series and provides an in-depth exploration of cryptography concepts and practical cryptanalysis techniques commonly encountered in CTF competitions and real-world cybersecurity problem-solving. In this session, learners explore symmetric cryptography, symbolic ciphers, hashing techniques, and public-key cryptography, with a strong emphasis on cipher identification, decoding strategies, and hands-on workflows. The lecture balances theoretical foundations with&#8230;<\/p>\n","protected":false},"author":1,"featured_media":201280,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-201279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking &amp; RSA Explained - UshopWell.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking &amp; RSA Explained - UshopWell.com\" \/>\n<meta property=\"og:description\" content=\"This video is part of the From 0 to Root \u2013 Capture The Flag (CTF) training series and provides an in-depth exploration of cryptography concepts and practical cryptanalysis techniques commonly encountered in CTF competitions and real-world cybersecurity problem-solving. In this session, learners explore symmetric cryptography, symbolic ciphers, hashing techniques, and public-key cryptography, with a strong emphasis on cipher identification, decoding strategies, and hands-on workflows. The lecture balances theoretical foundations with...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"UshopWell.com\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-09T09:13:22+00:00\" \/>\n<meta name=\"author\" content=\"UShopWell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UShopWell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/\"},\"author\":{\"name\":\"UShopWell\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/person\\\/6fd1f9e0ff932e534c86c70d5acff0fc\"},\"headline\":\"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking &#038; RSA Explained\",\"datePublished\":\"2026-04-09T09:13:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/\"},\"wordCount\":520,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/201279\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/\",\"name\":\"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking & RSA Explained - UshopWell.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/201279\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained.jpg\",\"datePublished\":\"2026-04-09T09:13:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/201279\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained.jpg\",\"contentUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/201279\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained.jpg\",\"width\":480,\"height\":360,\"caption\":\"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking &#038; RSA Explained\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking &#038; RSA Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#website\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\",\"name\":\"UshopWell.com\",\"description\":\"The Premiere Online Marketplace\",\"publisher\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\",\"name\":\"UshopWell\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/pandaSwea.png\",\"contentUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/pandaSwea.png\",\"width\":365,\"height\":359,\"caption\":\"UshopWell\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/person\\\/6fd1f9e0ff932e534c86c70d5acff0fc\",\"name\":\"UShopWell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"caption\":\"UShopWell\"},\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/author\\\/kburnettu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking & RSA Explained - UshopWell.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/","og_locale":"en_US","og_type":"article","og_title":"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking & RSA Explained - UshopWell.com","og_description":"This video is part of the From 0 to Root \u2013 Capture The Flag (CTF) training series and provides an in-depth exploration of cryptography concepts and practical cryptanalysis techniques commonly encountered in CTF competitions and real-world cybersecurity problem-solving. In this session, learners explore symmetric cryptography, symbolic ciphers, hashing techniques, and public-key cryptography, with a strong emphasis on cipher identification, decoding strategies, and hands-on workflows. The lecture balances theoretical foundations with...","og_url":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/","og_site_name":"UshopWell.com","article_published_time":"2026-04-09T09:13:22+00:00","author":"UShopWell","twitter_card":"summary_large_image","twitter_misc":{"Written by":"UShopWell","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/#article","isPartOf":{"@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/"},"author":{"name":"UShopWell","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/person\/6fd1f9e0ff932e534c86c70d5acff0fc"},"headline":"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking &#038; RSA Explained","datePublished":"2026-04-09T09:13:22+00:00","mainEntityOfPage":{"@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/"},"wordCount":520,"commentCount":0,"publisher":{"@id":"https:\/\/ushopwell.com\/ublog\/#organization"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2026\/04\/201279\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/","url":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/","name":"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking & RSA Explained - UshopWell.com","isPartOf":{"@id":"https:\/\/ushopwell.com\/ublog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/#primaryimage"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2026\/04\/201279\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained.jpg","datePublished":"2026-04-09T09:13:22+00:00","breadcrumb":{"@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/#primaryimage","url":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2026\/04\/201279\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained.jpg","contentUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2026\/04\/201279\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained.jpg","width":480,"height":360,"caption":"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking &#038; RSA Explained"},{"@type":"BreadcrumbList","@id":"https:\/\/ushopwell.com\/ublog\/from-0-to-root-ctf-video-09-cryptography-techniques-hash-cracking-rsa-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ushopwell.com\/ublog\/"},{"@type":"ListItem","position":2,"name":"From 0 to Root CTF | Video 09: Cryptography Techniques, Hash Cracking &#038; RSA Explained"}]},{"@type":"WebSite","@id":"https:\/\/ushopwell.com\/ublog\/#website","url":"https:\/\/ushopwell.com\/ublog\/","name":"UshopWell.com","description":"The Premiere Online Marketplace","publisher":{"@id":"https:\/\/ushopwell.com\/ublog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ushopwell.com\/ublog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ushopwell.com\/ublog\/#organization","name":"UshopWell","url":"https:\/\/ushopwell.com\/ublog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/logo\/image\/","url":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2018\/01\/pandaSwea.png","contentUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2018\/01\/pandaSwea.png","width":365,"height":359,"caption":"UshopWell"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/person\/6fd1f9e0ff932e534c86c70d5acff0fc","name":"UShopWell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","caption":"UShopWell"},"url":"https:\/\/ushopwell.com\/ublog\/author\/kburnettu\/"}]}},"_links":{"self":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts\/201279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/comments?post=201279"}],"version-history":[{"count":0,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts\/201279\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/media\/201280"}],"wp:attachment":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/media?parent=201279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/categories?post=201279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/tags?post=201279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}